CN113079514B - Network access verification method and device and computer readable storage medium - Google Patents

Network access verification method and device and computer readable storage medium Download PDF

Info

Publication number
CN113079514B
CN113079514B CN202110313123.0A CN202110313123A CN113079514B CN 113079514 B CN113079514 B CN 113079514B CN 202110313123 A CN202110313123 A CN 202110313123A CN 113079514 B CN113079514 B CN 113079514B
Authority
CN
China
Prior art keywords
information
user identification
plmn
user
plmns
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110313123.0A
Other languages
Chinese (zh)
Other versions
CN113079514A (en
Inventor
邓毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202110313123.0A priority Critical patent/CN113079514B/en
Publication of CN113079514A publication Critical patent/CN113079514A/en
Application granted granted Critical
Publication of CN113079514B publication Critical patent/CN113079514B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a network access verification method, a network access verification device and a computer readable storage medium, wherein the network access verification method can comprise the following steps: acquiring information of a first Public Land Mobile Network (PLMN) from a first user identification card; determining first information according to information of a first PLMN and APN check information, wherein the APN check information is preset check information, and the first information comprises a first user name and a first password; transmitting first information to a network device; a first check result is received from the network device. The embodiment of the application can improve the network access experience of the user.

Description

Network access verification method and device and computer readable storage medium
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a network access verification method, a network access verification device and a computer readable medium.
Background
With the development of the internet, the number of terminal devices is increasing, and convenience and intelligent design of the terminal devices are a non-negligible part.
The terminal device needs to register the network when accessing the data network, and some operators need to check before registering the network. Currently, a part of terminal equipment systems cannot complete acquisition of verification information, and a user is required to manually input the verification information into the terminal equipment to complete network registration. Therefore, the terminal equipment has complex operation during network access and poor user experience.
Disclosure of Invention
The embodiment of the application discloses a network access verification method, a network access verification device and a computer readable storage medium, which are used for improving network access experience of users.
The first aspect discloses a network access verification method, which comprises the following steps: obtaining information of a first public land mobile network (public land mobile network, PLMN) from a first subscriber identity card; determining first information according to the information of the first PLMN and access point name (access point name, APN) verification information, wherein the APN verification information is preset verification information, and the first information comprises a first user name and a first password; transmitting the first information to a network device; a first check result from the network device is received.
In the embodiment of the application, the information of the first PLMN can be acquired from the current user identification card of the terminal equipment, then the first information can be determined according to the information of the first PLMN and the preset APN verification information, and then the first information can be sent to the network equipment, so that the network equipment can use the information for verification, the user does not need to manually input the information for verification, the operation of the user is reduced, and the user experience can be improved.
As a possible implementation manner, the APN verification information includes information of PLMNs corresponding to the N subscriber identity cards, a user name (username) and a secret key (password), N is an integer greater than or equal to 1, and determining the first information according to the information of the first PLMN and the APN verification information includes: judging whether PLMNs corresponding to the N user identification cards exist the same as the first PLMN according to the information of the first PLMN and the information of PLMNs corresponding to the N user identification cards; when PLMNs corresponding to the N user identification cards are the same as the first PLMN, determining first information according to APN check information of a target user identification card, wherein the target user identification card is a user identification card of which the PLMN corresponding to the N user identification cards is the same as the first PLMN.
In the embodiment of the application, before the first information is sent to the network equipment, whether the information of the PLMN corresponding to the N user identification cards has the first information of the same PLMN as the information of the first PLMN can be judged, and the determined first information is the first information effective to the network equipment can be ensured, so that the probability of passing the inspection can be improved, the user is prevented from inputting again, and the use experience of the user can be improved.
As a possible implementation manner, the method further comprises: outputting first prompt information for prompting a user to input information when PLMNs which correspond to the N user identification cards do not exist in the PLMNs which are the same as the first PLMNs; receiving second information input by a user aiming at the first prompt information, wherein the second information comprises a second user name and a second password; transmitting the second information to the network device; a second check result is received from the network device.
In the embodiment of the present application, when no information of the PLMN of the current network device exists in the APN verification information of the N user identification cards, the APN verification information of the current N user identification cards may have a variation. The user may be reserved with an input channel so that the second information may be determined by the information input by the user and verification is completed. An input channel is provided for a user, so that on one hand, the probability of being unable to access the network due to the fact that the first information cannot be acquired can be reduced, and on the other hand, the input channel can be used as a supplementary scheme for automatically acquiring the verification information (the first information), and therefore the scheme of the whole access verification can be optimized.
As a possible implementation manner, the method further comprises: and when the first check result is passing the check, establishing communication connection with the network equipment.
In the embodiment of the application, when the verification is passed, the network device can be further connected with the network device, so that the aim of network access can be achieved.
As a possible implementation manner, the method further comprises: outputting second prompt information for prompting a user to input information when the first verification result is that the verification is not passed; receiving third information input by a user aiming at the second prompt information, wherein the third information is different from the first information and comprises a third user name and a third password; transmitting the third information to the network device; and receiving a third check result from the network equipment.
In the embodiment of the present application, when the received verification result is that the verification is not passed, there may be a case where the PLMN of the target subscriber identity card is the same as the first PLMN, but the first information is not a legal subscriber of the operator of the accessed PLMN. For example, it may be that the virtual operator (virtual network operator, VNO) uses the same PLMN as other operators, resulting in a situation where the correct first information cannot be distinguished. In order to solve the problem that the user cannot access the network due to the above situation, an input channel can be reserved for the user, and the probability of successful access verification can be improved, so that the access experience of the user is improved.
As a possible implementation manner, the APN verification information of the subscriber identity card further includes an authentication type (authentication type) corresponding to the subscriber identity card, the first information further includes a first authentication type, the second information further includes a second authentication type, and the third information further includes a third authentication type.
In the embodiment of the application, the APN verification information (the first information, the second information and the third information) can not only comprise a user name and a password, but also comprise an authentication type. By further defining the verification information, the integrity of the scheme may be improved.
As a possible implementation manner, the method further comprises: and acquiring APN verification information of the N user identification cards from terminal equipment, wherein the terminal equipment is provided with the first application.
A second aspect discloses a network entry verification device, which may include:
an acquiring unit, configured to acquire information of a first public land mobile network PLMN from a first subscriber identity card;
the determining unit is used for determining first information according to the information of the first PLMN and APN check information, wherein the APN check information is preset check information, and the first information comprises a first user name and a first password;
a sending unit, configured to send the first information to a network device;
and the receiving unit is used for receiving the first check result from the network equipment.
As a possible implementation manner, the APN verification information includes information of PLMNs corresponding to the N subscriber identity cards, a user name, and a key, N is an integer greater than or equal to 1, and the determining unit is specifically configured to:
judging whether PLMNs corresponding to the N user identification cards exist the same as the first PLMN according to the information of the first PLMN and the information of PLMNs corresponding to the N user identification cards;
when PLMNs corresponding to the N user identification cards are the same as the first PLMN, determining first information according to APN check information of a target user identification card, wherein the target user identification card is a user identification card of which the PLMN corresponding to the N user identification cards is the same as the first PLMN.
As a possible implementation manner, the device may further include:
the first output unit is used for outputting first prompt information for prompting a user to input information when PLMNs which are corresponding to the N user identification cards do not exist in the PLMNs which are the same as the first PLMNs;
the first input unit is used for receiving second information input by a user aiming at the first prompt information, and the second information comprises a second user name and a second password;
the sending unit is further configured to send the second information to the network device;
the receiving unit is further configured to receive a second check result from the network device.
As a possible implementation manner, the device may further include:
and the establishing unit is used for establishing communication connection with the network equipment when the first check result is passing the check.
As a possible implementation manner, the device may further include:
the second output unit is used for outputting second prompt information for prompting a user to input information when the first verification result is that the verification is not passed;
the second input unit is used for receiving third information input by a user aiming at the second prompt information, the third information is different from the first information, and the third information comprises a third user name and a third password;
the sending unit is further configured to send the third information to the network device;
the receiving unit is further configured to receive a third check result from the network device.
As a possible implementation manner, the APN verification information of the subscriber identity card further includes an authentication type corresponding to the subscriber identity card, the first information further includes a first authentication type, the second information further includes a second authentication type, and the third information further includes a third authentication type.
As a possible implementation manner, the obtaining unit is further configured to obtain APN verification information of the N user identification cards from a terminal device, where the terminal device is the terminal device with the first application installed.
The beneficial effects of the second aspect may refer to the description of the beneficial effects corresponding to the first aspect, which is not repeated here.
A third aspect discloses a terminal device, which may comprise: the device comprises a processor, a memory, an input interface and an output interface, wherein the input interface is used for receiving information from other devices except the device, the output interface is used for outputting information to other devices except the device, and when the processor executes a computer program stored in the memory, the processor is caused to execute the network access verification method disclosed in the first aspect or any implementation mode of the first aspect.
A fourth aspect discloses a computer readable storage medium having stored therein a computer program or computer instructions which, when executed, implement a network entry verification method as disclosed in the first aspect or any implementation of the first aspect.
A fifth aspect discloses a computer program product comprising computer program code which, when run, causes the above-described method to be performed.
Drawings
FIG. 1 is a schematic diagram of a network architecture according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a network access verification method disclosed in the embodiment of the application;
FIG. 3 is a schematic flow chart of another network entry verification method disclosed in the embodiment of the application;
fig. 4 is a schematic structural diagram of a network access verification device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The embodiment of the application discloses a network access verification method, a network access verification device and a computer readable storage medium, which are used for improving network access experience of users. The following is a detailed description.
In order to facilitate understanding of the network access verification method, the network access verification device and the computer readable storage medium disclosed in the embodiments of the present application, a network architecture used in the embodiments of the present application is described below. Referring to fig. 1, fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present application. As shown in fig. 1 (a), the network architecture may include a terminal device 110 and a network device 120, and communication may be performed between the terminal device 110 and the network device 120. As shown in (b) of fig. 1, the terminal device 110 may include a first application 111, the first application 111 may acquire information of the terminal device 110, and the terminal device 110 may also execute an instruction or command of the first application 111.
A terminal device, which may also be referred to as a User Equipment (UE), is a device that provides voice and/or data connectivity to a user, such as an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, etc. The terminal device may be a cellular telephone, a cordless telephone, a session initiation protocol (session initiation protocol, SIP) phone, a wireless local loop (wireless local loop, WLL) station, a personal digital assistant (personal digital assistant, PDA) device, a personal computer, a desktop computer, a server, a tablet, a handheld device with wireless communication capabilities, a smart furniture, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, or a device of a next generation communication system, e.g. a terminal device in a 5G network or a terminal device in a future evolved PLMN network, or a terminal device in an NR communication system, etc.
The network device is an entity on the network side for transmitting and receiving signals, and may be a device for communicating with the terminal device, and is mainly responsible for radio resource management, quality of service (quality of service, qoS) flow management, data compression, encryption, and other functions on the air interface side. The network devices may include various forms of base stations, such as: macro base stations, micro base stations (also referred to as small stations), relay stations, access points, and the like. The network device may also include a wireless internet (wireless fidelity, wiFi) access node (AP). The network device may also include a worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMax) Base Station (BS).
The first application is a collection of programs designed to solve a specific problem with the terminal device. The first application may be available to a user.
In order to better understand the embodiments of the present application, the related art of the embodiments of the present application will be described first.
The access point name (access point name, APN) is a parameter that the terminal device must configure to access the network device, which determines the access mode by which the terminal device can access the network. In general, the APN parameter of the terminal device is already configured according to a specific carrier, the configuration file of the APN is already stored in the application processor of the terminal in advance, and the terminal device can be directly used.
A PLMN is a network that can provide land mobile services to the public. The user identification card binds with the APN of the operator, namely, a corresponding relation between PLMN and the APN of the operator is established and stored in the terminal, so that after the user inserts the user identification card into the terminal, the terminal can identify the PLMN, then determine the APN corresponding to the PLMN from the stored corresponding relation between the PLMN and the APN of the operator, and complete the access of the corresponding operator network through the APN. PLMNs of multiple operators may be distinguished by mobile country code (mobile country code, MCC) and mobile network code (mobile network code, MNC). Wherein the resources of the MCC are uniformly distributed and managed by the International Union of electric Union (international telecommunication union, ITU), and the resources uniquely identify the country to which the mobile user belongs, for example, china is 460. Each PLMN is assigned a unique MNC, 2 or 3 digits in total, for example, chinese mobile TD system using 00, chinese mobile GSM system using 01, chinese mobile GSM system using 02, chinese telecommunications CDMA system using 03.
A virtual carrier refers to a new type of telecommunications carrier that relies on leasing the communication resources of a traditional telecommunications carrier to conduct telecommunications traffic.
After the APN configuration is completed, the terminal device needs to register the network so as to access the network. The flow of access to the network is not the same for each operator. The network of a part of operators has compatibility, and network access operation of the terminal equipment can be better supported by optimizing parameters and network access flows. Another part of operators (such as operators in japan and europe) needs to check APN information before registering the network, however, there are some systems (for example, a you ban map system (Ubuntu operating system, ubuntu OS) and the like) that need to configure the checking process of the network through a user Attention (AT) instruction or an mbim instruction and the like, and this configuration process is complex. Therefore, how to adaptively check before registering a network is a problem to be solved.
Referring to fig. 2, fig. 2 is a schematic flow chart of a network access verification method according to an embodiment of the application. Wherein the method may be applied to a first application. The first application may be installed on a terminal device, which may be any terminal device having communication capabilities, processing functions and storage capabilities, and the network entry verification method may comprise the steps of:
201. information of a first PLMN is obtained from a first subscriber identity card.
The first application may obtain information of the first PLMN from a first user equipment card installed by the terminal equipment. The information of the first PLMN may include a mobile country code and a mobile network code, and the information of the first PLMN may distinguish different operators in different countries.
The terminal device may detect whether a valid network access event is received from the network device, and when a valid network access event occurs, the first application may obtain information from the first PLMN of the first user equipment card. For example, the first application may send a CIMI AT command to a communication module of the terminal device through a modem (modem), and when the communication module of the terminal device receives the CIMI AT command from the modem, the first application may send information about a PLMN corresponding to a subscriber identity card currently used, that is, information about the first PLMN. The first subscriber identity card may be a subscriber identity card used by the current terminal device.
202. And determining the first information according to the information of the first PLMN and the APN verification information.
After the first application obtains the information of the first PLMN and the APN verification information, it may determine, according to the information of the first PLMN and the information of PLMNs corresponding to the N subscriber identity cards, whether PLMNs corresponding to the N subscriber identity cards exist in the same PLMN as the first PLMN. After the first application obtains the information of the first PLMN and the APN verification information of the N subscriber identity cards, it may be determined whether information identical to the information of the first PLMN exists in the information of PLMNs corresponding to the N subscriber identity cards. The APN verification information of the subscriber identity card may include information of a PLMN corresponding to the subscriber identity card, a user name and a key, and the APN verification information of the subscriber identity card may further include an authentication type. The authentication type refers to an authentication type in which the network device verifies the identity of the user during the network access verification process. Further, N is an integer greater than or equal to 1. The subscriber identity card may be a subscriber identity module (subscriber identification module, SIM) card. Of course, the APN check information of the subscriber identity card may further include information such as a network protocol type (IPType), a source address (source), an access string (APN), and the like.
The first application may obtain APN check information for N subscriber identity cards. The APN check information may be information of N subscriber identity cards preset or stored in advance. For example, when N is 2, the first application is already preset with information of 2 PLMNs, 2 usernames and 2 passwords, where the information of one PLMN, 1 username and 1 password correspond to APN verification information of one subscriber identity card. The first application can preset or store APN verification information of N user identification cards in the form of a file, and the stored file can be in an XML format, a txt format or a format which can be read and written by other terminal equipment.
When the PLMNs corresponding to the N subscriber identity cards are the same as the first PLMN, the first application may determine the first information according to APN check information of the target subscriber identity card. The first information may include a first user name and a first password. The target subscriber identity card may be one of the N subscriber identity cards, the corresponding PLMN being identical to the first PLMN. When there is information of the same PLMN, the first application may further determine whether the number of PLMNs in the N subscriber identity cards that are identical to the number of information of the first PLMN is greater than 1. When the number is 1, the user identification card corresponding to the information of the PLMN can be selected as the target user identification card, and the first information can be acquired according to the APN verification information of the target user identification card. In this case, the first application may use the user name and password of the APN verification information of the target user identification card as the first information, that is, it may be understood that the user name of the APN verification information of the target user identification card is determined as the first user name, and the password of the APN verification information of the target user identification card is determined as the first password. In another case, the APN check information of the target user identification card may include a user name, a key, and an authentication type, and the first application may determine the user name, the key, and the authentication type of the APN check information of the target user identification card as the first information. Wherein the first information may include a first user name, a first key, and a first authentication type. When the number is greater than 1, the first application may further determine the priority levels of the plurality of subscriber identity cards corresponding to the plurality of same PLMNs, and select the subscriber identity card with the highest priority as the target subscriber identity card. Where the priority is indicated by a number, it may be indicated by other means as well. For example, a larger value may indicate a higher priority, or a smaller value may indicate a higher priority. Further, the first application may determine the first information, and the detailed description may refer to the above description, which is not repeated herein.
When the PLMNs corresponding to the N subscriber identity cards do not exist, the first application may output first prompting information for prompting the user to input information. The first prompt information may be used to prompt the user to input a user name and a password, and may also be used to prompt the user to input a user name, a password, and an authentication type. The user can input information correspondingly according to the first prompt information. For example, when the user sees that a user name and password are currently required to be input, the SIM card being used (i.e., the first subscriber identification card) can be found and the user name and password on the SIM are input to the corresponding location. When the first application detects information input for the first hint information, the input information may be determined as the second information. The first application may determine the input user name and password as the second information, i.e., may determine the input user name as the second key and the input password as the second password; the first application may also determine the input user name, password, and authentication type as the second information, i.e., the input user name as the second key, the input password as the second password, and the input authentication type as the second authentication type. After the first application determines the second information, the second information may be sent to the network device. Specifically, the first application may send the second information to the communication module of the terminal device through the AT port, and then the communication module of the terminal device may send the second information to the network device. The first application may then receive a second check result from the network device. The second check result is a check result for the second information. After the first application receives the second check result, it may be able to parse whether the second check result passes. When the second check result indicates that the check is passed, the terminal device may further start the flow of registering the network. For example, the terminal device may dial-up networking. When the second checking result indicates that the checking is not passed, the first application can output third prompting information, and the third prompting information can prompt the user that the checking is not passed.
When the first application receives the second information, the second information may be stored in the APN check information of the user identification card. The first prompt output by the first application may also include, as possible, information of the operator type (or information indicative of the operator type) for prompting the user identification card, from which the user may input the operator type (or information indicative of the operator type), for example, chinese mobile (or 46000). The first application may determine information of the PLMN in the APN check information of the subscriber identity card based on the information entered for the hint information. The first application may then store information identifying the PLMN in the APN check information of the subscriber identity card, and second information entered by the user, in the APN check information of the subscriber identity card. Under the condition, when a user uses a new user identification card, the stored APN verification information of the user identification card can be updated only by inputting the APN verification information of the user identification card once, repeated input is not needed, and an information input channel can be provided for the user, so that the network access experience of the user can be improved.
203. The first information is sent to the network device.
After the first application obtains the first information, the first information may be sent to the terminal device through the AT port. After receiving the first information, the terminal device may send the first information to the network device.
204. A first check result is received from the network device.
The first application may receive first verification information from the network device. The first check result may be a check result of the network device for the first information. Specifically, after the network device receives the first information from the terminal device, the network device may perform, according to the first information, a verification result for the first information, that is, a first verification result. The network device may then send the first verification result to the terminal device. The terminal device may receive the first check result from the network device, and after the terminal device obtains the first check result, may send the first check result to the first application. The first application may receive first verification information from the terminal device.
After the first application receives the first check result, it can analyze whether the first check result is passing or not. And when the first verification result is that the verification is passed, establishing communication connection with the network equipment, namely, the terminal equipment can start an internet injection flow, for example, the terminal equipment can dial up and internet surfing.
When the first verification result is that the verification is not passed, the first application can output second prompt information for prompting the user to input information. The second prompt information may be used to prompt the user to enter a user name and a password, or may be used to prompt the user to enter a user name, a password, and an authentication type. The user can input information correspondingly according to the second prompt information. For example, when the user sees that a user name and password are currently required to be input, the SIM card in use can be found and the user name and password on the SIM are input to the corresponding location. The first application may then receive third information entered by the user for the second prompt. The third information may be different from the first information, and may include a third user name and a third password, and the third information may also include a third user name, a third password, and a third authentication type. The detailed description of determining the third information may refer to the description of determining the second information in step 202, which is not described herein.
After the first application determines the third information, the third information may be sent to the network device. The third verification result from the network device may then be further received. The third verification result may be a result of the network device verifying the third information. For the detailed description, reference may be made to the above description of transmitting the second information and receiving the second check result. It should be understood that, after the verification of the first verification result fails, an input channel may be reserved for the user, so that the user may input the APN verification information of the currently used user identification card. At this time, there may be a case where the information of PLMNs corresponding to the plurality of subscriber identity cards is the same as the information of the first PLMN, but there may still be a case where the user name and the password of the first information are not legal subscribers to which the network device belongs. For example, when the information of the PLMN of the virtual operator existing with the operator of the currently accessed network device (the virtual operator and the operator of the currently accessed network device are not the same operator) may be the same information, the network device may determine that the verification is not passed if the user needs to access the network of the virtual operator, but the first information is sent to the operator of the currently accessed network device. In order to avoid the above situation, the first application may be a channel for providing information input by a user, where the information of the PLMN of the subscriber identity card corresponding to the third information is not the same as the information of the first PLMN, and may be sent to the network device, so as to obtain the verification result. Therefore, the probability of success of verification before network access can be improved, and network access experience of users can be improved.
When the first application receives the third check result, whether the third check result passes or not can be analyzed, and when the third check result passes, the terminal equipment can start the network injection flow. When the third verification result is that the user fails to pass, the first application can output fourth prompt information, and the fourth prompt information can prompt the user to verify that the user fails to pass.
Referring to fig. 3, fig. 3 is a flow chart of another network access verification method according to an embodiment of the application. Wherein the method may be applied to a first application. The first application may be installed on the terminal device. As shown in fig. 3, the network entry verification method may include the following steps.
301. The method comprises the steps that a first application obtains information of a first PLMN;
the detailed description of step 301 may refer to the related description of step 201, which is not described herein.
302. Judging whether PLMNs corresponding to the N user identification cards exist the same as the first PLMN or not according to the information of the first PLMN and the information of PLMNs corresponding to the N user identification cards.
303. When PLMNs corresponding to the N subscriber identity cards are the same as the first PLMN, the first application determines first information according to APN check information of the first subscriber identity card.
304. When PLMNs which are corresponding to the N user identification cards and are the same as the first PLMN do not exist in the PLMNs, the first application outputs first prompt information for prompting the user to input information and receives second information which is input by the user aiming at the first prompt information.
The first application may further send the second information to the network device, after which the second check result from the network device may be received.
The descriptions of steps 302-304 may refer to the descriptions of step 202, and are not described herein.
305. The first application sends first information to the network device.
The detailed description of step 305 may refer to the related description of step 203, which is not described herein.
306. The first application receives a first verification result from the network device.
307. The first application judges whether the first check result is passing check.
308. And when the first verification result is that the verification is passed, the first application establishes communication connection with the network equipment.
309. When the first verification result is that verification fails, the first application outputs second prompt information for prompting the user to input information, and receives third information input by the user aiming at the second prompt information.
The first application may further send third information to the network device, after which a third check result from the network device may be received.
The detailed descriptions of steps 306-309 may refer to the related descriptions of step 204, and are not described herein.
Based on the above network architecture, please refer to fig. 4, fig. 4 is a schematic structural diagram of a network access verification device according to an embodiment of the present application. The apparatus may include an acquisition unit 401, a determination unit 402, a transmission unit 403, a reception unit 404, a setup unit 405, an output unit 406, and an input unit 407. As shown in fig. 4, wherein:
an obtaining unit 401, configured to obtain information of a first public land mobile network PLMN from a first subscriber identity card;
a determining unit 402, configured to determine first information according to information of the first PLMN and APN check information, where the APN check information is preset check information, and the first information includes a first user name and a first password;
a sending unit 403, configured to send the first information to a network device;
a receiving unit 404, configured to receive a first check result from the network device.
As a possible implementation manner, the APN verification information includes information of PLMNs corresponding to the N subscriber identity cards, a user name, and a key, N is an integer greater than or equal to 1, and the determining unit 402 is specifically configured to:
judging whether PLMNs corresponding to the N user identification cards exist the same as the first PLMN according to the information of the first PLMN and the information of PLMNs corresponding to the N user identification cards;
when PLMNs corresponding to the N user identification cards are the same as the first PLMN, determining first information according to APN check information of a target user identification card, wherein the target user identification card is a user identification card of which the PLMN corresponding to the N user identification cards is the same as the first PLMN.
As a possible implementation manner, the device may further include:
an output unit 406, configured to output first prompt information for prompting a user to input information when a PLMN that is the same as the first PLMN does not exist in PLMNs corresponding to the N subscriber identity cards;
an input unit 407, configured to receive second information input by a user for the first prompt information, where the second information includes a second user name and a second password;
the sending unit 403 is further configured to send the second information to the network device;
the receiving unit 404 is further configured to receive a second check result from the network device.
As a possible implementation manner, the device may further include:
and the establishing unit 405 is configured to establish a communication connection with the network device when the first check result is passing the check.
As a possible implementation manner, the output unit 406 is further configured to output second prompt information for prompting the user to input information when the first verification result is that the first verification result fails the verification;
the input unit 407 is further configured to receive third information input by a user for the second prompt information, where the third information is different from the first information, and the third information includes a third user name and a third password;
the sending unit 403 is further configured to send the third information to the network device;
the receiving unit 404 is further configured to receive a third check result from the network device.
As a possible implementation manner, the APN verification information of the subscriber identity card further includes an authentication type corresponding to the subscriber identity card, the first information further includes a first authentication type, the second information further includes a second authentication type, and the third information further includes a third authentication type.
As a possible implementation manner, the obtaining unit 401 is further configured to obtain APN verification information of the N subscriber identity cards from a terminal device, where the terminal device is the terminal device with the first application installed.
The more detailed descriptions of the acquisition unit 401, the determination unit 402, the transmission unit 403, the reception unit 404, the establishment unit 405, the output unit 406, and the input unit 407 described above may be directly obtained by referring to the related descriptions of the first application in the method embodiments shown in fig. 2 and 3 described above, and are not repeated herein.
Based on the above network architecture, please refer to fig. 5, fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 5, the terminal device may include a processor 501, a memory 502, an input interface 503, an output interface 504, a bus 505, an input means 506, and an output means 507. The memory 502 may be self-contained and may be coupled to the processor 501 via the bus 505. Memory 502 may also be integrated with processor 501. The input device 506 may input information through a display module of the terminal device, and the output device 507 may output information through a display module of the terminal device. Bus 505 is used to implement the connections between these components, among other things.
When the computer program instructions stored in the memory 502 are executed, the processor 501 is configured to control the receiving unit 404 and the transmitting unit 403 to perform the operations performed in the above embodiments, the processor 501 is further configured to perform the operations performed in the above embodiments by the acquiring unit 401, the determining unit 402, and the establishing unit 405, the input interface 503 is configured to perform the operations performed by the receiving unit 404 in the above embodiments, the output interface 504 is configured to perform the operations performed by the transmitting unit 404 in the above embodiments, the input device 506 is configured to perform the operations performed by the input unit 407 in the above embodiments, and the output device 506 is configured to perform the operations performed by the output unit 406 in the above embodiments. The above terminal device may be used to execute various methods executed by the terminal device in the embodiments of the methods of fig. 2 and 3, which are not described herein.
The embodiment of the application also discloses a computer readable storage medium, wherein the instructions are stored, and the instructions are executed to execute the method in the embodiment of the method.
The embodiment of the application also discloses a computer program product comprising instructions which, when executed, perform the method of the above method embodiment.
The foregoing embodiments have been provided for the purpose of illustrating the general principles of the present application in further detail, and are not to be construed as limiting the scope of the application, but are merely intended to cover any modifications, equivalents, improvements, etc. based on the teachings of the application.

Claims (7)

1. A network access verification method, the method comprising:
acquiring information of a first Public Land Mobile Network (PLMN) from a first user identification card;
judging whether PLMNs corresponding to N user identification cards exist in the PLMNs corresponding to the N user identification cards according to the information of the first PLMNs and the information of PLMNs corresponding to the N user identification cards;
when PLMNs which correspond to the N user identification cards and are the same as the first PLMN exist in the PLMNs which correspond to the N user identification cards, judging whether the number M of the PLMNs which correspond to the N user identification cards and are the same as the first PLMN is larger than 1; when the number M is 1, selecting a user identification card corresponding to the same PLMN as the first PLMN as a target user identification card; when the number M is larger than 1, determining the priority levels of a plurality of user identification cards corresponding to M identical PLMNs, and selecting the user identification card with the highest priority as a target user identification card; when M is greater than 1, the M user identification cards are user identification cards of different operators, and the information of corresponding PLMNs among the different operators is the same; determining first information according to APN verification information of the target user identification card, wherein the target user identification card is a user identification card of which the corresponding PLMN in the N user identification cards is the same as the first PLMN; transmitting the first information to a network device; receiving a first verification result from the network device;
the APN verification information comprises information of PLMNs corresponding to the N user identification cards, user names and keys, wherein N is an integer greater than or equal to 1, and M is an integer greater than or equal to 1;
outputting first prompt information for prompting a user to input information when PLMNs which correspond to the N user identification cards do not exist in the PLMNs which are the same as the first PLMNs; receiving second information input by a user aiming at the first prompt information, wherein the second information comprises a second user name and a second password; transmitting the second information to the network device; receiving a second check result from the network device;
outputting second prompt information for prompting a user to input information when the first verification result is that the verification is not passed; receiving third information input by a user aiming at the second prompt information, wherein the third information is different from the first information and comprises a third user name and a third password; transmitting the third information to the network device; and receiving a third check result from the network equipment.
2. The method according to claim 1, wherein the method further comprises:
and when the first check result is passing the check, establishing communication connection with the network equipment.
3. The method of claim 1, wherein the APN verification information of the subscriber identity card further comprises an authentication type corresponding to the subscriber identity card, the first information further comprises a first authentication type, the second information further comprises a second authentication type, and the third information further comprises a third authentication type.
4. A method according to any one of claims 1-3, wherein the method further comprises:
and acquiring APN verification information of the N user identification cards from terminal equipment, wherein the terminal equipment is provided with a first application.
5. A network entry verification device, the device comprising:
an acquiring unit, configured to acquire information of a first public land mobile network PLMN from a first subscriber identity card;
a determining unit, configured to determine, according to the information of the first PLMN and the information of PLMNs corresponding to the N subscriber identity cards, whether PLMNs corresponding to the N subscriber identity cards exist in the same PLMN as the first PLMN; when PLMNs which correspond to the N user identification cards and are the same as the first PLMN exist in the PLMNs which correspond to the N user identification cards, judging whether the number M of the PLMNs which correspond to the N user identification cards and are the same as the first PLMN is larger than 1; when the number M is 1, selecting a user identification card corresponding to the same PLMN as the first PLMN as a target user identification card; when the number M is larger than 1, determining the priority levels of a plurality of user identification cards corresponding to M identical PLMNs, and selecting the user identification card with the highest priority as a target user identification card; when M is greater than 1, the M user identification cards are user identification cards of different operators, and the information of corresponding PLMNs among the different operators is the same; determining first information according to APN verification information of the target user identification card, wherein the target user identification card is a user identification card of which the corresponding PLMN in the N user identification cards is the same as the first PLMN;
a sending unit, configured to send the first information to a network device;
a receiving unit, configured to receive a first verification result from the network device;
the APN verification information comprises information of PLMNs corresponding to the N user identification cards, user names and keys, wherein N is an integer greater than or equal to 1, and M is an integer greater than or equal to 1;
an output unit, configured to output first prompt information for prompting a user to input information when a PLMN identical to the first PLMN does not exist in PLMNs corresponding to the N subscriber identity cards
The input unit is used for receiving second information input by a user aiming at the first prompt information, and the second information comprises a second user name and a second password;
the sending unit is further configured to send the second information to the network device;
the receiving unit is further configured to receive a second check result from the network device;
the output unit is further used for outputting second prompt information for prompting a user to input information when the first verification result is that the verification is not passed;
the input unit is further configured to receive third information input by the user for the second prompt information, where the third information is different from the first information, and the third information includes a third user name and a third password;
the sending unit is further configured to send the third information to the network device;
the receiving unit is further configured to receive a third check result from the network device.
6. A terminal device comprising a processor and a memory, the processor invoking a computer program stored in the memory to implement the method of any of claims 1-4.
7. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program or computer instructions, which, when executed by a processor, implement the method according to any of claims 1-4.
CN202110313123.0A 2021-03-24 2021-03-24 Network access verification method and device and computer readable storage medium Active CN113079514B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110313123.0A CN113079514B (en) 2021-03-24 2021-03-24 Network access verification method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110313123.0A CN113079514B (en) 2021-03-24 2021-03-24 Network access verification method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN113079514A CN113079514A (en) 2021-07-06
CN113079514B true CN113079514B (en) 2023-09-08

Family

ID=76613614

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110313123.0A Active CN113079514B (en) 2021-03-24 2021-03-24 Network access verification method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113079514B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11991525B2 (en) 2021-12-02 2024-05-21 T-Mobile Usa, Inc. Wireless device access and subsidy control

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006054497A1 (en) * 2004-11-19 2006-05-26 Seiko Instruments Inc. Communication connection supporting method and system, and program of communication connection supporting method
CN104320833A (en) * 2014-11-19 2015-01-28 成都中科创达软件有限公司 Automatic network selecting method and system of mobile terminal
WO2015085943A1 (en) * 2013-12-13 2015-06-18 华为终端有限公司 Method and terminal for data service transmission
CN105517104A (en) * 2015-12-09 2016-04-20 中国联合网络通信集团有限公司 Terminal and method for establishing network connection through APN by terminal
CN105682126A (en) * 2014-11-19 2016-06-15 中兴通讯股份有限公司 Access point name (APN) parameter configuration processing method and device
CN105764044A (en) * 2016-04-25 2016-07-13 中国联合网络通信集团有限公司 APN configuration method and apparatus thereof
CN106961711A (en) * 2017-05-12 2017-07-18 奇酷互联网络科技(深圳)有限公司 Control method, device and the mobile terminal of mobile terminal registered network
CN107371234A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 Register method, device and terminal
CN109890066A (en) * 2019-03-28 2019-06-14 努比亚技术有限公司 APN parameter configuration method, device, mobile terminal and readable storage medium storing program for executing
CN110475242A (en) * 2019-07-03 2019-11-19 深圳市广和通无线通信软件有限公司 A kind of LTE network register method, device, storage medium and computer equipment
CN112188591A (en) * 2020-08-20 2021-01-05 深圳市广和通无线通信软件有限公司 Network access method, device, computer equipment and storage medium
CN112469092A (en) * 2020-11-13 2021-03-09 深圳市广和通无线股份有限公司 Multi-card mobile terminal optimal network selection method and device, computer equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014144493A2 (en) * 2013-03-15 2014-09-18 Ushahidi, Inc. Devices, systems and methods for enabling network connectivity
US9955323B2 (en) * 2014-03-10 2018-04-24 Tracfone Wireless, Inc. System and method for modifying settings on wireless devices

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006054497A1 (en) * 2004-11-19 2006-05-26 Seiko Instruments Inc. Communication connection supporting method and system, and program of communication connection supporting method
WO2015085943A1 (en) * 2013-12-13 2015-06-18 华为终端有限公司 Method and terminal for data service transmission
CN104320833A (en) * 2014-11-19 2015-01-28 成都中科创达软件有限公司 Automatic network selecting method and system of mobile terminal
CN105682126A (en) * 2014-11-19 2016-06-15 中兴通讯股份有限公司 Access point name (APN) parameter configuration processing method and device
CN105517104A (en) * 2015-12-09 2016-04-20 中国联合网络通信集团有限公司 Terminal and method for establishing network connection through APN by terminal
CN105764044A (en) * 2016-04-25 2016-07-13 中国联合网络通信集团有限公司 APN configuration method and apparatus thereof
CN107371234A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 Register method, device and terminal
CN106961711A (en) * 2017-05-12 2017-07-18 奇酷互联网络科技(深圳)有限公司 Control method, device and the mobile terminal of mobile terminal registered network
CN109890066A (en) * 2019-03-28 2019-06-14 努比亚技术有限公司 APN parameter configuration method, device, mobile terminal and readable storage medium storing program for executing
CN110475242A (en) * 2019-07-03 2019-11-19 深圳市广和通无线通信软件有限公司 A kind of LTE network register method, device, storage medium and computer equipment
CN112188591A (en) * 2020-08-20 2021-01-05 深圳市广和通无线通信软件有限公司 Network access method, device, computer equipment and storage medium
CN112469092A (en) * 2020-11-13 2021-03-09 深圳市广和通无线股份有限公司 Multi-card mobile terminal optimal network selection method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113079514A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN109906623B (en) Profile downloading method and device
CN108476399B (en) Method and apparatus for transmitting and receiving profile in communication system
JP5897137B2 (en) Wireless local area network authentication method and mobile terminal
KR100414926B1 (en) System and method for provisioning or updating a mobile station using over-the-air transfer of interpreted byte-code program
CN110771188B (en) Apparatus and method for providing operator-specific services
EP2925032B1 (en) Profile download for subscribing to network in wireless communication system
CN111314475B (en) Session creation method and related equipment
US9547759B2 (en) Method and apparatus for managing user provided access tokens
WO2016123822A1 (en) Data transmission method and device, and terminal
CN111278036A (en) Method and device for collecting MAC address
CN113079514B (en) Network access verification method and device and computer readable storage medium
CN111385771B (en) Service processing method, system, device and medium
US9716990B2 (en) Method to disable a network access application in a secure element
CN101902741B (en) Mobile terminal and network access method thereof
CN108123918A (en) A kind of account authentication login method and device
CN101005701A (en) Connection set-up method
CN101800984A (en) Method and server terminal for obtaining WAPI certification and WAPI authentication system
CN110381495B (en) Roaming limiting method and device
CN105848251B (en) Hotspot access method, device and terminal
US10251122B2 (en) Method for switching from a first to a second mobile network operator and corresponding device
CN111901813A (en) Network configuration method and equipment for customer premises equipment
KR100882938B1 (en) Method For Opening the Service Using the OTAOver-The-Air Activation in WCDMAWideband Code Division Multiple Access Mobile Phone
WO2013174319A2 (en) Access authentication method and device for wireless local area network
KR100845325B1 (en) Method for changing the msisdn using the ota(over-the-air activation) in wcdma(wideband code division multiple access) mobile phone
CN114691734A (en) Cache control method and device, computer readable medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant