CN107148010B - Multi-operator implementation method, device, storage medium and computer equipment - Google Patents

Multi-operator implementation method, device, storage medium and computer equipment Download PDF

Info

Publication number
CN107148010B
CN107148010B CN201710262378.2A CN201710262378A CN107148010B CN 107148010 B CN107148010 B CN 107148010B CN 201710262378 A CN201710262378 A CN 201710262378A CN 107148010 B CN107148010 B CN 107148010B
Authority
CN
China
Prior art keywords
operator
identifier
image file
acquired
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710262378.2A
Other languages
Chinese (zh)
Other versions
CN107148010A (en
Inventor
向俊
张天瑜
许宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN201710262378.2A priority Critical patent/CN107148010B/en
Publication of CN107148010A publication Critical patent/CN107148010A/en
Application granted granted Critical
Publication of CN107148010B publication Critical patent/CN107148010B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a multi-operator implementation method, which comprises the following steps: when detecting that a user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card; if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage; loading an operator mirror image file corresponding to the acquired operator identification in a boot stage; and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier. By adopting the method, the problem of limited support of operators can be solved. In addition, a multi-operator implementation apparatus, a storage medium, and a computer device are also provided.

Description

Multi-operator implementation method, device, storage medium and computer equipment
Technical Field
The invention relates to the technical field of communication, in particular to a multi-operator implementation method, a multi-operator implementation device, a multi-operator storage medium and computer equipment.
Background
The traditional method for supporting multiple operators by the mobile terminal only supports networks of three operators, namely mobile operators, Unicom operators and telecom operators, and supports other operators are configured only through general parameters.
However, using common parameters obscures the network configuration differences of other operators than the three major operators, resulting in limited use of other operator networks.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a multi-operator implementation method, apparatus, storage medium, and computer device, which can solve the problem of limited support of operators.
A multi-operator implementation method, the method comprising:
when detecting that a user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identification in a boot stage;
and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier.
In one embodiment, the obtaining of the operator identifier corresponding to the currently inserted subscriber identity module card includes: acquiring an identification code of a currently inserted user identification card; reading an operator identifier corresponding to the obtained identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition; if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card; and reading an operator identifier corresponding to the acquired public land mobile network identifier of the user identity identification card in a public land mobile network identifier mapping table in the operator configuration information storage partition.
In one embodiment, before the starting the operator image file, the method further includes: verifying the safety of the operator mirror image file corresponding to the operator mirror image file identification; and if the operator identity is verified to be safe, starting the operator mirror image file corresponding to the acquired operator identity.
In one embodiment, the verifying the security of the operator image file corresponding to the obtained operator identifier includes: acquiring a digital signature of an operator image file corresponding to the acquired operator identifier in an operator image storage partition; decrypting the acquired digital signature by using a pre-stored key algorithm to obtain a first message digest of the operator image file corresponding to the acquired operator identifier; calculating a second message digest of the operator image file corresponding to the acquired operator identifier according to a message digest algorithm; and comparing the first message abstract with the second message abstract, if the first message abstract is consistent with the second message abstract in comparison, verifying the operator image file corresponding to the acquired operator identifier as safe, otherwise, verifying the operator image file corresponding to the acquired operator identifier as unsafe.
In one embodiment, the loading, after entering the operating system, operator configuration data corresponding to the obtained operator identifier includes: after entering an operating system, traversing a file header of each operator configuration file in the operator configuration information storage partition; analyzing the file header to obtain an operator identifier corresponding to the operator configuration file; and comparing the analyzed operator identification with the operator identification corresponding to the inserted user identity identification card, and if the comparison is consistent, loading the operator configuration data corresponding to the analyzed operator identification.
A multi-operator implementation apparatus, the apparatus comprising:
the operator identification acquisition module is used for acquiring an operator identification corresponding to the inserted user identification card when the user identification card is inserted into the current system;
the operator mirror image file acquisition module is used for restarting and entering a guide stage if the acquired operator identification is different from the currently running operator identification; loading an operator mirror image file corresponding to the acquired operator identification in a boot stage;
and the operator configuration data loading module is used for starting the operator mirror image file corresponding to the acquired operator identifier, and loading the operator configuration data corresponding to the acquired operator identifier after entering an operating system.
In one embodiment, the operator identifier obtaining module is further configured to obtain an identifier of a currently inserted subscriber identity module; reading an operator identifier corresponding to the obtained identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition; if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card; and reading an operator identifier corresponding to the acquired public land mobile network identifier of the user identity identification card in a public land mobile network identifier mapping table in the operator configuration information storage partition.
In one embodiment, the apparatus further comprises:
the safety verification module is used for verifying the safety of the operator mirror image file corresponding to the operator mirror image file identifier;
and the operator configuration data loading module is used for starting an operator mirror image file corresponding to the acquired operator identifier if the operator configuration data loading module is verified to be safe.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of: :
when detecting that a user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identification in a boot stage;
and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
when detecting that a user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identification in a boot stage;
and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier.
According to the multi-operator implementation method, the multi-operator implementation device, the storage medium and the computer equipment, when the user identity identification card is inserted into the current system, the operator identification corresponding to the inserted user identity identification card is obtained; if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage; loading an operator mirror image file corresponding to the acquired operator identification in a boot stage; and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier. Because the operator mirror image file corresponding to the user identity identification card is loaded firstly and then the operator configuration data corresponding to the user identity identification card is loaded, each operator can realize unlimited support through a mode of adding the general configuration data and the special configuration data, and the problem of limited support of the operators is solved.
Drawings
Fig. 1 is an internal structural view of a terminal in one embodiment;
FIG. 2 is a flow diagram of a method implemented by multiple operators in one embodiment;
FIG. 3 is a diagram of a memory structure of a nand flash in one embodiment;
FIG. 4 is a schematic diagram of a multi-operator implementation of a method in one embodiment;
FIG. 5 is a flow diagram of a method for obtaining an operator identifier corresponding to an inserted subscriber identity card of FIG. 2 in one embodiment;
FIG. 6 is a flow diagram of a method for verifying security of an operator image file corresponding to an obtained operator identification, under an embodiment;
FIG. 7 is a flowchart illustrating a method for loading operator configuration data corresponding to an obtained operator identification after entering an operating system of FIG. 2, under an embodiment;
FIG. 8 is a block diagram of a multi-operator implementation in one embodiment;
fig. 9 is a block diagram of a multi-operator implementation in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 is a schematic structural diagram of a terminal in one embodiment. As shown in fig. 1, the terminal includes a processor, a nonvolatile storage medium, an internal memory, a data transmission interface, a display screen, and an input device, which are connected through a system bus. Wherein the non-volatile storage medium of the terminal stores an operating system and computer readable instructions that are executed by the processor to implement a multi-operator implementation method. The processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The data transmission interface is used for communicating with other mobile storage devices. The display screen of the terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device can be a touch layer covered on the display screen or a key arranged on a shell of the terminal. It will be understood by those skilled in the art that the structure shown in fig. 1 is a block diagram of only a part of the structure relevant to the present application, and does not constitute a limitation of the terminal to which the present application is applied, and in particular, the terminal may include more or less components than those shown in the drawings, or combine some components, or have a different arrangement of components.
In one embodiment, as shown in fig. 2, a multi-operator implementation method is provided, which is exemplified by being applied to a terminal shown in fig. 1, and includes:
step 202, when it is detected that the user identification card is inserted into the current system, an operator identifier corresponding to the inserted user identification card is obtained.
A Subscriber Identity Module (SIM) card, also called a smart card, for identifying the identity of a Subscriber using a Global System for Mobile Communication (GSM) network; the operator is a provider providing network services, the operator identifier is an identifier for uniquely distinguishing the operator, and the operator identifier is a self-defined identifier for establishing a mapping relationship in this embodiment.
Specifically, the terminal reads information of the SIM card, such as a state, a serial number, a provider code, a provider name, a country, a contact person, and the like, after being powered on, and if one or more of the above information of the SIM card is successfully read, searches for an operator identifier corresponding to the inserted subscriber identity module card in a configuration information partition of a data storage flash memory (i.e., nand flash).
And step 204, if the obtained operator identification is different from the currently running operator identification, restarting and entering a boot stage.
Boot (BootLoader) is a boot program that is run in an embedded system before the kernel of an operating system runs and is used for initializing hardware equipment and establishing a memory space map. The operator identifier currently running is the operator identifier corresponding to the operator currently used by the system.
In step 206, the operator image file corresponding to the acquired operator identity is loaded in the boot phase.
The mirror image file is similar to the rar and ZIP compressed package, and a series of specific files are made into a single file according to a certain format, so that the file is convenient for a user to download and use; the operator image file is an image file formed by compiling general configuration information divided by an operator according to a preset rule (for example, divided into a chinese operator, an american operator, and the like according to an area) into an operating system, where the general configuration information refers to the same configuration information used by different operators, such as a locking function of a modem for supporting an SIM card. Specifically, as shown in fig. 3, the nand flash is divided into an operator mirror Image storage Partition (Image data Partition), an operator configuration information Partition (configuration data Partition), and another data storage Partition (Other data Partition) in advance. A plurality of operator mirror image files are stored in the operator mirror image storage partition; the operator configuration information Partition is stored with a plurality of operator configuration data, a Mapping table (Mapping of Image ID and Image data) of operator identification and operator Image file, and a Mapping table (Mapping of Image ID and configuration data Partition) of operator identification and operator configuration data. The image file storage partition of the nand flash currently stores at most four operator image files, and because the nand flash currently supports 128M at most, each operator image file can be allocated with 25M. At the boot loader stage, as shown in fig. 4, an operator image file corresponding to the acquired operator identifier is loaded in a pre-partitioned image file storage partition of the nand flash.
And step 208, starting the operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading the operator configuration data corresponding to the acquired operator identifier.
In this embodiment, the operator configuration data is different configuration data of different operators, that is, dedicated configuration data of the operators.
In order to load the complete configuration information of the operator corresponding to the user identification card inserted into the current system, as shown in fig. 4, in addition to loading the general configuration data (i.e., the operator image file) of the operator corresponding to the user identification card inserted into the current system, which is stored in the operator image file, the specific configuration data of the operator corresponding to the user identification card inserted into the current system also needs to be loaded, for example, the specific configuration data of the chinese mobile operator has a chinese mobile multimedia message access point which is cmwap.
In this embodiment, when it is detected that the user identification card is inserted into the current system, an operator identifier corresponding to the inserted user identification card is acquired, and if the acquired operator identifier is different from the currently running operator identifier, the system is restarted and enters a boot stage, an operator image file corresponding to the acquired operator identifier is loaded in the boot stage, the operator image file corresponding to the acquired operator identifier is started, and operator configuration data corresponding to the acquired operator identifier is loaded after the system enters the operating system. Because the operator mirror image file corresponding to the user identity identification card is loaded firstly and then the operator configuration data corresponding to the user identity identification card is loaded, each operator can realize unlimited support through a mode of adding the general configuration data and the special configuration data, and the problem of limited support of the operators is solved.
In one embodiment, as shown in fig. 5, the obtaining of the operator identifier corresponding to the inserted subscriber identity card in step 202 includes:
step 212, obtaining the identification code of the currently inserted user identification card.
The identification code of the user identification card, i.e. the card number of the SIM card, is composed of 20 digits, the first six digits are operator codes, as for the mobile in china: 898600, respectively; 898602, China Union: 898601, 898609, china telecom 898603, 898606.
Step 214, reading the operator identifier corresponding to the obtained identification code of the user identification card in the user identification card identification code mapping table in the operator configuration information storage partition.
The operator configuration information storage partition is a storage area which is pre-divided in the nand flash and is used for storing a mapping table and operator special configuration data; the mapping table of the user identification card identification codes is a mapping relation between the predefined user identification card identification codes and the operator identifications.
In step 216, if the reading fails, the plmn identity of the currently inserted subscriber identity card is obtained.
Public Land Mobile Networks (PLMN) are networks established and operated by the government or its approved operators for the purpose of providing Land Mobile services to the Public; the plmn identity is an identifier for distinguishing a plmn, for example, the plmn identity of china mobile is 46000, and the plmn identity of china unicom is 46001.
Because there may be no record of the identification code of the inserted subscriber identity card in the subscriber identity card identification code mapping table, the operator identifier corresponding to the identification code of the inserted subscriber identity card cannot be read, and at this time, the corresponding operator identifier can be obtained by obtaining the public land mobile network identification code of the inserted subscriber identity card.
In step 218, the operator id corresponding to the obtained plmn id of the subscriber identity card is read from the plmn id mapping table in the operator configuration information storage partition.
The mapping table of public land mobile network identification codes is a mapping relation between predefined public land mobile network identification codes and operator identifications.
In this embodiment, the operator identifier corresponding to the inserted identification card is obtained by using the combination of the identification code of the inserted identification card and the public land mobile network identification code, and for the operator identifier corresponding to the identification card obtained only by the identification code of the inserted identification card, the confirmation rate of confirming the operator corresponding to the inserted identification card is improved.
In one embodiment, step 206 is preceded by: verifying the safety of the operator mirror image file corresponding to the operator mirror image file identification; and if the operator identity is verified to be safe, starting the operator mirror image file corresponding to the obtained operator identity. In this embodiment, the security of the operator image file corresponding to the obtained operator identifier is ensured by adding the security verification step to the operator image file corresponding to the obtained operator identifier.
In an embodiment, as shown in fig. 6, the step of verifying the security of the operator image file corresponding to the operator image file identifier includes:
step 602, a digital signature of an operator image file corresponding to the acquired operator identity in the operator image storage partition is acquired.
A digital signature is some data appended to a data unit or a cryptographic transformation performed on a data unit that allows the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data from being counterfeited by a person (e.g., the recipient).
And step 604, decrypting the acquired digital signature by using a pre-stored key algorithm to obtain a first message digest of the operator image file corresponding to the acquired operator identity.
The pre-stored key algorithm is an algorithm which is pre-stored in the terminal and used for encryption or decryption; a message Digest (MessageDigest), also known as a Digital Digest (Digital Digest), is a fixed-length value that uniquely corresponds to a message or text. The message digest uses a one-way Hash function to digest the plaintext to be encrypted into a string of 128-bit ciphertext, which is also called digital fingerprint (Finger Print), and has a fixed length, and different plaintext digests are the ciphertext, and the result is always different, and the digests of the same plaintext must be identical. In this embodiment, after the digital signature of the operator image file corresponding to the acquired operator identity is acquired, the acquired digital signature is decrypted by using a key algorithm (such as an RSA algorithm) pre-stored in the terminal to obtain the first message digest.
Step 606, calculating a second message digest of the operator image file corresponding to the obtained operator identity according to a message digest algorithm.
The message digest algorithm is also called hash algorithm, is a very important branch in the cryptographic algorithm, and realizes the functions of data signature, data integrity check and the like by extracting fingerprint information from all data. The Message Digest Algorithm may be a Cyclic Redundancy Check Algorithm (CRC, including CRC8, CRC16, and CRC32), a Secure Hash Algorithm (SHA, including SHA1, SHA256, SHA384, SHA512), a Message Digest Algorithm (Message Digest Algorithm, including MD2, MD4, MD5), or the like.
Specifically, a plaintext message in the operator image file corresponding to the acquired operator identifier is converted into a hash value with a fixed length through a message digest algorithm, which is the second message digest.
Step 608, comparing the first message digest with the second message digest, if the first message digest is consistent with the second message digest, verifying the operator image file corresponding to the obtained operator identifier as safe, otherwise, verifying the operator image file corresponding to the obtained operator identifier as unsafe.
In this embodiment, the security of the operator image file corresponding to the acquired operator identity is verified by comparing a message digest obtained by decrypting the digital signature of the operator image file corresponding to the acquired operator identity using the pre-stored key algorithm with a message digest obtained by converting plaintext information in the operator image file corresponding to the acquired operator identity using the message digest algorithm.
In an embodiment, as shown in fig. 7, the step of loading the operator configuration data corresponding to the obtained operator identifier after entering the operating system includes:
step 702, after entering the operating system, traverse the file header of each operator configuration file in the operator configuration information storage partition.
The header is a piece of data at the beginning of the file that takes on a certain task.
In this embodiment, a plurality of operator configuration files are stored in the operator configuration information storage partition to support different operators.
Step 704, parsing the file header to obtain an operator identifier corresponding to the operator configuration file.
The file header of each operator configuration file records the operator identification corresponding to the operator configuration file, so that the special configuration data of the operators corresponding to the user identification cards of different operators can be conveniently loaded.
Step 706, comparing the analyzed operator identifier with the operator identifier corresponding to the inserted user identity card, and if the comparison is consistent, loading the operator configuration data corresponding to the analyzed operator identifier.
In this embodiment, the corresponding operator identifier is obtained by traversing and analyzing the file header of each operator configuration file in the operator configuration partition, the operator configuration file corresponding to the inserted user identification card is found, and the configuration data in the operator configuration file is loaded.
In one embodiment, as shown in fig. 8, there is provided a multi-operator implementation apparatus, comprising:
an operator identifier obtaining module 802, configured to obtain, when it is detected that a user identification card is inserted into a current system, an operator identifier corresponding to the inserted user identification card;
an operator image file obtaining module 804, configured to restart and enter a boot stage if the obtained operator identifier is different from an operator identifier currently running; loading an operator mirror image file corresponding to the acquired operator identity in a boot stage;
the operator configuration data loading module 806 is configured to start an operator image file corresponding to the obtained operator identifier, and load operator configuration data corresponding to the obtained operator identifier after entering the operating system.
In one embodiment, the operator identifier obtaining module 802 is further configured to obtain an identifier of a currently inserted subscriber identity module; reading an operator identifier corresponding to the acquired identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition; if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card; and reading an operator identifier corresponding to the acquired public land mobile network identification code of the user identity identification card in a public land mobile network identification code mapping table in the operator configuration information storage partition.
In one embodiment, as shown in fig. 9, the apparatus further includes a security verification module 805 configured to verify security of the operator image file corresponding to the operator image file identifier; and the operator configuration data loading module is used for starting an operator mirror image file corresponding to the acquired operator identifier if the operator configuration data loading module is verified to be safe.
In one embodiment, the security verification module 805 is configured to obtain a digital signature of an operator image file in the operator image storage partition corresponding to the obtained operator identifier; decrypting the acquired digital signature by using a prestored secret key algorithm to obtain a first message digest of the operator image file corresponding to the acquired operator identity; calculating a second message abstract of the operator image file corresponding to the acquired operator identity according to a message abstract algorithm; and comparing the first message abstract with the second message abstract, if the first message abstract is consistent with the second message abstract in comparison, verifying the operator image file corresponding to the acquired operator identifier as safe, otherwise, verifying the operator image file corresponding to the acquired operator identifier as unsafe.
In one embodiment, the operator configuration data loading module 806 is configured to traverse a file header of each operator configuration file in the operator configuration information storage partition after entering the operating system; analyzing the file header to obtain an operator identifier corresponding to the operator configuration file; and comparing the analyzed operator identification with the operator identification corresponding to the inserted user identity identification card, and if the comparison is consistent, loading the operator configuration data corresponding to the analyzed operator identification.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, performs the steps of:
when detecting that a user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identity in a boot stage;
and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier.
In one embodiment, the step of obtaining the operator identifier corresponding to the currently inserted subscriber identity module card includes: acquiring an identification code of a currently inserted user identification card; reading an operator identifier corresponding to the acquired identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition; if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card; and reading an operator identifier corresponding to the acquired public land mobile network identification code of the user identity identification card in a public land mobile network identification code mapping table in the operator configuration information storage partition.
In one embodiment, before the step of starting the operator image file, the method further includes: verifying the safety of the operator mirror image file corresponding to the operator mirror image file identification; and if the operator identity is verified to be safe, starting the operator mirror image file corresponding to the obtained operator identity.
In one embodiment, the step of verifying the security of the operator image file corresponding to the operator image file identifier includes: acquiring a digital signature of an operator image file corresponding to the acquired operator identifier in an operator image storage partition; decrypting the acquired digital signature by using a prestored secret key algorithm to obtain a first message digest of the operator image file corresponding to the acquired operator identity; calculating a second message abstract of the operator image file corresponding to the acquired operator identity according to a message abstract algorithm; and comparing the first message abstract with the second message abstract, if the first message abstract is consistent with the second message abstract in comparison, verifying the operator image file corresponding to the acquired operator identifier as safe, otherwise, verifying the operator image file corresponding to the acquired operator identifier as unsafe.
In one embodiment, the step of loading the operator configuration data corresponding to the obtained operator identity after entering the operating system includes: after entering an operating system, traversing a file header of each operator configuration file in the operator configuration information storage partition; analyzing the file header to obtain an operator identifier corresponding to the operator configuration file; and comparing the analyzed operator identification with the operator identification corresponding to the inserted user identity identification card, and if the comparison is consistent, loading the operator configuration data corresponding to the analyzed operator identification.
In one embodiment, a computer device is provided, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
when detecting that a user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identity in a boot stage;
and starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier.
In one embodiment, the step of obtaining the operator identifier corresponding to the currently inserted subscriber identity module card includes: acquiring an identification code of a currently inserted user identification card; reading an operator identifier corresponding to the acquired identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition; if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card; and reading an operator identifier corresponding to the acquired public land mobile network identification code of the user identity identification card in a public land mobile network identification code mapping table in the operator configuration information storage partition.
In one embodiment, before the step of starting the operator image file, the method further includes: verifying the safety of the operator mirror image file corresponding to the operator mirror image file identification; and if the operator identity is verified to be safe, starting the operator mirror image file corresponding to the obtained operator identity.
In one embodiment, the step of verifying the security of the operator image file corresponding to the operator image file identifier includes: acquiring a digital signature of an operator image file corresponding to the acquired operator identifier in an operator image storage partition; decrypting the acquired digital signature by using a prestored secret key algorithm to obtain a first message digest of the operator image file corresponding to the acquired operator identity; calculating a second message abstract of the operator image file corresponding to the acquired operator identity according to a message abstract algorithm; and comparing the first message abstract with the second message abstract, if the first message abstract is consistent with the second message abstract in comparison, verifying the operator image file corresponding to the acquired operator identifier as safe, otherwise, verifying the operator image file corresponding to the acquired operator identifier as unsafe.
In one embodiment, the step of loading the operator configuration data corresponding to the obtained operator identity after entering the operating system includes: after entering an operating system, traversing a file header of each operator configuration file in the operator configuration information storage partition; analyzing the file header to obtain an operator identifier corresponding to the operator configuration file; and comparing the analyzed operator identification with the operator identification corresponding to the inserted user identity identification card, and if the comparison is consistent, loading the operator configuration data corresponding to the analyzed operator identification.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. A multi-operator implementation method, the method comprising:
when detecting that the user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card in a configuration information partition of the data storage type flash memory; the data storage type flash memory is divided into an operator mirror image storage partition, the operator configuration information partition and other data storage partitions in advance;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identifier in the operator mirror image storage partition in a boot stage; the operator image file is formed by compiling general configuration information divided by an operator according to a preset rule into an operating system, wherein the general configuration information refers to the same configuration information used by different operators;
starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier in the operator configuration information partition; the operator configuration data is difference configuration data of different operators;
the acquiring of the operator identifier corresponding to the currently inserted user identification card includes:
acquiring an identification code of a currently inserted user identification card;
reading an operator identifier corresponding to the obtained identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition;
if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card;
and reading an operator identifier corresponding to the acquired public land mobile network identifier of the user identity identification card in a public land mobile network identifier mapping table in the operator configuration information storage partition.
2. The method according to claim 1, further comprising, before the starting of the operator image file corresponding to the obtained operator identifier:
verifying the safety of the operator mirror image file corresponding to the acquired operator identification;
and if the operator identity is verified to be safe, starting the operator mirror image file corresponding to the acquired operator identity.
3. The method of claim 2, wherein verifying the security of the carrier image file corresponding to the obtained carrier identification comprises:
acquiring a digital signature of an operator image file corresponding to the acquired operator identifier in an operator image storage partition;
decrypting the acquired digital signature by using a pre-stored key algorithm to obtain a first message digest of the operator image file corresponding to the acquired operator identifier;
calculating a second message digest of the operator image file corresponding to the acquired operator identifier according to a message digest algorithm;
and comparing the first message abstract with the second message abstract, if the first message abstract is consistent with the second message abstract in comparison, verifying the operator image file corresponding to the acquired operator identifier as safe, otherwise, verifying the operator image file corresponding to the acquired operator identifier as unsafe.
4. The method of claim 1, wherein loading operator configuration data corresponding to the obtained operator identifier after entering an operating system comprises:
after entering an operating system, traversing a file header of each operator configuration file in the operator configuration information storage partition;
analyzing the file header to obtain an operator identifier corresponding to the operator configuration file;
and comparing the analyzed operator identification with the operator identification corresponding to the inserted user identity identification card, and if the comparison is consistent, loading the operator configuration data corresponding to the analyzed operator identification.
5. A multi-operator implementation apparatus, the apparatus comprising:
the operator identification acquisition module is used for acquiring an operator identification corresponding to the inserted user identification card in the configuration information partition of the data storage type flash memory when the user identification card is detected to be inserted into the current system; the data storage type flash memory is divided into an operator mirror image storage partition, the operator configuration information partition and other data storage partitions in advance;
the operator mirror image file acquisition module is used for restarting and entering a guide stage if the acquired operator identification is different from the currently running operator identification; loading an operator mirror image file corresponding to the acquired operator identifier in the operator mirror image storage partition in a boot stage; the operator image file is formed by compiling general configuration information divided by an operator according to a preset rule into an operating system, wherein the general configuration information refers to the same configuration information used by different operators;
an operator configuration data loading module, configured to start an operator image file corresponding to the obtained operator identifier, and load operator configuration data corresponding to the obtained operator identifier in the operator configuration information partition after entering an operating system; the operator configuration data is difference configuration data of different operators;
the operator identification acquisition module is also used for acquiring the identification code of the currently inserted user identification card; reading an operator identifier corresponding to the obtained identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition; if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card; and reading an operator identifier corresponding to the acquired public land mobile network identifier of the user identity identification card in a public land mobile network identifier mapping table in the operator configuration information storage partition.
6. The apparatus of claim 5, further comprising:
the safety verification module is used for verifying the safety of the operator mirror image file corresponding to the operator mirror image file identifier;
and the operator configuration data loading module is used for starting an operator mirror image file corresponding to the acquired operator identifier if the operator configuration data loading module is verified to be safe.
7. A computer-readable storage medium, on which a computer program is stored, which program, when executed by a processor, carries out the steps of:
when detecting that the user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card in a configuration information partition of the data storage type flash memory; the data storage type flash memory is divided into an operator mirror image storage partition, the operator configuration information partition and other data storage partitions in advance;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identifier in the operator mirror image storage partition in a boot stage; the operator image file is formed by compiling general configuration information divided by an operator according to a preset rule into an operating system, wherein the general configuration information refers to the same configuration information used by different operators;
starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier in the operator configuration information partition; the operator configuration data is difference configuration data of different operators;
the acquiring of the operator identifier corresponding to the currently inserted user identification card includes:
acquiring an identification code of a currently inserted user identification card;
reading an operator identifier corresponding to the obtained identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition;
if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card;
and reading an operator identifier corresponding to the acquired public land mobile network identifier of the user identity identification card in a public land mobile network identifier mapping table in the operator configuration information storage partition.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
when detecting that the user identification card is inserted into the current system, acquiring an operator identifier corresponding to the inserted user identification card in a configuration information partition of the data storage type flash memory; the data storage type flash memory is divided into an operator mirror image storage partition, the operator configuration information partition and other data storage partitions in advance;
if the obtained operator identification is different from the currently running operator identification, restarting and entering a guiding stage;
loading an operator mirror image file corresponding to the acquired operator identifier in the operator mirror image storage partition in a boot stage; the operator image file is formed by compiling general configuration information divided by an operator according to a preset rule into an operating system, wherein the general configuration information refers to the same configuration information used by different operators;
starting an operator mirror image file corresponding to the acquired operator identifier, entering an operating system, and loading operator configuration data corresponding to the acquired operator identifier in the operator configuration information partition; the operator configuration data is difference configuration data of different operators;
the acquiring of the operator identifier corresponding to the currently inserted user identification card includes:
acquiring an identification code of a currently inserted user identification card;
reading an operator identifier corresponding to the obtained identification code of the user identification card in a user identification card identification code mapping table in an operator configuration information storage partition;
if the reading fails, acquiring a public land mobile network identification code of the currently inserted user identity identification card;
and reading an operator identifier corresponding to the acquired public land mobile network identifier of the user identity identification card in a public land mobile network identifier mapping table in the operator configuration information storage partition.
CN201710262378.2A 2017-04-20 2017-04-20 Multi-operator implementation method, device, storage medium and computer equipment Active CN107148010B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710262378.2A CN107148010B (en) 2017-04-20 2017-04-20 Multi-operator implementation method, device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710262378.2A CN107148010B (en) 2017-04-20 2017-04-20 Multi-operator implementation method, device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN107148010A CN107148010A (en) 2017-09-08
CN107148010B true CN107148010B (en) 2020-08-21

Family

ID=59773788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710262378.2A Active CN107148010B (en) 2017-04-20 2017-04-20 Multi-operator implementation method, device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN107148010B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107743305B (en) * 2017-10-23 2021-03-12 Oppo广东移动通信有限公司 Method and device for loading configuration information and computer equipment
CN108112010A (en) * 2017-12-28 2018-06-01 宇龙计算机通信科技(深圳)有限公司 Access method, apparatus, terminal and the computer readable storage medium of network
CN110609302B (en) * 2018-06-14 2022-07-12 深圳华大北斗科技股份有限公司 Position monitoring device of networking equipment
CN110475242B (en) * 2019-07-03 2021-11-23 深圳市广和通无线通信软件有限公司 LTE network registration method, device, storage medium and computer equipment
CN111355613B (en) * 2020-03-01 2023-04-18 南京汉隆科技有限公司 Operator configuration switching method and system applied to embedded network phone
CN111510909B (en) * 2020-03-10 2023-03-10 深圳市广和通无线股份有限公司 Communication module configuration processing method and device, computer equipment and storage medium
CN111586671B (en) * 2020-03-25 2023-03-14 深圳市广和通无线股份有限公司 Embedded user identification card configuration method and device, communication equipment and storage medium
CN112367660B (en) * 2020-10-12 2024-03-15 深圳市广和通无线通信软件有限公司 Parameter configuration method, device, terminal and readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005055418B4 (en) * 2005-11-21 2012-06-06 Giesecke & Devrient Gmbh Expansion module for an Assisted Roaming
CN102164360B (en) * 2011-04-20 2013-11-06 瑞斯康达科技发展股份有限公司 Method and system for configuring and loading network equipment
CN102594563A (en) * 2012-02-20 2012-07-18 南京中通电气有限公司 Source authentication method for secure multicast
CN103281689B (en) * 2013-04-28 2017-02-15 华为技术有限公司 Method for network switching and version upgrading and terminal equipment
CN104348955A (en) * 2013-07-30 2015-02-11 中兴通讯股份有限公司 A method, device and terminal for determining user interface display language of SIM card
CN104394524A (en) * 2014-11-27 2015-03-04 上海斐讯数据通信技术有限公司 Parameter loading method and mobile terminal capable of supporting multiple operators
CN106507341B (en) * 2016-11-25 2019-11-12 宇龙计算机通信科技(深圳)有限公司 Method, system and the mobile terminal of intelligent recognition configuration file

Also Published As

Publication number Publication date
CN107148010A (en) 2017-09-08

Similar Documents

Publication Publication Date Title
CN107148010B (en) Multi-operator implementation method, device, storage medium and computer equipment
WO2018176733A1 (en) Firmware upgrade method, terminal and computer-readable non-volatile storage medium
CN111666564B (en) Application program safe starting method and device, computer equipment and storage medium
AU2010353673B2 (en) Managing method, device and terminal for application program
CN106940651B (en) POS terminal software upgrading method and device
US10176317B2 (en) Method and apparatus for managing super user password on smart mobile terminal
CN111586671B (en) Embedded user identification card configuration method and device, communication equipment and storage medium
CN110012455B (en) Account information management method and device and electronic equipment
CN109117643B (en) System processing method and related equipment
CN111026419A (en) Application program upgrading method, device and system of single chip microcomputer
CN111737718A (en) Encryption and decryption method and device for jar packet, terminal equipment and storage medium
CN103152724B (en) A kind of method and system of hardware lock SIM
CN107145342B (en) Method and device for processing channel information of application
CN111417927A (en) Resource authority processing method and device, storage medium and chip
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment
CN106778227A (en) Applied program processing method, application program launching method and device
CN104504324B (en) Mobile solution certification reinforcement means and system
CN110674511A (en) Offline data protection method and system based on elliptic curve encryption algorithm
CN113254986B (en) Data processing method, device and computer readable storage medium
CN115333753A (en) Internet protocol address generation method and device, storage medium and electronic equipment
CN107403103B (en) File decryption method and device
CN114095220A (en) Telephone communication verification method, device, equipment and storage medium
CN114154182A (en) Information encryption method and device, storage medium and electronic device
CN114168909A (en) Program protection method, device, equipment and storage medium based on code signature
CN111538481B (en) Application program customization method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant