CN107734533B - Method for detecting terminal access and related product - Google Patents

Method for detecting terminal access and related product Download PDF

Info

Publication number
CN107734533B
CN107734533B CN201710996074.9A CN201710996074A CN107734533B CN 107734533 B CN107734533 B CN 107734533B CN 201710996074 A CN201710996074 A CN 201710996074A CN 107734533 B CN107734533 B CN 107734533B
Authority
CN
China
Prior art keywords
apn
emulator
simulator
sends
base stations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710996074.9A
Other languages
Chinese (zh)
Other versions
CN107734533A (en
Inventor
史同井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Oppo Communication Technology Co ltd
Original Assignee
Chengdu Oppo Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Oppo Communication Technology Co ltd filed Critical Chengdu Oppo Communication Technology Co ltd
Priority to CN201710996074.9A priority Critical patent/CN107734533B/en
Publication of CN107734533A publication Critical patent/CN107734533A/en
Application granted granted Critical
Publication of CN107734533B publication Critical patent/CN107734533B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Abstract

The present disclosure provides a method for detecting terminal access and a related product, the method includes the following steps: the method comprises the steps that an emulator receives a first registration request sent by User Equipment (UE), and sends a first registration response to the UE to determine that the UE is successfully registered; the simulator inquires a first Access Point Name (APN) registered by UE according to a Public Land Mobile Network (PLMN) of a current network, and determines whether the UE sends a second APN, if so, the simulator compares whether the first APN is the same as the second APN; and if the simulator determines that the first APN is the same as the second APN, determining that the UE checks isomorphism, if the APN is different from the APN, determining that the UE fails in checking, and sending a checking failure message to the UE. The technical scheme provided by the invention has the advantage of high user experience.

Description

Method for detecting terminal access and related product
Technical Field
The invention relates to the technical field of communication, in particular to a method for detecting terminal access and a related product.
Background
As society continues to evolve, more and more people need to run around the globe for work, life, and the like. But due to the terminal, the internet cannot be accessed under some operator networks. But cannot timely contact with colleagues and family members. Therefore, work or life is easily affected, most of the reasons for different internet Access are caused by wrong setting of Access Point Name (APN), and due to the fact that the number of global operators is so many, a plurality of terminal manufacturers omit APNs of some operators, so that a user cannot realize data services, and user experience is low.
Disclosure of Invention
The embodiment of the invention provides a method for detecting terminal access and a related product, which can realize the advantages of preventing an intelligent mobile phone from being incapable of accessing APNs of certain operators after leaving a factory and improving the user experience.
In a first aspect, an embodiment of the present invention provides a method for detecting a terminal access, where the method includes the following steps: the method comprises the steps that an emulator receives a first registration request sent by User Equipment (UE), and sends a first registration response to the UE to determine that the UE is successfully registered; the simulator inquires a first Access Point Name (APN) registered by UE according to a Public Land Mobile Network (PLMN) of a current network, and determines whether the UE sends a second APN, if so, the simulator compares whether the first APN is the same as the second APN; and if the simulator determines that the first APN is the same as the second APN, determining that the UE checks isomorphism, if the APN is different from the APN, determining that the UE fails in checking, and sending a checking failure message to the UE.
Optionally, the verification failure message includes: the first APN.
Optionally, the method further includes:
the simulator receives a log sent by the UE, wherein the log comprises all operations from the first registration request to the check failure message;
and the simulator extracts the content of the log and performs data analysis on the content of the log to obtain a primary failure result.
In a second aspect, a method for detecting access of a terminal is provided, the method comprising the following steps: user Equipment (UE) sends a first registration request to the emulator; the UE receives a first registration response returned by the simulator; the UE creates a log that includes all operations between the first registration request to the verification failure message.
Optionally, the method further includes:
and the UE receives a check failure message sent by the simulator and sends the log to the simulator.
In a third aspect, a simulator is provided, the simulator comprising: the communication unit is used for receiving a first registration request sent by User Equipment (UE) and sending a first registration response to the UE to determine that the UE is successfully registered;
a processing unit, configured to query, according to a public land mobile network PLMN of a current network, a first access point name APN registered by a UE, determine whether the UE sends a second APN, and if the UE sends the second APN, compare whether the first APN is the same as the second APN, and if it is determined that the first APN is the same as the second APN, determine that the UE checks isomorphism, and if the APN is different from the APN, determine that the UE fails to check, and control the communication unit to send a check failure message to the UE.
Optionally, the communication unit is further configured to receive a log sent by the UE, where the log includes all operations from the first registration request to the verification failure message;
the processing unit is further configured to extract the content of the log, and perform data analysis on the content of the log to obtain a preliminary failure result.
The processing unit is further configured to extract a sending time t1 of a random access preamble sent by the UE when the UE selects to establish a connection with the emulator, query a random access response in the log, if the random access response is not queried, query whether a preamble value is zero, if the preamble value is not zero, determine that a preliminary failure result is an emulator configuration error, if the random access response is queried, determine a receiving time t2 of the random access response, if t2-t1 are greater than a time threshold, and determine that the preliminary failure result is a processing delay error.
The processing unit is further configured to query all APNs in the log, determine whether all APNs have the first APN, if so, determine that the preliminary failure result may be a registration error for the UE, and if not, determine that the preliminary failure result may be a configuration error for the APN of the UE.
In a fourth aspect, a user equipment is provided, the user equipment comprising: a communication unit for sending a first registration request to the emulator; the UE receives a first registration response returned by the simulator; a processing unit for creating a log comprising all operations between the first registration request to the verification failure message.
In a fifth aspect, there is provided an emulator, the device comprising one or more processors, memory, a transceiver, a camera module, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps of the method of the first aspect.
In a sixth aspect, a smart device is provided, the device comprising one or more processors, memory, a transceiver, a camera module, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps of the method provided in the second aspect.
In a seventh aspect, a computer-readable storage medium is provided, which stores a computer program for electronic data exchange, wherein the computer program causes a computer to execute the method provided in the first or second aspect.
In an eighth aspect, there is provided a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform the method provided by the first or second aspect.
The embodiment of the invention has the following beneficial effects:
therefore, the embodiment of the invention realizes the test on the abnormity of the APN of the UE, so that the UE with the abnormal APN can not leave the factory, the success rate of data access of the UE leaving the factory is improved, and the experience degree of a user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a mobile terminal.
Fig. 1A is a schematic diagram of a network architecture.
Fig. 2 is a schematic diagram of a terminal communication flow.
Fig. 3 is a flowchart illustrating a method for detecting terminal access according to an embodiment of the present invention.
Fig. 4A is a schematic structural diagram of a simulator according to an embodiment of the present invention.
Fig. 4B is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
Fig. 5A is a schematic diagram of a hardware structure of an emulator according to an embodiment of the present invention.
Fig. 5B is a schematic diagram of a hardware structure of an intelligent device according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a mobile terminal disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of the invention and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a Mobile terminal, and as shown in fig. 1, the Mobile terminal may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile Internet device (MID, Mobile Internet Devices), a wearable device, and the like. Of course, in practical applications, the user equipment is not limited to the above presentation form, and may also include: intelligent vehicle-mounted terminal, computer equipment, intelligent wrist-watch etc.. As shown in fig. 1, the terminal includes: the communication module 103 may be a Long Term Evolution (LTE) communication module or a 2G communication module in practical application, and in practical application, the LTE communication module and the 2G communication module may also be integrated together.
Referring to fig. 1A, fig. 1A may be a schematic diagram of a network architecture, as shown in fig. 1A, there are multiple MSCs on the core network side, and fig. 1A takes two MSCs as an example, and for convenience of distinction, the MSCs 1 and 2 are taken as examples here. For the UE, after it establishes network connection through the eNB, if the GERAN1 is the first operator base station, at this time, the GERAN2 is the second operator base station.
Fig. 2 shows a flow of terminal communication, and a call flow is implemented under the network architecture shown in fig. 1A, in this case, the call flow is shown in fig. 2.
Step S200, UE sends MT call to eNB;
step S201, the eNB forwards the MT call to the MME,
step S202, the eNB sends CC _ SETUP to the UE to establish connection.
Step S203, the UE receives a Distributed Denial of Service (ddos) attack.
Step S204, the UE starts a cell reselection function and starts a frequency point search function to search frequency points (60, 75, 85, 95 and 100).
Step S205, the UE selects the GERAN2 corresponding to the frequency point 60 to initiate an access request.
Step S206, the UE receives the CC _ SETUP returned by the GERAN2 to establish connection.
As shown in the flowchart of fig. 2, the flowchart is a flowchart for accessing GERAN2, for this reason, it is necessary to determine whether the UE accesses GERAN2, so as to implement detection on the UE, and if the UE does not set the APN of GERAN2, the UE may not access GERAN2, so that the UE may not provide service for the user, and the experience of the user is affected.
Referring to fig. 3, fig. 3 provides a method for detecting a terminal access, which is performed by an emulator, the emulator being located in a detection system, the detection system including: the system comprises an LTE cell and a GSM cell, wherein the GSM cell comprises at least two base stations, a first base station belongs to a first operator, a second base station belongs to a second operator, and a simulator is connected with the two base stations. The method is shown in fig. 3, and comprises the following steps:
step S300, UE sends a first registration request to an emulator;
step S301, the simulator returns a first registration response to the UE to determine that the UE is successfully registered;
step S302, the simulator inquires UE to register a first APN according to a Public Land Mobile Network (PLMN) of a current network;
step S303, the emulator determines whether the UE sends a second APN, if the emulator determines that the UE does not report the second APN, the emulator compares whether the first APN is the same as the second APN or not if the terminal passes the detection, if the emulator determines that the UE sends the second APN;
step S304, if the first APN is the same as the second APN, the simulator determines that the APN of the UE passes the check.
Step S305, if the first APN is different from the second APN, the simulator determines that the APN fails to check, and sends a check failure message to the UE.
The technical scheme provided by the invention realizes the inspection of whether the APN of the UE is abnormal, so that the UE with the abnormal APN cannot leave a factory, the data access success rate of the UE leaving the factory is improved, and the experience degree of a user is improved.
The steps of the method provided in the embodiment shown in fig. 3 have different technical solutions in different combinations, for example, the combination of the above steps S301, S302, S303, S304, S305 and S306 may be a method for detecting terminal access on the emulator side provided in the first aspect.
Optionally, the method may further include:
the detection failure message includes: a first APN.
The entry check failure message may be a self-defined identifier, and certainly, a general identifier may also be used in practical application, and the specific embodiment of the present invention does not limit the specific representation form of the identifier, where the failed first APN is returned to the UE, so that the UE can adjust the content of the log record, and a debugging person can more accurately obtain the reason for the error of the second APN of the UE.
The message of the detection failure may be represented in various ways, for example, in an optional technical solution of the present invention, the message of the detection failure may be a NACK message, and in practical applications, the message of the detection failure may also be a NACK message carrying a continuous number, for example, 9 continuous 1 or 10 continuous zeros, etc. Of course, in practical applications, the detection failure message may also be a newly set message.
Optionally, the method further includes:
the UE logs when sending the first registration request to the emulator, the log including all operations of the UE between the first registration request to the verification failure message.
Optionally, all the operations and instructions described above may further include but are not limited to: sending a first registration request at the UE to all operations that receive the verification failure message, including but not limited to: one or any combination of received and sent messages, frequency point scanning times, frequency point scanning results, all APNs or execution commands.
Of course, all the operations described above may have other information, and the present invention does not limit all the information corresponding to all the operations described above.
Optionally, the method may further include:
and the simulator receives the log sent by the UE, extracts the content of the log, and performs data analysis on the content of the log to obtain a primary failure result.
The specific method for obtaining the preliminary failure result by performing data analysis on the log content may be as follows:
extracting the sending time t1 of the random access preamble sent by the UE when the UE establishes connection with the simulator, inquiring the random access response in the log, if the random access response is not inquired, inquiring whether the preamble value is zero, if the preamble value is not zero, determining that the preliminary failure result is simulator configuration error, if the random access response is inquired, determining the receiving time t2 of the random access response, if t2-t1 is larger than a time threshold, and determining that the preliminary failure result is processing delay error.
For the random access, the non-contention access and the contention access are distinguished, and different from the preamble number (preamble index) in the non-contention based random access, which is designated by the eNB, the preamble index of the contention based random access is randomly selected by the UE.
The UE first determines whether a preamble in group a or group B is selected. If there is preamble Group B, and msg3 of Group B is greater than msg3 of message Size Group A, and path loss (path loss) is less than PCMAX,C(a set threshold), selecting group B; otherwise, group A is selected.
If msg3 was sent before and the access failed, the preamble used in the re-access attempt should belong to the same group as the corresponding preamble when msg3 was sent for the first time.
After the group is determined, the UE randomly selects a preamble from the group and sets the time-frequency resource index to 0. For non-contention based random access, the eNB avoids collision and assigns a time-frequency resource index by allocating a dedicated preamble index to the UE.
There are two ways for eNB to allocate preamble Index and PRACH Mask Index:
the mode A is set through the fields of an ra-Preamble Index and an ra-PRACH-Mask Index of RACH-Config Dedicated;
and the mode B is set through Preamble Index and PRACH Mask Index fields of the DCI format 1A in the PDCCH order triggered random access (downlink data arrival or positioning).
If the eNB assigns a value of 0, the actual preamble index is handed over to the UE to select the preamble in a contention-based random access manner (this is mainly the case when the eNB has no available non-contention preamble or the eNodeB has not reserved the preamble for the non-contention random access at all when configured).
Selecting PRACH resources for sending a preamble; based on the PRACH-Config Index, the PRACH Mask Index, and the timing constraint of the physical layer, the UE will first determine the next available subframe containing the PRACH. The PRACH-ConfigIndex specifies the PRACH resources available in the time domain. The PRACH Mask Index defines which PRACH within a system frame a certain UE may send a preamble on. In non-contention based random access, the eNB may directly specify the UE to send the preamble on a certain PRACH through the mask, thereby ensuring that no collision occurs with other UEs.
Taking ra-PRACH-Mask Index 3 as an example, the corresponding PRACH Resource Index 2, that is, preamble should be sent in the third PRACH Resource in the system frame. The PRACH Resource Index is a number of PRACH resources in a system frame, and only Packet Random Access Channel (PRACH) resources exist on subframes 0,2,4,6, and 8, and the PRACH Resource Index 2 corresponds to the PARCH Resource on subframe 4; if the Uplink (UL)/Downlink (DL) configuration (configuration) is 1, the PRACH Resource Index 2 corresponds to the PARCH Resource on the quadruplet (0,0,1, 0). The PRACH Mask Index may be 0, which indicates that the eNB only allocates preamble to the UE, but the PRACH resource needs to be selected by the UE itself. If the UE receives one RAR MAC PDU at subframe n but none of the corresponding TBs correspond to the preamble it sends, the UE should be ready for transmission no later than subframe n +5And retransmitting the preamble within the time interval. If the UE does not receive one RAR MAC PDU at subframe n, which is the last subframe of the RAR window, the UE should be ready to retransmit the preamble no later than subframe n + 4. If the random access procedure is triggered by PDCCH order in subframe n, the UE will be in subframe n + k2Starting with the first subframe with available PRACH, where k2≧ 6. Up to this point, the subframe where the PRACH resides has been selected, and then we start to select the location on the frequency domain. In TDD mode and PRACH Mask Index 0: if the eNodeB designates the ra-Preamble Index and the value of the ra-Preamble Index is not 0, randomly selecting a PRACH on the subframe determined previously; otherwise, one PRACH is randomly selected in the previously determined subframe and two subsequent subframes (3 subframes in total). And if the FDD mode or the PRACH Mask Index is not 0, selecting one PRACH according to the PRACH Mask Index.
Determining a corresponding RA-RNTI
The time-frequency position of the preamble determines the value of the RA-RNTI, and after the UE sends the preamble, the UE monitors the corresponding PDCCH according to the RA-RNTI value in the RAR time window. The TARGET RECEIVED POWER PREAMBLE _ RECEIVED _ TARGET _ POWER is determined.
After the UE sends the preamble, it monitors the PDCCH in an RAR time window (RA Response window) to receive RAR corresponding to the RA-RNTI. If the RAR replied by the eNodeB is not received within the RAR time window, the random access procedure is considered to fail. The RAR time Window starts from the subframe where the preamble is sent (if the preamble spans multiple subframes in the time domain, the last subframe is used to calculate) +3 subframes, and ra-Response Window Size subframes are continued.
The specific method for obtaining the preliminary failure result by performing data analysis on the log content may be as follows:
the emulator queries all APNs in the log, determines whether all APNs have the first APN, if so, determines that the preliminary failure result may be a UE registration error, and if not, determines that the preliminary failure result may be a UE APN configuration error.
The specific method for obtaining the preliminary failure result by performing data analysis on the log content may be as follows:
and extracting the number of the packet random access signal resource identifier in the content of the log, determining whether the number of the packet random access signal resource identifier is legal or not, and if the number of the random access signal resource identifier is illegal, determining that the primary failure result is a packet service error.
For the number of the packet random access signal Resource identifier (PRACH Resource Index), one of the numbers is on an even subframe, and if the number is on an odd subframe, the number error may be a random access error or a timing error, which may cause the number error to occur, and thus may affect the access of the data service.
Referring to fig. 4A, fig. 4A provides a simulator, as shown in fig. 4A, including:
a communication unit 401, configured to receive a first registration request sent by a user equipment UE, and send a first registration response to the UE to determine that the UE is successfully registered;
a processing unit 402, configured to query, according to a public land mobile network PLMN of a current network, a first access point name APN registered by a UE, determine whether the UE sends a second APN, if the UE sends the second APN, compare whether the first APN is the same as the second APN, and if it is determined that the first APN is the same as the second APN, determine that the UE checks isomorphism, if the APN is different from the APN, determine that the UE fails to check, and control the communication unit to send a check failure message to the UE.
Optionally, the communication unit 401 is configured to receive a log sent by the UE, where the log includes all operations from the first registration request to the verification failure message; the processing unit 402 is further configured to extract the content of the log, and perform data analysis on the content of the log to obtain a preliminary failure result.
The processing unit 402 is further configured to extract a transmission time t1 of a random access preamble transmitted by the UE when the UE selects to establish a connection with the emulator, query a random access response in the log, if the random access response is not queried, query whether a preamble value is zero, if the preamble value is not zero, determine that a preliminary failure result is an emulator configuration error, if the random access response is queried, determine a reception time t2 of the random access response, if t2-t1 are greater than a time threshold, and determine that the preliminary failure result is a processing delay error.
The processing unit 402 is further configured to query all APNs in the log, determine whether all APNs have the first APN, if so, determine that the preliminary failure result may be a registration error for the UE, and if not, determine that the preliminary failure result may be a configuration error for the APN of the UE.
Referring to fig. 4B, as shown in fig. 4B, there is provided a user equipment, including:
a communication unit 406, configured to send a first registration request by the emulator; the UE receives a first registration response returned by the simulator;
a processing unit 407 for creating a log comprising all operations between the first registration request to the verification failure message.
Optionally, the processing unit 407 is further configured to extract a sending time t1 of a random access preamble sent by the UE when the UE selects to establish a connection with the emulator, query a random access response in the log, if the random access response is not queried, query whether a preamble value is zero, if the preamble value is not zero, determine that a preliminary failure result is an emulator configuration error, if the random access response is queried, determine a receiving time t2 of the random access response, if t2-t1 are greater than a time threshold, and determine that the preliminary failure result is a processing delay error.
Optionally, the processing unit 407 is further configured to extract a number of the packet random access signal resource identifier in the content of the log, determine whether the number of the packet random access signal resource identifier is legal, and determine that the preliminary failure result is a packet service error if the number of the packet random access signal resource identifier is illegal.
Referring to fig. 5A, fig. 5A provides an emulator, the device comprising one or more processors 501, memory 502, a transceiver 503, a detection module 504, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the emulator side steps of the method of detecting terminal access.
Referring to fig. 5B, fig. 5B provides a smart device comprising one or more processors 506, memory 507, a transceiver 508, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs including instructions for performing the steps in the method of detecting access by a terminal on the UE side.
Fig. 6 is a block diagram illustrating a partial structure of a mobile phone related to a mobile terminal according to an embodiment of the present invention. Referring to fig. 6, the handset includes: radio Frequency (RF) circuit 910, memory 920, input unit 930, sensor 950, audio circuit 960, Wireless Fidelity (WiFi) module 970, application processor AP980, communication module 991, and power supply 990. Those skilled in the art will appreciate that the handset configuration shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 6:
the communication module 991 may be specifically an LTE communication module.
The input unit 930 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 930 may include a touch display 933, a fingerprint recognition device 931, and other input devices 932. The fingerprint recognition device 931 is coupled to the touch display screen 933. The input unit 930 may also include other input devices 932. In particular, other input devices 932 may include, but are not limited to, one or more of physical keys, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like. The touch display screen 933 is configured to, when it is detected that a user performs a sliding operation on the touch display screen 933, acquire a touch parameter set, notify the fingerprint identification device 931 to perform fingerprint acquisition, and send the touch parameter set to the AP 980; the fingerprint identification device 931 is configured to collect a fingerprint image and send the fingerprint image to the AP 980; the AP980 is configured to verify the touch parameter set and the fingerprint image, respectively.
The AP980 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions and processes of the mobile phone by operating or executing software programs and/or modules stored in the memory 920 and calling data stored in the memory 920, thereby integrally monitoring the mobile phone. Optionally, AP980 may include one or more processing units; alternatively, the AP980 may integrate an application processor that handles primarily the operating system, user interface, and applications, etc., and a modem processor that handles primarily wireless communications. It will be appreciated that the modem processor described above may not be integrated into the AP 980.
Further, the memory 920 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
RF circuitry 910 may be used for the reception and transmission of information. In general, the RF circuit 910 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 910 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The handset may also include at least one sensor 950, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the touch display screen according to the brightness of ambient light, and the proximity sensor may turn off the touch display screen and/or the backlight when the mobile phone moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 960, speaker 961, microphone 962 may provide an audio interface between a user and a cell phone. The audio circuit 960 may transmit the electrical signal converted from the received audio data to the speaker 961, and the audio signal is converted by the speaker 961 to be played; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal, and the electrical signal is received by the audio circuit 960 and converted into audio data, and the audio data is processed by the audio playing AP980, and then sent to another mobile phone via the RF circuit 910, or played to the memory 920 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 970, and provides wireless broadband Internet access for the user. Although fig. 6 shows the WiFi module 970, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The handset also includes a power supply 990 (e.g., a battery) for supplying power to various components, and optionally, the power supply may be logically connected to the AP980 via a power management system, so that functions of managing charging, discharging, and power consumption are implemented via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, a light supplement device, a light sensor, and the like, which are not described herein again.
In the embodiment shown in fig. 3, the structure shown in fig. 4B can be implemented based on the structure of the mobile phone.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the methods for detecting terminal access recited in the above method embodiments.
Embodiments of the present invention also provide a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute some or all of the steps of any one of the methods for detecting terminal access as described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that the acts and modules illustrated are not necessarily required to practice the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for detecting terminal access is characterized in that the method is applied to an emulator, the emulator is located in a detection system, the detection system comprises a GSM cell, the GSM cell comprises at least two base stations, the at least two base stations belong to different operators, the emulator is connected with the at least two base stations, and the method comprises the following steps:
the method comprises the steps that an emulator receives a first registration request sent by User Equipment (UE), and sends a first registration response to the UE to determine that the UE is successfully registered;
the emulator queries the UE for the first access point name APN registered by the UE according to the public land mobile network PLMN of the current network,
the emulator determines whether the UE sends a second APN,
if the simulator determines that the UE does not report the second APN, determining that the UE passes the inspection;
if the simulator determines that the UE sends the second APN, comparing whether the first APN is the same as the second APN;
if the simulator determines that the first APN is the same as the second APN, the UE is determined to pass the check, if the APN is different from the APN, the UE is determined to fail the check, and a check failure message is sent to the UE.
2. The method of claim 1,
the verification failure message includes: the first APN.
3. The method of claim 2, further comprising:
the simulator receives a log sent by the UE, wherein the log comprises all operations from the first registration request to the check failure message;
and the simulator extracts the content of the log and performs data analysis on the content of the log to obtain a primary failure result.
4. A method for detecting terminal access, the method comprising the steps of:
user Equipment (UE) sends a first registration request to an emulator; the UE receives a first registration response returned by the emulator, wherein the first registration request is used for triggering the emulator to send the first registration response to the UE to determine that the UE is successfully registered; inquiring a first Access Point Name (APN) registered by UE according to a Public Land Mobile Network (PLMN) of a current network, determining whether the UE sends a second APN, and if the UE does not report the second APN, determining that the UE passes the inspection; if the UE sends a second APN, comparing whether the first APN is the same as the second APN; if the first APN is determined to be the same as the second APN, determining that the UE passes the inspection, if the APN is different from the APN, determining that the UE fails the inspection, and sending an inspection failure message to the UE;
the UE creates a log comprising all operations from the first registration request to the verification failure message;
the simulator is located in a detection system, the detection system comprises a GSM cell, the GSM cell comprises at least two base stations, the at least two base stations belong to different operators, and the simulator is connected with the at least two base stations.
5. The method of claim 4, further comprising:
and the UE receives a check failure message sent by the simulator and sends the log to the simulator.
6. An emulator, wherein the emulator is located in a detection system, the detection system includes a GSM cell, the GSM cell includes at least two base stations, the at least two base stations belong to different operators, the emulator is connected to both the at least two base stations, and the emulator includes:
the communication unit is used for receiving a first registration request sent by User Equipment (UE) and sending a first registration response to the UE to determine that the UE is successfully registered;
a processing unit, configured to query, according to a public land mobile network PLMN of a current network, a first access point name APN registered by a UE, determine whether the UE sends a second APN, determine that the UE passes a check, determine that the UE sends the second APN, compare whether the first APN and the second APN are the same, determine that the UE passes the check if the first APN and the second APN are the same, determine that the UE fails the check, and control the communication unit to send a check failure message to the UE if the APN and the APN are different.
7. A user equipment, UE, characterized in that the UE comprises:
a communication unit for sending a first registration request to the emulator; the UE receives a first registration response returned by the emulator, wherein the first registration request is used for triggering the emulator to send the first registration response to the UE to determine that the UE is successfully registered; inquiring a first Access Point Name (APN) registered by UE according to a Public Land Mobile Network (PLMN) of a current network, determining whether the UE sends a second APN, if the UE does not report the second APN, determining that the UE passes the inspection, if the UE sends the second APN, and comparing whether the first APN is the same as the second APN; if the first APN is determined to be the same as the second APN, determining that the UE passes the inspection, if the APN is different from the APN, determining that the UE fails the inspection, and sending an inspection failure message to the UE;
a processing unit for creating a log comprising all operations between the first registration request to the verification failure message;
the simulator is located in a detection system, the detection system comprises a GSM cell, the GSM cell comprises at least two base stations, the at least two base stations belong to different operators, and the simulator is connected with the at least two base stations.
8. A simulator, the apparatus comprising one or more processors, memory, a transceiver, and one or more programs stored in the memory and configured for execution by the one or more processors, the programs comprising instructions for performing the steps in the method of any of claims 1-3.
9. An intelligent device, characterized in that the device comprises one or more processors, memory, a transceiver, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for carrying out the steps in the method according to any one of claims 4-5.
10. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method according to any one of claims 1-3 or the method according to any one of claims 4-5.
CN201710996074.9A 2017-10-23 2017-10-23 Method for detecting terminal access and related product Active CN107734533B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710996074.9A CN107734533B (en) 2017-10-23 2017-10-23 Method for detecting terminal access and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710996074.9A CN107734533B (en) 2017-10-23 2017-10-23 Method for detecting terminal access and related product

Publications (2)

Publication Number Publication Date
CN107734533A CN107734533A (en) 2018-02-23
CN107734533B true CN107734533B (en) 2021-06-29

Family

ID=61213254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710996074.9A Active CN107734533B (en) 2017-10-23 2017-10-23 Method for detecting terminal access and related product

Country Status (1)

Country Link
CN (1) CN107734533B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014371A (en) * 2009-09-08 2011-04-13 天津宇创网络科技有限公司 Method and system for automatically searching mobile phone terminal configuration
CN105338596A (en) * 2015-11-17 2016-02-17 小米科技有限责任公司 Data service establishing method and device
WO2016128676A1 (en) * 2015-02-13 2016-08-18 Orange Method for configuring a terminal connected to a communication network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014371A (en) * 2009-09-08 2011-04-13 天津宇创网络科技有限公司 Method and system for automatically searching mobile phone terminal configuration
WO2016128676A1 (en) * 2015-02-13 2016-08-18 Orange Method for configuring a terminal connected to a communication network
CN105338596A (en) * 2015-11-17 2016-02-17 小米科技有限责任公司 Data service establishing method and device

Also Published As

Publication number Publication date
CN107734533A (en) 2018-02-23

Similar Documents

Publication Publication Date Title
CN106714250B (en) Cell registration method and device and computer readable storage medium
CN109275145B (en) Device behavior detection and barrier processing method, medium and electronic device
CN111970683B (en) Method, device, terminal equipment and storage medium for switching SIM card
US20220132589A1 (en) Method for random access procedure fallback, device, and system
US11818771B2 (en) User equipment and communication method
CN110505692B (en) Beam failure recovery method and device in multi-carrier system
US20130083667A1 (en) Accessibility Measurements
CN111819905A (en) Method and device for determining random access configuration, communication equipment and storage medium
CN111263464B (en) Random access method, apparatus and medium
CN107635289B (en) Method for detecting terminal call and related product
CN108430115B (en) Random access control method and device and mobile terminal
CN107529171B (en) Method for detecting terminal access pseudo base station and related product
CN111263462B (en) Random access method and device
CN107734533B (en) Method for detecting terminal access and related product
WO2019242466A1 (en) Random access method, terminal, and network device
CN107770790B (en) Method for detecting terminal data service access and related product
WO2021249299A1 (en) Data processing method and apparatus, terminal and network side device
CN113677038B (en) Random access processing method and terminal
CN107820287B (en) Detect the method and Related product of terminal access
KR20230004756A (en) Downlink data processing method, device and terminal
CN107454599B (en) Method for detecting terminal access pseudo base station and related product
CN107493592B (en) Calling method and related product
CN110731094B (en) User equipment authentication detection method and related product
CN107734532B (en) Method for detecting terminal access and related product
CN110800334B (en) User equipment call detection method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant