CN107454660B - Network residing method and device after authentication failure - Google Patents

Network residing method and device after authentication failure Download PDF

Info

Publication number
CN107454660B
CN107454660B CN201710669740.8A CN201710669740A CN107454660B CN 107454660 B CN107454660 B CN 107454660B CN 201710669740 A CN201710669740 A CN 201710669740A CN 107454660 B CN107454660 B CN 107454660B
Authority
CN
China
Prior art keywords
network
authentication
standard
network standard
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710669740.8A
Other languages
Chinese (zh)
Other versions
CN107454660A (en
Inventor
王丕光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710669740.8A priority Critical patent/CN107454660B/en
Publication of CN107454660A publication Critical patent/CN107454660A/en
Application granted granted Critical
Publication of CN107454660B publication Critical patent/CN107454660B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Abstract

The disclosure relates to a network-residing method and device after authentication failure, belonging to the technical field of electronics. The method comprises the following steps: in the process of carrying out network access processing based on a first network type, when detecting that authentication of user identity identification card fails and enters an invalid state, determining a second network type supported by a terminal except the first network type; and switching to the second network standard, and performing network access processing based on the second network standard. By adopting the method and the device, the network access can be retried after the network modes are switched, and the network access waiting time is shortened.

Description

Network residing method and device after authentication failure
Technical Field
The present disclosure relates to the field of electronic technologies, and in particular, to a method and an apparatus for network residence after authentication failure.
Background
Generally, a bidirectional authentication scheme is adopted for authentication operations performed in a UMTS (Universal Mobile Telecommunications System) network and an LTE (Long Term Evolution) network, that is, a network-side device needs to authenticate a terminal and the terminal also needs to authenticate a network-side device. However, in the process of bidirectional authentication, the terminal may fail to authenticate the network-side device. More common authentication failures include MAC (Media Address Control) failure and synchronization failure (sync failure).
For synchronization failures, some authentication failures are only temporary failures. However, according to the UMTS and LTE protocols, the network side device may refuse to perform authentication again in a short time if synchronization failure occurs twice in succession. Further, the terminal sets a Subscriber Identity Module (SIM) card to an invalid state. The terminal is in a offline state if the SIM card attempting to access the LTE network is in an invalid state.
In the related art, in order to automatically restore the terminal to the normal networking state from the offline state, the terminal automatically starts a timer when encountering an invalid state of the SIM card due to a continuously generated synchronization failure. And then, after the time set by the timer is over, the networking is retried and the SIM card is authenticated. The timer is set because the network side device will refuse the terminal to authenticate again in a short time.
In the above-mentioned technology, although this way may make the SIM card network successfully, since the network side device is specified in the communication protocol not to repeatedly process the authentication request of the terminal within a short time after the terminal fails to authenticate, the time set by the timer cannot be too short, which may result in too long network access waiting time.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a network residence method after authentication failure. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, a method for camping after authentication failure is provided, the method includes:
in the process of carrying out network access processing based on a first network type, when detecting that authentication of user identity identification card fails and enters an invalid state, determining a second network type supported by a terminal except the first network type;
and switching to the second network standard, and performing network access processing based on the second network standard.
By the method provided by the embodiment of the disclosure, when the user identity identification card is detected to fail in authentication and enter an invalid state, the operation of switching the first network system to the second network system can be automatically initiated, and the network access processing is performed based on the second network system, so that the network access is retried after the network system is switched.
Optionally, the first network system is any one of the following network systems: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, 3G and 2G.
Optionally, determining a second network type supported by the terminal, which is different from the first network type, includes:
determining the highest level network standard supported by the terminal except the first network standard;
and determining the highest level network standard as a second network standard.
If the first network system is unavailable, the highest-level network system except the first network system is selected at first, so that the terminal can be ensured to communicate through the highest-level network system except the first network system, and the communication quality is improved.
Optionally, the network formats are 5G, 4G, 3G and 2G from high level to low level.
Optionally, performing network access processing based on the second network type includes:
sending a network access request to a base station corresponding to the second network type;
receiving authentication information returned by the base station based on the network access request;
and under the second network mode, performing authentication operation based on the authentication information.
Different network systems are carried in different base stations, so that if the terminal switches the network systems, the base station corresponding to the second network system is searched for authentication.
Optionally, the second network system is a network system needing authentication, wherein the second network system needing authentication is a network system other than 2G;
the method further comprises the following steps:
and when the authentication failure of the network access processing based on the second network standard is detected, switching to a preset third network standard without authentication, and performing the network access processing based on the third network standard, wherein the third network standard is 2G.
Since the third network system does not need authentication, the success rate of network residence is greatly increased. If the network under the second network system also fails to be parked, the network under the third network system without authentication can be tried to be parked.
According to a second aspect of the embodiments of the present disclosure, there is provided a network-residing apparatus after authentication failure, the apparatus including:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a second network type supported by a terminal except a first network type when detecting that authentication of user identity identification card fails and the user identity identification card enters an invalid state in the process of carrying out network access processing based on the first network type;
and the first switching module is used for switching to the second network standard and carrying out network access processing based on the second network standard.
Optionally, the first network system is any one of the following network systems: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, 3G and 2G.
Optionally, the determining module includes:
the first determining unit is used for determining the highest level network standard supported by the terminal except the first network standard;
and the second determining unit is used for determining the highest-level network system as a second network system.
Optionally, the network formats are 5G, 4G, 3G and 2G from high level to low level.
Optionally, the first switching module comprises:
a sending unit, configured to send a network access request to a base station corresponding to the second network type;
a receiving unit, configured to receive authentication information returned by the base station based on the network access request;
and the authentication unit is used for performing authentication operation based on the authentication information under the second network mode.
Optionally, the second network system is a network system needing authentication, wherein the second network system needing authentication is a network system other than 2G;
the device further comprises:
and the second switching module is used for switching to a preset third network standard without authentication when the authentication failure of the network access processing based on the second network standard is detected, and performing the network access processing based on the third network standard, wherein the third network standard is 2G.
According to a third aspect of the embodiments of the present disclosure, there is provided a terminal, where the terminal includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or a set of instructions, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement the above-mentioned network hosting method after authentication failure.
According to a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, where at least one instruction, at least one program, a code set, or a set of instructions is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the above-mentioned network hosting method after authentication failure.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
by the method provided by the embodiment of the disclosure, when the user identity identification card is detected to fail in authentication and enter an invalid state, the operation of switching the first network system to the second network system can be automatically initiated, and the network access processing is performed based on the second network system, so that the network access is retried after the network system is switched.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a method of web hosting after an authentication failure in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a method of web hosting after an authentication failure in accordance with an exemplary embodiment;
fig. 3 is a schematic diagram illustrating a network-residing device after authentication failure according to an exemplary embodiment;
fig. 4 is a schematic diagram illustrating a network-residing device after authentication failure according to an exemplary embodiment;
fig. 5 is a schematic diagram illustrating a network-residing device after authentication failure according to an exemplary embodiment;
fig. 6 is a schematic diagram illustrating a network-residing device after authentication failure according to an exemplary embodiment;
fig. 7 is a schematic diagram illustrating a structure of a terminal according to an exemplary embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the invention provides a network residence method after authentication failure, which can be realized by a terminal. The terminal can be a mobile phone, a tablet computer, a desktop computer, a notebook computer and the like. The terminal may include a processor, memory, transceiver, etc. The processor may be a CPU (Central Processing Unit), and the like, and may be configured to detect whether the user identification card enters an invalid state due to authentication failure, determine a second network system supported by the terminal, which is different from the first network system, switch the first network system to the second network system, perform network access Processing based on the second network system, and the like. The Memory may be a Random Access Memory (RAM), a Flash Memory (Flash Memory), or the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, or the like, such as authentication information returned by the network side device. Further, the transceiver may include an antenna, a matching circuit, a modem, and the like. The transceiver can be used for data transmission with network side equipment such as a base station, so as to perform SIM card-based authentication operation, voice call and other operations.
The terminal may also include input components, display components, audio output components, and the like. The input component may be a touch screen, a keyboard, a mouse, etc. The audio output component may be a speaker, headphones, or the like.
An exemplary embodiment of the present disclosure provides a network residence method after authentication failure, as shown in fig. 1, a processing flow of the method may include the following steps:
step S110, in the process of carrying out network access processing based on the first network type, when the SIM card authentication is detected to fail and the SIM card enters an invalid state, determining a second network type supported by the terminal except the first network type.
Optionally, the first network system is any one of the following network systems: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, 3G and 2G.
Because the terminal can communicate more safely in the high-level network system and the data transmission is faster, the terminal can preferentially select to access the network in the high-level network system. It should be noted that, networks in high-level network systems such as 4G and 3G generally adopt a bidirectional authentication scheme for authentication. In the process of bidirectional authentication, a phenomenon that the terminal fails in authentication with the network-side device may occur, and the authentication failure includes MAC failure and synchronization failure, which are relatively common. According to the UMTS and LTE protocols, if synchronization failure occurs twice continuously, the network side equipment can refuse the terminal to authenticate again in a short time. Further, the terminal sets the SIM card to an invalid state.
For synchronization failure, the authentication parameters sent by the terminal in the receiving network side device include SQN (sequence number), and the terminal can authenticate the network side device based on the sequence number: the terminal can verify whether the SQN is in an effective range or not based on a preset verification rule, and if the SQN is not in the effective range, a synchronization failure can occur. The SQN is set to prevent other people from impersonating network side equipment to intercept the authentication parameters of the legal user terminal, and the intercepted old authentication parameters are used for linking the terminal of the legal user.
In implementation, when it is detected that the SIM card authentication fails and enters an invalid state, a second network type supported by the terminal may be determined, except for the first network type. For example, a mobile phone supporting 4G and 3G networks performs authentication after being powered on, and first, the mobile phone automatically selects the 4G network. Next, the network access process is performed based on the 4G network, but synchronization failure may occur twice in succession, and the SIM card is set to the invalid state. Therefore, the mobile phone can detect that the SIM card enters an invalid state. Based on the method provided by this embodiment, the mobile phone will continue to determine other network types supported by the mobile phone, such as 3G network, besides 4G network.
Optionally, in a case that the terminal cannot successfully access the network of the first network standard, the highest-level network standard supported by the terminal except the first network standard may be preferentially selected to try network access again. The network standards are 5G, 4G, 3G and 2G from high level to low level. Accordingly, as shown in fig. 2, step S110 may include: step S210, determining the highest level network standard supported by the terminal except the first network standard; step S220, determining the highest-level network type as the second network type.
It should be noted that, because the terminal performs communication in a high-level network system more safely and data transmission is faster, when a network accessing the first network system fails, network access can be attempted again based on the highest-level network system among other network systems except the first network system, so as to ensure that the mobile phone operates in a high-quality network environment in a possible situation.
For example, a mobile phone supporting 4G, 3G, and 2G, GPRS networks performs authentication operation after being powered on, and determines that the selectable network standard is a 3G or 2G, GPRS network when it is detected that the network access based on the first network standard, for example, 4G, fails. Then, the mobile phone can query and compare in a preset network system level list, and determine that the network system level corresponding to the 3G network is the highest, so that it is determined that the highest level network system supported by the terminal except the first network system is the 3G network. And finally, determining the 3G network as a second network system.
Of course, if the terminal fails to perform network access under the 3G network first, the 4G network may be preferentially selected to attempt network access again.
And step S120, switching to a second network type, and performing network access processing based on the second network type.
Optionally, the specific processing procedure of performing the network access processing based on the second network type may be as follows: sending a network access request to network side equipment corresponding to the second network type; receiving authentication information returned by the network side equipment based on the network access request; and under the second network mode, performing authentication operation based on the authentication information.
In implementation, when the terminal fails to access the network of the first network type, the terminal may not send a failure report to the first network-side device corresponding to the network of the first network type, and may directly and actively send an authentication request to the second network-side device corresponding to the network of the second network type, so as to quickly attempt to access the network of the second network type. And when the second network side equipment receives the authentication request, the encrypted data is returned to the terminal, the terminal analyzes the encrypted data based on the authentication information in the local SIM card after receiving the encrypted data, and returns the analysis result to the second network side equipment. And after the second network side equipment receives the analysis result, matching the analysis result with the local authentication data of the second network side equipment, and if the matching is successful, the second network side equipment successfully authenticates the terminal.
In a communication system, taking a 2G network as an example, during a network access process, a terminal first generates an authentication request and sends the authentication request to an MSC (Mobile Switching Center). Then, the MSC requests Authentication parameters from an AUC (Authentication Center). Then, AUC calculates sres (i) by a3 one-way algorithm (an algorithm for encrypting the process of transmitting 2G communication transmission information) according to a random number generated by the random number generator and KI (Key Identifier), and sends an authentication parameter including the random number and sres (i) to MSC. Then, MSC stores SRES (i) in received authentication parameters in local, generates user side authentication request based on random number and sends the request to terminal through base station. The terminal calculates RES (i) according to the received random number and KI pre-stored locally through the still A3 algorithm. Subsequently, the terminal generates a user authentication response based on res (i) and sends it to the MSC. Finally, MSC compares RES (i) with SRES (i), if RES (i) is equal to SRES (i), the authentication is successful, if not, the authentication is failed.
Optionally, when the network access processing based on the second network type still fails, a network type easy to be successfully authenticated may be selected for network access. Correspondingly, the second network standard is a network standard needing authentication, wherein the second network standard needing authentication is a network standard except for 2G; the method provided by the embodiment further comprises the following steps: and when the authentication failure of the network access processing based on the second network standard is detected, switching to a preset third network standard without authentication, and performing the network access processing based on the third network standard, wherein the third network standard is 2G.
The 2G network adopts a one-way authentication scheme, the terminal does not need to authenticate the network side equipment, and because the terminal only authenticates the terminal by the network side equipment, the synchronization failure which can be caused by the authentication of the terminal to the network side equipment can not occur, and furthermore, the one-way authentication scheme of the 2G network is easier to ensure the successful authentication compared with the two-way authentication scheme of the 4G and 3G networks.
Based on the method provided by the embodiment, after the authentication is successful, the network signal of the cell base station can be searched, and the network selection operation can be performed after the available network signal is searched, so that the network signal which is stable and has high signal strength can be selected for network camping. After the network is successfully established, the terminal can normally communicate.
By the method provided by the embodiment of the disclosure, when the user identity identification card is detected to fail in authentication and enter an invalid state, the operation of switching the first network system to the second network system can be automatically initiated, and the network access processing is performed based on the second network system, so that the network access is retried after the network system is switched.
Another exemplary embodiment of the present disclosure provides a network-residing apparatus after authentication failure, as shown in fig. 3, the apparatus including:
the determining module 310 is configured to, in a process of performing network access processing based on a first network type, determine, when it is detected that authentication of a user identity card fails and enters an invalid state, a second network type supported by a terminal, which is different from the first network type.
The first switching module 320 is configured to switch to the second network standard, and perform network access processing based on the second network standard.
Optionally, the first network system is any one of the following network systems: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, 3G and 2G.
Optionally, as shown in fig. 4, the determining module 310 includes:
a first determining unit 411, configured to determine a highest-level network standard supported by the terminal, except for the first network standard;
a second determining unit 412, configured to determine the highest-level network type as a second network type.
Optionally, the network formats are 5G, 4G, 3G and 2G from high level to low level.
Optionally, as shown in fig. 5, the first switching module 320 includes:
a sending unit 511, configured to send a network access request to a base station corresponding to the second network type;
a receiving unit 512, configured to receive authentication information returned by the base station based on the network access request;
an authentication unit 513, configured to perform an authentication operation based on the authentication information in the second network format.
Optionally, the second network system is a network system needing authentication, wherein the second network system needing authentication is a network system other than 2G;
as shown in fig. 6, the apparatus further includes:
and the second switching module is used for switching to a preset third network standard without authentication when the authentication failure of the network access processing based on the second network standard is detected, and performing the network access processing based on the third network standard, wherein the third network standard is 2G.
By the device provided by the embodiment of the disclosure, when the user identity identification card is detected to fail in authentication and enter an invalid state, the operation of switching the first network system to the second network system can be automatically initiated, and the network access processing is performed based on the second network system, so that the network access is retried after the network system is switched.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
It should be noted that: in the network-resident device after authentication failure provided in the above embodiment, only the division of the above functional modules is used for illustration when performing network-resident authentication, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the network residence device after authentication failure and the network residence method after authentication failure provided by the above embodiments belong to the same concept, and the specific implementation process thereof is detailed in the method embodiments and will not be described herein again.
Yet another exemplary embodiment of the present disclosure shows a structural diagram of a terminal. The terminal can be a mobile phone, a tablet computer, a desktop computer, a notebook computer, etc.
Referring to fig. 7, terminal 700 may include one or more of the following components: a processing component 702, a memory 704, a power component 706, a multimedia component 708, an audio component 710, an input/output (I/O) interface 712, a sensor component 714, and a communication component 716.
The processing component 702 generally controls overall operation of the terminal 700, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing element 702 may include one or more processors 720 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 702 may include one or more modules that facilitate interaction between the processing component 702 and other components. For example, the processing component 702 can include a multimedia module to facilitate interaction between the multimedia component 708 and the processing component 702.
The memory 704 is configured to store various types of data to support operation at the terminal 700. Examples of such data include instructions for any application or method operating on terminal 700, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 704 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 706 provides power to the various components of terminal 700. The power components 706 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the audio output device 700.
The multimedia component 708 comprises a screen providing an output interface between the terminal 700 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 708 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the terminal 700 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 710 is configured to output and/or input audio signals. For example, the audio component 710 includes a Microphone (MIC) configured to receive external audio signals when the audio output device 700 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 704 or transmitted via the communication component 716.
The I/O interface 712 provides an interface between the processing component 702 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 714 includes one or more sensors for providing various aspects of state assessment for the terminal 700. For example, sensor assembly 714 can detect an open/closed state of terminal 700, relative positioning of components, such as a display and keypad of terminal 700, change in position of terminal 700 or a component of terminal 700, presence or absence of user contact with terminal 700, orientation or acceleration/deceleration of terminal 700, and temperature change of terminal 700. The sensor assembly 714 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 714 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 714 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 716 is configured to facilitate communications between the terminal 700 and other devices in a wired or wireless manner. The terminal 700 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication section 716 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 716 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal 700 can be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a computer-readable storage medium comprising instructions, such as the memory 704 comprising instructions, executable by the processor 720 of the terminal 700 to perform the above-described method is also provided. For example, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Yet another embodiment of the present disclosure provides a computer-readable storage medium, in which instructions, when executed by a processor of a terminal, enable the terminal to perform:
in the process of carrying out network access processing based on a first network type, when detecting that authentication of user identity identification card fails and enters an invalid state, determining a second network type supported by a terminal except the first network type;
and switching to the second network standard, and performing network access processing based on the second network standard.
Optionally, the first network system is any one of the following network systems: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, 3G and 2G.
Optionally, determining a second network type supported by the terminal, which is different from the first network type, includes:
determining the highest level network standard supported by the terminal except the first network standard;
and determining the highest level network standard as a second network standard.
Optionally, the network formats are 5G, 4G, 3G and 2G from high level to low level.
Optionally, performing network access processing based on the second network type includes:
sending a network access request to a base station corresponding to the second network type;
receiving authentication information returned by the base station based on the network access request;
and under the second network mode, performing authentication operation based on the authentication information.
Optionally, the second network system is a network system needing authentication, wherein the second network system needing authentication is a network system other than 2G;
the method further comprises the following steps:
and when the authentication failure of the network access processing based on the second network standard is detected, switching to a preset third network standard without authentication, and performing the network access processing based on the third network standard, wherein the third network standard is 2G.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A network residing method after authentication failure, the method comprising:
in the process of carrying out network access processing based on a first network standard, when detecting that a user identity identification card continuously generates synchronization failure and enters an invalid state, directly determining a second network standard supported by a terminal except the first network standard without sending a failure report to a first network side device corresponding to a network of the first network standard, wherein the second network standard is the highest-level network standard except the first network standard;
switching to the second network standard, and performing network access processing again based on the second network standard;
the second network standard is a network standard needing authentication, wherein the second network standard needing authentication is a network standard except for 2G;
the method further comprises the following steps:
when the authentication failure of the network access processing based on the second network standard is detected, switching to a preset third network standard without authentication, and performing the network access processing based on the third network standard, wherein the third network standard is 2G;
and after the authentication is successful, searching the network signals of the cell base station, and after the available network signals are searched, selecting stable network information with high signal strength to camp on the network.
2. The method according to claim 1, wherein the first network standard is any one of the following network standards: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, and 3G, wherein the first network standard is different from the second network standard.
3. The method of claim 1, wherein the network formats are 5G, 4G, 3G, and 2G from high level to low level.
4. The method of claim 1, wherein performing network access processing based on the second network standard comprises:
sending a network access request to a base station corresponding to the second network type;
receiving authentication information returned by the base station based on the network access request;
and under the second network mode, performing authentication operation based on the authentication information.
5. A network-residing device after authentication failure, the device comprising:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for directly determining a second network type supported by a terminal except a first network type when detecting that a user identity identification card continuously generates synchronous failure and enters an invalid state in the process of carrying out network access processing based on the first network type and does not send a failure report to a first network side device corresponding to a network of the first network type, and the second network type is the highest-level network type except the first network type;
the first switching module is used for switching to the second network standard and carrying out network access processing again based on the second network standard;
the second network standard is a network standard needing authentication, wherein the second network standard needing authentication is a network standard except for 2G;
the second switching module is used for switching to a preset third network standard without authentication when authentication failure is detected in network access processing based on the second network standard, and performing network access processing based on the third network standard, wherein the third network standard is 2G;
and the network residing module is used for searching the network signals of the cell base station after the authentication is successful, and selecting the stable network information with high signal strength for network residing after the available network signals are searched.
6. The apparatus according to claim 5, wherein the first network standard is any one of the following network standards: 5G, 4G, 3G; the second network standard is any one of the following network standards: 5G, 4G, and 3G, wherein the first network standard is different from the second network standard.
7. The apparatus of claim 5, wherein the network system is 5G, 4G, 3G, 2G from high level to low level.
8. The apparatus of claim 5, wherein the first switching module comprises:
a sending unit, configured to send a network access request to a base station corresponding to the second network type;
a receiving unit, configured to receive authentication information returned by the base station based on the network access request;
and the authentication unit is used for performing authentication operation based on the authentication information under the second network mode.
9. A terminal, characterized in that the terminal comprises a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes or a set of instructions, and the at least one instruction, the at least one program, the set of codes or the set of instructions is loaded and executed by the processor to implement the method for camping on network after authentication failure according to any one of claims 1-4.
10. A computer-readable storage medium, wherein at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the storage medium, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by a processor to implement the method for web hosting after authentication failure according to any one of claims 1-4.
CN201710669740.8A 2017-08-08 2017-08-08 Network residing method and device after authentication failure Active CN107454660B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710669740.8A CN107454660B (en) 2017-08-08 2017-08-08 Network residing method and device after authentication failure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710669740.8A CN107454660B (en) 2017-08-08 2017-08-08 Network residing method and device after authentication failure

Publications (2)

Publication Number Publication Date
CN107454660A CN107454660A (en) 2017-12-08
CN107454660B true CN107454660B (en) 2021-03-16

Family

ID=60489553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710669740.8A Active CN107454660B (en) 2017-08-08 2017-08-08 Network residing method and device after authentication failure

Country Status (1)

Country Link
CN (1) CN107454660B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108495300B (en) * 2018-03-07 2021-10-15 龙尚科技(上海)有限公司 Mobile network mode switching method, device, terminal and storage medium
CN111955028B (en) * 2018-04-10 2022-02-22 中兴通讯股份有限公司 Single radio frequency voice call continuity for 5G wireless networks
CN108566661A (en) * 2018-04-12 2018-09-21 宇龙计算机通信科技(深圳)有限公司 A kind of access control method, device and mobile terminal
CN112738794B (en) * 2021-01-07 2022-09-27 展讯半导体(成都)有限公司 Network residing method, chip, mobile terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102264058A (en) * 2010-05-27 2011-11-30 中国移动通信集团河南有限公司 Subscriber identity card control method, device and system
CN105046132A (en) * 2015-07-20 2015-11-11 深圳上高医疗电子科技有限公司 Method for selecting mobile network or card and mobile terminal
CN105554697A (en) * 2015-09-29 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Network access method and terminal
CN105939525A (en) * 2016-06-22 2016-09-14 努比亚技术有限公司 Mobile terminal and cell reselection control method
EP3139665A1 (en) * 2004-08-09 2017-03-08 BlackBerry Limited Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101541062B (en) * 2009-03-06 2012-07-04 华为技术有限公司 Roaming network access method and equipment
CN101959190A (en) * 2009-07-13 2011-01-26 华为技术有限公司 Method, device and system for controlling access subdistrict
CN103327514B (en) * 2012-03-19 2016-12-21 华为技术有限公司 Information recording method, information getting method, equipment and system
CN103428793A (en) * 2012-05-14 2013-12-04 中兴通讯股份有限公司 Intersystem switching processing method, switching method and switching device
CN102857910A (en) * 2012-06-01 2013-01-02 王鑫 Wireless communication system based on a plurality of types of wireless networks
CN104333856B (en) * 2014-11-08 2017-11-24 北京握奇数据系统有限公司 A kind of Java SIM cards turn method, SIM card, server and the system of net
EP3151599A1 (en) * 2015-09-30 2017-04-05 Apple Inc. Authentication failure handling for cellular network access through wlan
CN106210042B (en) * 2016-07-11 2019-06-18 清华大学 A kind of user service request selection method based on end to end network slice
CN106028331B (en) * 2016-07-11 2020-03-10 华为技术有限公司 Method and equipment for identifying pseudo base station
CN106899966B (en) * 2017-03-25 2020-07-17 吉林东电能源发展有限公司 Network mode automatic selection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3139665A1 (en) * 2004-08-09 2017-03-08 BlackBerry Limited Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
CN102264058A (en) * 2010-05-27 2011-11-30 中国移动通信集团河南有限公司 Subscriber identity card control method, device and system
CN105046132A (en) * 2015-07-20 2015-11-11 深圳上高医疗电子科技有限公司 Method for selecting mobile network or card and mobile terminal
CN105554697A (en) * 2015-09-29 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Network access method and terminal
CN105939525A (en) * 2016-06-22 2016-09-14 努比亚技术有限公司 Mobile terminal and cell reselection control method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Authentication Signalling Improvement with Backoff Timer for SCM;Alcatel-Lucent, Alcatel-Lucent Shanghai Bell, AT&T, Verizon;《3GPP TSG-CT WG1 Meeting #95bis C1-160127》;20160105;全文 *

Also Published As

Publication number Publication date
CN107454660A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
US20230300793A1 (en) Method for sending paging cause and method for acquiring paging cause
US10237901B2 (en) Method and apparatus for connecting with controlled smart device, and storage medium
CN107454660B (en) Network residing method and device after authentication failure
CN108811179B (en) Wireless network connection method, device and storage medium
CN106454998B (en) Wireless local area network access method, device and terminal
CN107094094B (en) Application networking method and device and terminal
CN107404723B (en) Method and device for accessing base station
US11310694B2 (en) Method and device for receiving downlink data during RRC inactive state
CN109041145B (en) Communication method, communication device, terminal and storage medium
EP3972302A1 (en) Network registration method, apparatus and system, and storage medium
CN107949037B (en) Network access method, device and system, and storage medium
CN113407427A (en) Verification information processing method and device, terminal equipment and storage medium
CN113382474A (en) Method, device and medium for processing paging conflict of dual-card mobile phone
CN107105005B (en) Method and device for synchronizing data
CN107040949B (en) Network residing method, device and computer readable storage medium
CN106714255B (en) Voice call processing method, device and terminal
CN106792570B (en) Positioning method and device
CN114980257B (en) Method, device, mobile terminal and storage medium for displaying network identification information
CN113016200B (en) Capability interaction method and device, interaction triggering method and device
CN113259927B (en) Terminal capability updating method, device and storage medium
CN108696914B (en) Method and device for scanning intelligent equipment and storage medium
CN109151829B (en) Pseudo base station identification method and device
CN112910906B (en) Data access method and device, mobile terminal and storage medium
CN112261698B (en) Method and device for accessing network, terminal and storage medium
US20220104003A1 (en) Random access method and apparatus, and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant