CN107454660A - Network method and device are stayed after failed authentication - Google Patents

Network method and device are stayed after failed authentication Download PDF

Info

Publication number
CN107454660A
CN107454660A CN201710669740.8A CN201710669740A CN107454660A CN 107454660 A CN107454660 A CN 107454660A CN 201710669740 A CN201710669740 A CN 201710669740A CN 107454660 A CN107454660 A CN 107454660A
Authority
CN
China
Prior art keywords
network
network formats
formats
authentication
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710669740.8A
Other languages
Chinese (zh)
Other versions
CN107454660B (en
Inventor
王丕光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710669740.8A priority Critical patent/CN107454660B/en
Publication of CN107454660A publication Critical patent/CN107454660A/en
Application granted granted Critical
Publication of CN107454660B publication Critical patent/CN107454660B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure is directed to stay network method and device after a kind of failed authentication, belong to electronic technology field.Methods described includes:During network insertion processing is carried out based on first network standard, when detecting that subscriber identification card enters disarmed state because of failed authentication, the second network formats in addition to the first network standard that terminal is supported are determined;Second network formats are switched to, network insertion processing is carried out based on second network formats.Using the disclosure, network insertion can be reattempted to after network formats switching, shorten the network insertion stand-by period.

Description

Network method and device are stayed after failed authentication
Technical field
The disclosure is directed to electronic technology field, and network method and device are stayed especially with respect to after a kind of failed authentication.
Background technology
Generally in UMTS (Universal Mobile Telecommunications System, universal mobile communications system System) authentication operations that carry out in network and LTE (Long Term Evolution, Long Term Evolution) network are using two-way mirror Power scheme, i.e. network side equipment need to authenticate terminal and terminal is also required to authenticate network side equipment.However, During bi-directional authentification, it is possible that the phenomenon of terminal-pair network side equipment failed authentication.Relatively common authentication is lost Lose including MAC (Media Address Control, network interface physical address) failures and synchronization failure (sync failure)。
For synchronization failure, some failed authentications are temporary failure.But according to UMTS and LTE protocol, if Network side equipment can be refused to be authenticated again in a short time after producing synchronization failure twice in succession.And then terminal can be SIM (Subscriber Identification Module, subscriber identification card) card is set to disarmed state.If the attempt to access The SIM card of LTE network, which is in disarmed state, can cause the situation of terminal off-grid.
In the related art, in order that terminal recover normal cluster state automatically from off-grid state, when run into due to even Caused by synchronization failure caused by continuous during SIM card disarmed state, terminal can automatic start timer.Then, set by timer Reattempted to after the time time-out put and network and SIM card is authenticated.It is because network side equipment is in short-term to set timer The interior terminal that can refuse is authenticated again.
In the above art, although this mode can cause SIM card to network successfully, due to being advised in communications protocol The authentication request of the terminal will not be reprocessed after terminal authentication failure by determining network side equipment in the short time, therefore timer is set The time put can not be too short, can so cause the network insertion stand-by period long.
The content of the invention
In order to overcome problem present in correlation technique, present disclose provides stay network method after a kind of failed authentication.Institute It is as follows to state technical scheme:
According to the first aspect of the embodiment of the present disclosure, there is provided stay network method after a kind of failed authentication, methods described includes:
Based on first network standard carry out network insertion processing during, when detect subscriber identification card because mirror When power fails and enters disarmed state, the second network formats in addition to the first network standard that terminal is supported are determined;
Second network formats are switched to, network insertion processing is carried out based on second network formats.
The method provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from And the network insertion stand-by period can be shortened.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network Standard is any of following network formats:5G、4G、3G、2G.
Optionally it is determined that the second network formats in addition to the first network standard that terminal is supported, including:
Determine the highest level network formats in addition to the first network standard that terminal is supported;
The highest level network formats are defined as the second network formats.
If first network standard is unavailable, the highest level network formats outside first network standard are chosen first, To ensure that terminal can be communicated by the highest level network formats outside first network standard, communication quality is improved.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, network insertion processing is carried out based on second network formats, including:
Network insertion is sent to ask to base station corresponding with second network formats;
Receive the authentication information that base station is returned based on network insertion request;
Under second network formats, authentication operations are carried out based on the authentication information.
Different network formats are mounted in different base station, so if terminal have switched network formats, are then found and second The corresponding base station of network formats is authenticated.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication Formula is the network formats beyond 2G;
Methods described also includes:
When detecting that carrying out network insertion processing based on second network formats occurs failed authentication, switch to default Without authentication the 3rd network formats, based on the 3rd network formats carry out network insertion processing, wherein, the 3rd net Network standard is 2G.
Greatly increased because the 3rd network formats are without authentication, therefore in the success rate of net.If the net of income second Network under network standard also have failed, and can attempt income without the network under the 3rd network formats of authentication.
According to the second aspect of the embodiment of the present disclosure, there is provided the device in net after a kind of failed authentication, described device include:
Determining module, for during network insertion processing is carried out based on first network standard, when detecting user Identification cacaine failed authentication and when entering disarmed state, determine the in addition to the first network standard that terminal is supported Two network formats;
First handover module, for switching to second network formats, network is carried out based on second network formats Access is handled.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network Standard is any of following network formats:5G、4G、3G、2G.
Alternatively, the determining module includes:
First determining unit, the highest level network system in addition to the first network standard supported for determining terminal Formula;
Second determining unit, for the highest level network formats to be defined as into the second network formats.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, first handover module includes:
Transmitting element, asked for sending network insertion to base station corresponding with second network formats;
Receiving unit, the authentication information returned for receiving base station based on network insertion request;
Authenticating unit, under second network formats, authentication operations to be carried out based on the authentication information.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication Formula is the network formats beyond 2G;
Described device also includes:
Second handover module, detect that carrying out network insertion processing based on second network formats authenticates for working as During failure, default the 3rd network formats without authentication are switched to, are carried out based on the 3rd network formats at network insertion Reason, wherein, the 3rd network formats are 2G.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal, the terminal include processor and memory, institute State and at least one instruction, at least one section of program, code set or instruction set are stored with memory, at least one instruction, institute State after at least one section of program, the code set or instruction set are loaded and performed to realize above-mentioned failed authentication by the processor In network method.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of computer-readable recording medium, in the storage medium At least one instruction, at least one section of program, code set or instruction set are stored with, described at least one instructs, be described at least one section Program, the code set or instruction set are loaded by processor and performed stays network method to realize after above-mentioned failed authentication.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The method provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from And the network insertion stand-by period can be shortened.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.In the accompanying drawings:
Fig. 1 is the flow chart in network method after a kind of failed authentication according to an exemplary embodiment;
Fig. 2 is the flow chart in network method after a kind of failed authentication according to an exemplary embodiment;
Fig. 3 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 4 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 5 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 6 is the schematic diagram of the device in net after a kind of failed authentication according to an exemplary embodiment;
Fig. 7 is a kind of structural representation of terminal according to an exemplary embodiment.
Pass through above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings It is not intended to limit the scope of disclosure design by any mode with word description, but is by reference to specific embodiment Those skilled in the art illustrate the concept of the disclosure.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
The embodiments of the invention provide network method is stayed after a kind of failed authentication, this method can be realized by terminal.Wherein, Terminal can be mobile phone, tablet personal computer, desktop computer, notebook etc..Terminal can include processor, memory, The parts such as transceiver.Processor can be CPU (Central Processing Unit, CPU) etc., can be used for Whether detection subscriber identification card because of failed authentication enters disarmed state, determine that terminal supports remove first network standard it The second outer network formats, first network standard is switched into the second network formats and carries out network based on the second network formats Access is handled, and waits processing.Memory can be that RAM (Random Access Memory, random access memory), Flash (dodge Deposit) etc., it can be used for storing data generated in the data received, the data needed for processing procedure, processing procedure etc., such as net Authentication information that network side apparatus returns etc..In addition, transceiver can include antenna, match circuit, modem etc..Transceiver It can be used for carrying out data transmission with network side equipment such as base station, to carry out the authentication operations based on SIM card and voice call Deng operation.
Terminal can also include input block, display unit, audio output part etc..Wherein, input block can be tactile Touch screen, keyboard, mouse etc..Audio output part can be audio amplifier, earphone etc..
The exemplary embodiment of the disclosure one provides and stays network method after a kind of failed authentication, as shown in figure 1, this method Handling process can include the steps:
Step S110, based on first network standard carry out network insertion processing during, when detect SIM card because mirror When power fails and enters disarmed state, the second network formats in addition to first network standard that terminal is supported are determined.
Alternatively, first network standard is any of following network formats:5G、4G、3G;Second network formats be with Any of lower network standard:5G、4G、3G、2G.
Because terminal is communicated safer under high level network formats, data transfer is quicker, terminal meeting The network that prioritizing selection is accessed under high level network formats.It should be noted that high level network formats are as under 4G, 3G Network can typically use bi-directional authentification scheme to carry out authentication operations.During bi-directional authentification, it is possible that terminal-pair net The phenomenon of network side apparatus failed authentication, relatively common this failed authentication include MAC failures and synchronization failure.According to UMTS and LTE protocol, if after producing synchronization failure twice in succession, network side equipment can refuse terminal and be reflected again in a short time Power.And then SIM card can be set to disarmed state by terminal.
Wherein, SQN is included in the authentication parameter that reception network side equipment issues for synchronization failure, terminal (sequence number, sequence number), terminal can carry out the authentication to network side equipment based on this sequence number:Terminal can base SQN is verified whether in effective range in predetermined proof rule, if not in effective range, it is subsynchronous to occur one by SQN Failure.Wherein, SQN setting be in order to prevent authentication parameter that other people pretend to be network side equipment to carry out hijack legitimate user terminal, And the terminal of validated user is chained using intercepting and capturing, old authentication parameters.
In force, when detecting that SIM card enters disarmed state because of failed authentication, it may be determined that what terminal was supported removes The second network formats outside first network standard.For example, one is supported 4G, the mobile phone of 3G network to carry out authentication behaviour after powering Make, first, the mobile phone can select 4G networks automatically.Then, network insertion processing is carried out based on 4G networks, but may be in succession Twice there occurs synchronization failure, and then SIM card is arranged to disarmed state.So it is invalid that mobile phone can detect that SIM card enters State.The method provided based on the present embodiment, mobile phone may proceed to determine other networks in addition to 4G networks that it is supported Standard such as 3G network.
Alternatively, can be with prioritizing selection terminal in the case of the network that first network standard can not be successfully accessed in terminal The highest level network formats in addition to first network standard supported again attempt to carry out network insertion.Network formats are by advanced To it is rudimentary be 5G, 4G, 3G, 2G successively.Correspondingly, as shown in Fig. 2 step S110 can include:Step S210, determine terminal branch The highest level network formats in addition to first network standard held;Step S220, highest level network formats are defined as Two network formats.
It should be noted that because terminal is communicated safer under high level network formats, data transfer is more Accelerate speed, therefore when failure occurs for the network for accessing first network standard, can be based on other in addition to first network standard Highest-ranking network formats are attempted to carry out network insertion again in network formats, to ensure mobile phone in the conceived case, fortune Row is in the network environment of high quality.
For example, one is supported 4G, 3G, 2G, the mobile phone of GPRS network to carry out authentication operations after powering, it is based on when detecting In the case that first network standard such as 4G carry out network insertion failure, it is determined that optional network formats are 3G, 2G, GPRS network. Then, the mobile phone can be inquired about in default network formats levels list, compared, and determine net corresponding with 3G network Network standard rank highest, it is thus determined that the highest level network formats in addition to first network standard that terminal is supported are 3G nets Network.Finally, 3G network is defined as the second network formats.
Certainly, can be with prioritizing selection 4G networks if terminal carries out network insertion generation failure first under 3G network Trial carries out network insertion again.
Step S120, the second network formats are switched to, network insertion processing is carried out based on the second network formats.
Alternatively, the concrete processing procedure for network insertion processing being carried out based on the second network formats can be as follows:Send net Network access request extremely network side equipment corresponding with the second network formats;Receive network side equipment and be based on network insertion request return Authentication information;Under the second network formats, authentication operations are carried out based on authentication information.
In force, when failure occurs for the network that terminal is accessed under first network standard, failure reporting can not be sent The corresponding first network side apparatus of network of first network standard is given, can be directly on one's own initiative to the net with the second network formats Corresponding second network side equipment of network sends authentication request, the network accessed with quick trial under the second network formats.When second Network side equipment returns to encryption data to terminal after receiving authentication request, and terminal is after encryption data is received based on local Authentication information in SIM card is parsed to encryption data, and analysis result is back into the second network side equipment.When the second net After network side apparatus receives analysis result, the analysis result authorization data local with the second network side equipment is matched, such as Fruit the match is successful then the second network side equipment to terminal authentication success.
In communication system, by taking 2G networks as an example, for terminal during network insertion is carried out, can generate authentication first please Ask and be sent to MSC (Mobile Switching Center, mobile interaction center).Then, MSC is to AUC (Authentication Center, AUC) asks authentication parameter.Then, AUC according to caused by randomizer with Machine number (is used to enter the process of 2G communication transmission informations with KI (Key Identifier, KI) by A3 one-way algorithms A kind of algorithm of row encryption) be calculated SRES (i), and by the authentication parameter for including random number and SRES (i) send to MSC.Then, the SRES (i) in the authentication parameter received is stored in local by MSC, is authenticated based on generating random number user side Ask and sent by base station to terminal.Terminal passes through still according to the random number received and in the KI locally pre-saved RES (i) is calculated in A3 algorithms.Then, terminal is based on RES (i) generation subscription authentication response concurrents and gives MSC.Finally, MSC By RES (i) compared with SRES (i), this time authenticated successfully if RES (i) is equal with SRES (i), if unequal this time Failed authentication.
Alternatively, when still being failed based on the progress network insertion processing of the second network formats, it is possible to which selection is easy Network insertion is carried out in authenticating successful network formats.Correspondingly, the network formats that the second network formats authenticate for needs, its In, it is necessary to authentication the second network formats be 2G beyond network formats;The method that the present embodiment provides also includes:When detecting When carrying out network insertion processing generation failed authentication based on the second network formats, default the 3rd network without authentication is switched to Standard, network insertion processing is carried out based on the 3rd network formats, wherein, the 3rd network formats are 2G.
Wherein, 2G networks need not authenticate using unidirectional authentication scheme, terminal to network side equipment, and due to It is that network side equipment authenticates to terminal, therefore terminal-pair network side equipment will not occur is authenticated just occur Synchronization failure, and then, the unidirectional authentication scheme of 2G networks is easier to so that authenticating compared to the bi-directional authentification scheme of 4G, 3G network Success.
The method provided based on the present embodiment, after authenticating successfully, can carry out the search of the network signal of cell base station Operation, can carry out the operation of network selection after available network signal is searched, and then it is high to choose stable and signal intensity Network signal carry out staying net.After success in net, terminal can is normally carried out communication.
The method provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from And the network insertion stand-by period can be shortened.
Disclosure further example embodiment provides the device in net after a kind of failed authentication, as shown in figure 3, the device Including:
Determining module 310, for during network insertion processing is carried out based on first network standard, when detecting use Family identification cacaine failed authentication and enter disarmed state when, determine terminal support in addition to the first network standard Second network formats.
First handover module 320, for switching to second network formats, net is carried out based on second network formats Network access is handled.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network Standard is any of following network formats:5G、4G、3G、2G.
Alternatively, as shown in figure 4, the determining module 310 includes:
First determining unit 411, the highest level net in addition to the first network standard supported for determining terminal Network standard;
Second determining unit 412, for the highest level network formats to be defined as into the second network formats.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, as shown in figure 5, stating the first handover module 320 includes:
Transmitting element 511, asked for sending network insertion to base station corresponding with second network formats;
Receiving unit 512, the authentication information returned for receiving base station based on network insertion request;
Authenticating unit 513, under second network formats, authentication operations to be carried out based on the authentication information.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication Formula is the network formats beyond 2G;
As shown in fig. 6, described device also includes:
Second handover module, detect that carrying out network insertion processing based on second network formats authenticates for working as During failure, default the 3rd network formats without authentication are switched to, are carried out based on the 3rd network formats at network insertion Reason, wherein, the 3rd network formats are 2G.
The device provided by the embodiment of the present disclosure is invalid when detecting subscriber identification card because of failed authentication and entering During state, the operation that first network standard is switched to the second network formats can be automatically initiated, and be based on the second network formats Network insertion processing is carried out, so, network insertion is reattempted to after network formats switching, because the network of different network formats Side apparatus is different equipment, thus after terminal handover network standard without waiting for can directly initiate network insertion processing, from And the network insertion stand-by period can be shortened.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
It should be noted that:Above-described embodiment provide failed authentication after device in net in authentication in net, only more than The division progress of each functional module is stated for example, in practical application, can be as needed and by above-mentioned function distribution by difference Functional module complete, i.e., the internal structure of device is divided into different functional modules, with complete it is described above whole or Person's partial function.In addition, the device in net after the failed authentication that above-described embodiment provides and the reality in network method after failed authentication Apply example and belong to same design, its specific implementation process refers to embodiment of the method, repeats no more here.
The another exemplary embodiment of the disclosure shows a kind of structural representation of terminal.The terminal can be mobile phone, put down Plate computer, desktop computer, notebook etc..
Reference picture 7, terminal 700 can include following one or more assemblies:Processing component 702, memory 704, power supply Component 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of input/output (I/O), sensor cluster 714, and Communication component 716.
Processing component 702 generally controls the integrated operation of terminal 700, is such as communicated with display, call, data, phase The operation that machine operates and record operation is associated.Treatment element 702 can refer to including one or more processors 720 to perform Order, to complete all or part of step of above-mentioned method.In addition, processing component 702 can include one or more modules, just Interaction between processing component 702 and other assemblies.For example, processing component 702 can include multi-media module, it is more to facilitate Interaction between media component 708 and processing component 702.
Memory 704 is configured as storing various types of data to support the operation in terminal 700.These data are shown Example includes the instruction of any application program or method for being operated in terminal 700, contact data, telephone book data, disappears Breath, picture, video etc..Memory 704 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Electric power assembly 706 provides electric power for the various assemblies of terminal 700.Electric power assembly 706 can include power management system System, one or more power supplys, and other components associated with generating, managing and distributing electric power for audio output apparatus 700.
Multimedia groupware 708 is included in the screen of one output interface of offer between the terminal 700 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers Body component 708 includes a front camera and/or rear camera.When terminal 700 is in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 710 is configured as output and/or input audio signal.For example, audio-frequency assembly 710 includes a Mike Wind (MIC), when audio output apparatus 700 is in operator scheme, during such as call model, logging mode and speech recognition mode, wheat Gram wind is configured as receiving external audio signal.The audio signal received can be further stored in memory 704 or warp Sent by communication component 716.
I/O interfaces 712 provide interface between processing component 702 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 714 includes one or more sensors, and the state for providing various aspects for terminal 700 is commented Estimate.For example, sensor cluster 714 can detect opening/closed mode of terminal 700, and the relative positioning of component, for example, it is described Component is the display and keypad of terminal 700, and sensor cluster 714 can be with 700 1 components of detection terminal 700 or terminal Position change, the existence or non-existence that user contacts with terminal 700, the orientation of terminal 700 or acceleration/deceleration and terminal 700 Temperature change.Sensor cluster 714 can include proximity transducer, be configured to detect in no any physical contact The presence of neighbouring object.Sensor cluster 714 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 714 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 716 is configured to facilitate the communication of wired or wireless way between terminal 700 and other equipment.Terminal 700 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 716 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 716 also includes near-field communication (NFC) module, to promote junction service.Example Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 700 can be believed by one or more application specific integrated circuits (ASIC), numeral Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of computer-readable recording medium including instructing is additionally provided, such as including referring to The memory 704 of order, above-mentioned instruction can be performed to complete the above method by the processor 720 of terminal 700.For example, the calculating Machine readable storage medium storing program for executing can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices Deng.
The another embodiment of the disclosure provides a kind of computer-readable recording medium, the instruction in the storage medium By terminal computing device when so that terminal is able to carry out:
Based on first network standard carry out network insertion processing during, when detect subscriber identification card because mirror When power fails and enters disarmed state, the second network formats in addition to the first network standard that terminal is supported are determined;
Second network formats are switched to, network insertion processing is carried out based on second network formats.
Alternatively, the first network standard is any of following network formats:5G、4G、3G;Second network Standard is any of following network formats:5G、4G、3G、2G.
Optionally it is determined that the second network formats in addition to the first network standard that terminal is supported, including:
Determine the highest level network formats in addition to the first network standard that terminal is supported;
The highest level network formats are defined as the second network formats.
Alternatively, network formats by it is advanced to it is rudimentary be 5G, 4G, 3G, 2G successively.
Alternatively, network insertion processing is carried out based on second network formats, including:
Network insertion is sent to ask to base station corresponding with second network formats;
Receive the authentication information that base station is returned based on network insertion request;
Under second network formats, authentication operations are carried out based on the authentication information.
Alternatively, second network formats is need the network formats authenticated, wherein it is desired to the second network system of authentication Formula is the network formats beyond 2G;
Methods described also includes:
When detecting that carrying out network insertion processing based on second network formats occurs failed authentication, switch to default Without authentication the 3rd network formats, based on the 3rd network formats carry out network insertion processing, wherein, the 3rd net Network standard is 2G.
Those skilled in the art will readily occur to the disclosure its after considering specification and putting into practice disclosure disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledges in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (14)

1. stay network method after a kind of failed authentication, it is characterised in that methods described includes:
Based on first network standard carry out network insertion processing during, when detect subscriber identification card because authentication lose When losing and entering disarmed state, the second network formats in addition to the first network standard that terminal is supported are determined;
Second network formats are switched to, network insertion processing is carried out based on second network formats.
2. according to the method for claim 1, it is characterised in that the first network standard is appointing in following network formats It is a kind of:5G、4G、3G;Second network formats are any of following network formats:5G、4G、3G、2G.
3. according to the method for claim 2, it is characterised in that determine terminal support in addition to the first network standard The second network formats, including:
Determine the highest level network formats in addition to the first network standard that terminal is supported;
The highest level network formats are defined as the second network formats.
4. according to the method for claim 3, it is characterised in that network formats by it is advanced to it is rudimentary be successively 5G, 4G, 3G, 2G。
5. according to the method for claim 1, it is characterised in that carried out based on second network formats at network insertion Reason, including:
Network insertion is sent to ask to base station corresponding with second network formats;
Receive the authentication information that base station is returned based on network insertion request;
Under second network formats, authentication operations are carried out based on the authentication information.
6. according to the method any one of claim 1-5, it is characterised in that second network formats are to need to authenticate Network formats, wherein it is desired to authentication the second network formats be 2G beyond network formats;
Methods described also includes:
When detecting that carrying out network insertion processing based on second network formats occurs failed authentication, default nothing is switched to The 3rd network formats that need to be authenticated, network insertion processing is carried out based on the 3rd network formats, wherein, the 3rd network system Formula is 2G.
7. the device in net after a kind of failed authentication, it is characterised in that described device includes:
Determining module, for during network insertion processing is carried out based on first network standard, when detecting user identity When identification card enters disarmed state because of failed authentication, the second net in addition to the first network standard that terminal is supported is determined Network standard;
First handover module, for switching to second network formats, network insertion is carried out based on second network formats Processing.
8. device according to claim 7, it is characterised in that the first network standard is appointing in following network formats It is a kind of:5G、4G、3G;Second network formats are any of following network formats:5G、4G、3G、2G.
9. device according to claim 8, it is characterised in that the determining module includes:
First determining unit, the highest level network formats in addition to the first network standard supported for determining terminal;
Second determining unit, for the highest level network formats to be defined as into the second network formats.
10. device according to claim 9, it is characterised in that network formats by it is advanced to it is rudimentary be successively 5G, 4G, 3G, 2G。
11. device according to claim 7, it is characterised in that first handover module includes:
Transmitting element, asked for sending network insertion to base station corresponding with second network formats;
Receiving unit, the authentication information returned for receiving base station based on network insertion request;
Authenticating unit, under second network formats, authentication operations to be carried out based on the authentication information.
12. according to the device any one of claim 7-11, it is characterised in that second network formats are to need to reflect The network formats of power, wherein it is desired to which the second network formats of authentication are the network formats beyond 2G;
Described device also includes:
Second handover module, detect that carrying out network insertion processing based on second network formats occurs failed authentication for working as When, default the 3rd network formats without authentication are switched to, network insertion processing is carried out based on the 3rd network formats, its In, the 3rd network formats are 2G.
13. a kind of terminal, it is characterised in that the terminal includes processor and memory, is stored with least in the memory One instruction, at least one section of program, code set or instruction set, at least one instruction, at least one section of program, the generation Code collection or instruction set are loaded by the processor and performed to realize staying after the failed authentication as described in claim 1-6 is any Network method.
14. a kind of computer-readable recording medium, it is characterised in that at least one instruction, extremely is stored with the storage medium Few one section of program, code set or instruction set, at least one instruction, at least one section of program, the code set or the instruction Collection is loaded by processor and performed stays network method to realize after the failed authentication as described in claim 1-6 is any.
CN201710669740.8A 2017-08-08 2017-08-08 Network residing method and device after authentication failure Active CN107454660B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710669740.8A CN107454660B (en) 2017-08-08 2017-08-08 Network residing method and device after authentication failure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710669740.8A CN107454660B (en) 2017-08-08 2017-08-08 Network residing method and device after authentication failure

Publications (2)

Publication Number Publication Date
CN107454660A true CN107454660A (en) 2017-12-08
CN107454660B CN107454660B (en) 2021-03-16

Family

ID=60489553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710669740.8A Active CN107454660B (en) 2017-08-08 2017-08-08 Network residing method and device after authentication failure

Country Status (1)

Country Link
CN (1) CN107454660B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108495300A (en) * 2018-03-07 2018-09-04 龙尚科技(上海)有限公司 Mobile network's mode switching method, device, terminal and storage medium
CN108566661A (en) * 2018-04-12 2018-09-21 宇龙计算机通信科技(深圳)有限公司 A kind of access control method, device and mobile terminal
WO2019196012A1 (en) * 2018-04-10 2019-10-17 Zte Corporation Single radio voice call continuity for 5g wireless networks
CN112738794A (en) * 2021-01-07 2021-04-30 展讯半导体(成都)有限公司 Network residing method, chip, mobile terminal and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101541062A (en) * 2009-03-06 2009-09-23 华为技术有限公司 Roaming network access method and equipment
CN101959190A (en) * 2009-07-13 2011-01-26 华为技术有限公司 Method, device and system for controlling access subdistrict
CN102264058A (en) * 2010-05-27 2011-11-30 ***通信集团河南有限公司 Subscriber identity card control method, device and system
CN102857910A (en) * 2012-06-01 2013-01-02 王鑫 Wireless communication system based on a plurality of types of wireless networks
CN103327514A (en) * 2012-03-19 2013-09-25 华为技术有限公司 Information recording method, information acquisition method, equipment and system
CN103428793A (en) * 2012-05-14 2013-12-04 中兴通讯股份有限公司 Intersystem switching processing method, switching method and switching device
CN104333856A (en) * 2014-11-08 2015-02-04 北京握奇数据***有限公司 Method for switching network of Java SIM card, SIM card, server and system
CN105046132A (en) * 2015-07-20 2015-11-11 深圳上高医疗电子科技有限公司 Method for selecting mobile network or card and mobile terminal
CN105554697A (en) * 2015-09-29 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Network access method and terminal
CN105939525A (en) * 2016-06-22 2016-09-14 努比亚技术有限公司 Mobile terminal and cell reselection control method
CN106028331A (en) * 2016-07-11 2016-10-12 华为技术有限公司 Pseudo base station identifying method and device
CN106210042A (en) * 2016-07-11 2016-12-07 清华大学 A kind of user based on end to end network section services request selection method
EP3139665A1 (en) * 2004-08-09 2017-03-08 BlackBerry Limited Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
US20170094512A1 (en) * 2015-09-30 2017-03-30 Apple Inc. Authentication failure handling for access to services through untrusted wireless networks
CN106899966A (en) * 2017-03-25 2017-06-27 努比亚技术有限公司 network mode automatic selecting method and device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3139665A1 (en) * 2004-08-09 2017-03-08 BlackBerry Limited Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
CN101541062A (en) * 2009-03-06 2009-09-23 华为技术有限公司 Roaming network access method and equipment
CN101959190A (en) * 2009-07-13 2011-01-26 华为技术有限公司 Method, device and system for controlling access subdistrict
CN102264058A (en) * 2010-05-27 2011-11-30 ***通信集团河南有限公司 Subscriber identity card control method, device and system
CN103327514A (en) * 2012-03-19 2013-09-25 华为技术有限公司 Information recording method, information acquisition method, equipment and system
CN103428793A (en) * 2012-05-14 2013-12-04 中兴通讯股份有限公司 Intersystem switching processing method, switching method and switching device
CN102857910A (en) * 2012-06-01 2013-01-02 王鑫 Wireless communication system based on a plurality of types of wireless networks
CN104333856A (en) * 2014-11-08 2015-02-04 北京握奇数据***有限公司 Method for switching network of Java SIM card, SIM card, server and system
CN105046132A (en) * 2015-07-20 2015-11-11 深圳上高医疗电子科技有限公司 Method for selecting mobile network or card and mobile terminal
CN105554697A (en) * 2015-09-29 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Network access method and terminal
US20170094512A1 (en) * 2015-09-30 2017-03-30 Apple Inc. Authentication failure handling for access to services through untrusted wireless networks
CN105939525A (en) * 2016-06-22 2016-09-14 努比亚技术有限公司 Mobile terminal and cell reselection control method
CN106028331A (en) * 2016-07-11 2016-10-12 华为技术有限公司 Pseudo base station identifying method and device
CN106210042A (en) * 2016-07-11 2016-12-07 清华大学 A kind of user based on end to end network section services request selection method
CN106899966A (en) * 2017-03-25 2017-06-27 努比亚技术有限公司 network mode automatic selecting method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ALCATEL-LUCENT, ALCATEL-LUCENT SHANGHAI BELL, AT&T, VERIZON: "Authentication Signalling Improvement with Backoff Timer for SCM", 《3GPP TSG-CT WG1 MEETING #95BIS C1-160127》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108495300A (en) * 2018-03-07 2018-09-04 龙尚科技(上海)有限公司 Mobile network's mode switching method, device, terminal and storage medium
WO2019196012A1 (en) * 2018-04-10 2019-10-17 Zte Corporation Single radio voice call continuity for 5g wireless networks
CN108566661A (en) * 2018-04-12 2018-09-21 宇龙计算机通信科技(深圳)有限公司 A kind of access control method, device and mobile terminal
CN112738794A (en) * 2021-01-07 2021-04-30 展讯半导体(成都)有限公司 Network residing method, chip, mobile terminal and storage medium
CN112738794B (en) * 2021-01-07 2022-09-27 展讯半导体(成都)有限公司 Network residing method, chip, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN107454660B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
EP2975821B1 (en) Network connection method and apparatus
US20160381629A1 (en) Virtual sim card for accessing operator network
EP3068154A1 (en) Method and apparatus for setting smart device management account
CN105517103A (en) Network access method and device based on intelligent terminal device
CN109451817B (en) Unmanned aerial vehicle access method and device
CN105656948A (en) Account login method and device
CN104507034B (en) Equipment connection method, device and terminal device
CN104079565A (en) Authorization method and device
CN108288154B (en) Starting method and device of payment application program and mobile terminal
CN105357742A (en) Accessing method, device and system for wireless local area network
CN104933351A (en) Information security processing method and information security processing device
CN107454660A (en) Network method and device are stayed after failed authentication
EP3200421A1 (en) Method, apparatus and system for accessing wireless local area network
CN104159218A (en) Network connection establishment method and device
CN105678549A (en) Payment method and device
CN105631254B (en) Unlocking method and tripper
US20180146363A1 (en) Identity verification method and apparatus, and storage medium
EP3407278A1 (en) Method and apparatus for reporting loss of card or device associated with account number or stolen of account number
CN105120505A (en) Method, apparatus and system for making intelligent equipment accessed to router
US20180146420A1 (en) Method and apparatus for establishing network connection
CN107404723A (en) A kind of method and apparatus of access base station
EP3086582B1 (en) Method, devices and system for transmitting sim card information
CN105681261A (en) Security authentication method and apparatus
CN104837133A (en) SIM card authentication method and device
CN113407427A (en) Verification information processing method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant