CN109246700A - A kind of method for network access, terminal and computer storage medium - Google Patents

A kind of method for network access, terminal and computer storage medium Download PDF

Info

Publication number
CN109246700A
CN109246700A CN201811210797.2A CN201811210797A CN109246700A CN 109246700 A CN109246700 A CN 109246700A CN 201811210797 A CN201811210797 A CN 201811210797A CN 109246700 A CN109246700 A CN 109246700A
Authority
CN
China
Prior art keywords
parameter
network
target network
terminal
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811210797.2A
Other languages
Chinese (zh)
Inventor
杨海城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201811210797.2A priority Critical patent/CN109246700A/en
Publication of CN109246700A publication Critical patent/CN109246700A/en
Priority to PCT/CN2019/111684 priority patent/WO2020078425A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

This application discloses a kind of method for network access, terminal and computer storage mediums;Wherein, which comprises terminal obtains target network parameter from server by identification card;Target network is accessed according to the target network parameter.

Description

A kind of method for network access, terminal and computer storage medium
Technical field
This application involves but be not limited to the communications field more particularly to a kind of method for network access, terminal and computer storage Medium.
Background technique
In the related technology, target network parameter is preset, to realize connecing for target network according to target network parameter Enter.However, target network parameter (such as VoLTE (Voice over LTE, the voice based on LTE)) parameter) it is that can change , the adjustment such as operator to network parameter itself;Alternatively, original network parameter is unavailable under international roaming state;Or Situations such as operator that person, the operator of original authorization access and user currently want access is different.And target network is joined Number once change, can not access carrier network, cause network insertion to fail, so that the function of terminal is by shadow It rings.
Summary of the invention
The embodiment of the present application provides a kind of method for network access, terminal and computer storage medium, solves at least net The problem of network access failure.
The embodiment of the present application provides a kind of method for network access, comprising:
Terminal obtains target network parameter from server by identification card;
Target network is accessed according to the target network parameter.
The embodiment of the present application also provides a kind of terminals, comprising:
Acquiring unit, for obtaining target network parameter from server by identification card;
Access unit, for accessing target network according to the target network parameter.
A kind of terminal of the application, the terminal include: the memory for being stored with computer program;Processor is configured to The step of any one of above scheme the method is realized when executing the computer program.
A kind of computer storage medium of the application, is stored thereon with computer program, and the computer program is processed The step of any one of above scheme the method is realized when device executes.
In the technical solution of the embodiment of the present application, terminal obtains target network parameter from server by identification card, according to Target network parameter accesses target network.Due to being not necessarily to prior preset target network parameter in terminal side, but dynamically from service Device obtains required target network parameter, and then the access of target network can be realized according to target network parameter, in this way, ensure that Terminal is successfully accessed network, thus, solve the problems, such as network insertion failure.
Detailed description of the invention
Fig. 1 is the configuration diagram figure of the embodiment of the present application application scenarios;
Fig. 2 is the hardware structure schematic diagram of one terminal of the embodiment of the present application;
Fig. 3 is the flow diagram of the embodiment of the present application method for network access;
Fig. 4 is the flow diagram of another method for network access of the embodiment of the present application;
Fig. 5 is the flow diagram of another method for network access of the embodiment of the present application;
Fig. 6 is the flow diagram of another method for network access of the embodiment of the present application;
Fig. 7 is the flow diagram of another method for network access of the embodiment of the present application;
Fig. 8 is the flow diagram of another method for network access of the embodiment of the present application;
Fig. 9 is a kind of implementation process schematic diagram of the embodiment of the present application step 301 shown in Fig. 3;
Figure 10 is another implementation process schematic diagram of the embodiment of the present application step 301 shown in Fig. 3;
Figure 11 is another implementation process schematic diagram of the embodiment of the present application step 301 shown in Fig. 3;
Figure 12 is a kind of terminal unit composition schematic diagram of the embodiment of the present application;
Figure 13 is another terminal unit composition schematic diagram of the embodiment of the present application;
Figure 14 is the module composition schematic diagram of the application Application Example terminal;
Figure 15 is a kind of terminal of the application Application Example and server interaction flow schematic diagram;
Figure 16 is another terminal of the application Application Example and server interaction flow schematic diagram;
Figure 17 is another terminal of the application Application Example and server interaction flow schematic diagram;
Figure 18 is another terminal of the application Application Example and server interaction flow schematic diagram;
Figure 19 is a kind of terminal of the application Application Example and network element interaction flow schematic diagram.
Specific embodiment
With reference to the accompanying drawings and embodiments, the application is further elaborated.It should be appreciated that mentioned herein Embodiment only to explain the application, is not used to limit the application.In addition, embodiment provided below is for implementing this The section Example of application, rather than the whole embodiments for implementing the application, in the absence of conflict, the embodiment of the present application are provided The technical solution of record can mode in any combination implement.
It should be noted that in the embodiment of the present application, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that including the method for a series of elements or device not only includes wanting of being expressly recited Element, but also including other elements that are not explicitly listed, or further include for implementation method or device intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Method or device in there is also other relevant factor (such as the step in method or the unit in device, for example, Unit can be partial circuit, segment processor, subprogram or software etc.).
For example, method for network access provided by the embodiments of the present application contains a series of step, but the application is implemented The method for network access that example provides is not limited to documented step, and similarly, terminal provided by the embodiments of the present application includes A series of units, but terminal provided by the embodiments of the present application is not limited to unit be expressly recited, and can also include to obtain Relevant information or the unit of while being handled based on information required setting.
" first second " is only to distinguish similar object it should be noted that term involved in the embodiment of the present application, The particular sorted for object is not represented, it is possible to understand that ground, " first second " can be interchanged specific suitable in the case where permission Sequence or precedence.It should be understood that the object that " first second " is distinguished is interchangeable under appropriate circumstances, so that described herein Embodiments herein can be performed in other sequences than those illustrated or described herein.
Fig. 1 is the architecture diagram that an application scenarios of network insertion are carried out in the embodiment of the present application, include: in Fig. 1 terminal 1, Server 2 and base station 3.Wherein, terminal can carry out information exchange by cable network or wireless network and server.Terminal It can be the types such as mobile phone terminal.
Wherein, in the related technology, terminal can store the privately-owned network parameter of each operator after factory, such as telecommunications Network parameter, the network parameter of connection, movement network parameter, terminal can identify which is after installing Subscriber Identity Module The identification card of operator, thus the network parameter for the adaptable operator for calling terminal to be previously stored.But when be adapted When the network parameter of operator changes or locating environment is without adaptable carrier network, then it will lead to network and connect Enter failure.
And in the various embodiments of the application, terminal can be currently located operator from server acquisition by identification card The target network parameter of network accesses target network according to the target network parameter.
The scheme of the embodiment of the present application downloads the target network from server using virtual identification card or Entity recognition card dynamic Network parameter, then the target network parameter is newest parameter always, therefore access target network would not fail, and be not required to important affair First preset a large amount of network parameter, also saves the memory space of terminal side.
Fig. 2 is the hardware entities schematic diagram of one terminal of the embodiment of the present application.Referring to fig. 2, to the mobile terminal of the present embodiment Hardware configuration elaborate, it will be understood that Fig. 2 illustrate only the exemplary structure of the embodiment of the present application mobile terminal and Not all structure, can be implemented as needed Fig. 2 shows part-structure or entire infrastructure.
Terminal 100 provided by the embodiments of the present application includes: at least one processor 11, memory 12;Can also include;With Family interface 13 and at least one network interface 14, it is understood that be communication interface.Various components in terminal 100 pass through bus System 15 is coupled.It is appreciated that bus system 15 is for realizing the connection communication between these components.Bus system 15 It further include power bus, control bus and status signal bus in addition in addition to including data/address bus.But illustrate in order to clear See, various buses are all designated as bus system 15 in Fig. 2.
Wherein, network interface 14, for being interacted with other equipment.
User interface 13 may include display, keyboard, mouse, trace ball, click wheel, key, button, touch-sensitive plate or Touch screen etc..
Memory 12 stores the computer program that can be run on processor 11.It is appreciated that memory 12 can be Volatile memory or nonvolatile memory may also comprise both volatile and non-volatile memories.Wherein, non-volatile Memory can be ROM (Read Only Memory, read-only memory), PROM (Programmable Read-Only Memory, programmable read only memory), EPROM (Erasable Programmable Read-Only Memory, it is erasable Programmable read only memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically erasable programmable read-only memory), FRAM (deposit by ferromagnetic random access memory, magnetic random Access to memory), flash memory (Flash Memory), magnetic surface storage, CD or CD-ROM (Compact Disc Read-Only Memory, CD-ROM);Magnetic surface storage can be magnetic disk storage or magnetic tape storage.Volatibility is deposited Reservoir can be RAM (Random Access Memory, random access memory), be used as External Cache.By showing Example property but be not restricted explanation, the RAM of many forms is available, such as SRAM (Static Random Access Memory, Static random access memory), SSRAM (Synchronous Static Random Access Memory, synchronize it is static with Machine access memory), DRAM (Dynamic Random Access Memory, dynamic random access memory), SDRAM (Synchronous Dynamic Random Access Memory, Synchronous Dynamic Random Access Memory), DDRSDRAM (Double Data Rate Synchronous Dynamic Random Access Memory, Double Data Rate synchronizes dynamic State random access memory), ESDRAM (Enhanced Synchronous Dynamic Random Access Memory, increase Strong type Synchronous Dynamic Random Access Memory), SLDRAM (SyncLink Dynamic Random Access Memory, it is synchronous Connect dynamic random access memory), DRRAM (Direct Rambus Random Access Memory, direct rambus Random access memory).The memory 12 of the embodiment of the present application description is intended to include but is not limited to these to be suitble to any other The memory of type.
Memory 12 in the embodiment of the present application is for storing various types of data to support the operation of terminal 100.This The example of a little data includes: any executable instruction for operating on the terminal 100, such as executable instruction 121;Wherein, real The program of the network insertion of the terminal of existing the embodiment of the present application may be embodied in executable instruction 121.
The method for the accessing terminal to network that the embodiment of the present application discloses can be applied in processor 11, or by processor 11 realize.Processor 11 may be a kind of IC chip, the processing capacity with signal.It is mobile whole during realization Each step of the system self-adaption method at end can pass through the integrated logic circuit or software form of the hardware in processor 11 Instruction complete.Above-mentioned processor 11 can be general processor, DSP (Digital Signal Processor, number letter Number processor) either other programmable logic device, discrete gate or transistor logic, discrete hardware components etc..Processing Device 11 may be implemented or execute disclosed each method, step and logic diagram in the embodiment of the present application.General processor can To be microprocessor or any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, Ke Yizhi Connect and be presented as that hardware decoding processor executes completion, or in decoding processor hardware and software module combination executed At.Software module can be located in storage medium, which is located at memory 12, and processor 11 is read in memory 12 Information, in conjunction with the step of its hardware completion method for network access provided by the embodiments of the present application.
Realize that the embodiment of the present application terminal can be by one or more ASIC (Application Specific Integrated Circuit, application specific integrated circuit), DSP (Digital Signal Processing, at digital signal Reason), PLD (Programmable Logic Device, programmable logic device), CPLD (Complex Programmable Logic Device, Complex Programmable Logic Devices), (Field-Programmable Gate Array, scene can compile FPGA Journey gate array) or the realization of other electronic components, method for network access provided by the embodiments of the present application is realized for executing.
A kind of method for network access of the embodiment of the present application, as shown in Figure 3, which comprises
Step 301, terminal obtain target network parameter from server by identification card;
Step 302 accesses target network according to target network parameter.
Here, when practical application, the identification card can be with are as follows: virtual identification card or Entity recognition card.With virtual identification card For, virtual identification card includes but is not limited to: and VSIM (Virtual Subscriber Identification Module, it is empty Quasi- SIM) card, eSIM (Embedded SIM, embedded SIM) card, SoftSIM (Soft Subscriber Identification Module, soft client identification module) card, UICC (Universal Integrated Circuit At least one of Card, dummy general integrated circuit) card.
Wherein, substantially or a SIM card, only it is directly embedded on the circuit board of terminal device eSIM, ruler It is very little also more much smaller than current the smallest Nano SIM.ESIM can support different operators by way of remotely programming, can be Switch between different operators network.SoftSIM is the pure software scheme of conventional entity SIM card, it is with no hardware cost, movable State updates the advantages of SIM card parameter is to support different operators.VSIM is the evolution version of SoftSIM, and safety is higher.It not under Authentication parameters such as key (Ki, Key Identifier) are carried to locally, its authentication is carried out in server.
When practical application, operator described in the identification card can be identical with the operator of the target network, can also With difference.
Wherein, no matter virtual identification card or Entity recognition card, operator and knowledge when the network belonging that it can be accessed When card operator is not identical, the target network directly downloaded is defaulted by identification card (virtual identification card or Entity recognition card) Parameter is the target network parameter for the target network that operator belonging to the identification card supports, to be joined according to the target network Number access target network.For example, operator belonging to identification card is China Mobile, the operator for the network that can be accessed is also When China Mobile, the target network parameter that identification card default directly downloads is exactly the network parameter of China Mobile.Using the present invention Embodiment eliminates phase since directly default downloading is exactly network parameter with the network of the identification card same operator The operator that operator's attribute in the technology of pass according to identification card goes matched and searched adaptable in the operator list of storage Complicated processes.When carrier network that identification card (virtual identification card or Entity recognition card) can access and card operator not It when identical, needs to judge whether the carrier network that can be accessed and card operator endorsed mutually authorization, that is, there is authorization The signing information of network is accessed, if signing information exists, authorized operator can be downloaded based on the signing information Target network parameter.
When practical application, the target network of the embodiment of the present application can be diversified forms, for example, can be VoLTE network, VoWiFi (Voice over WiFi, the voice based on WiFi) network, 5G network or RCS (Rich Communication Suite, converged communication) network etc..Correspondingly, different target networks is corresponding with different network parameters.
Wherein, when target network is VoLTE network, the target network parameter obtained from server is VoLTE parameter.
When the target network for needing to access is VoWiFi network, the target network parameter obtained from server is WiFi ginseng Number.
When the target network for needing to access is 5G network, the target network parameter obtained from server is VoNR (Voice over New Radio, new empty port load-supporting voice) parameter.
When the target network for needing to access is RCS network, the target network parameter obtained from server is joined comprising VoLTE At least one of number, WiFi parameter, VoNR parameter.
Wherein, RCS network is a kind of application scenarios that can be merged the scenes such as above-mentioned VoLTE, VoWiFi, 5G network, Its maximum characteristic realizes the fusion of business as its title, i.e., by short message, voice, call, multimedia message and video All multi-services such as shared are in the same protocol frame (as being based on IMS (IP Multimedia Subsystem, IP multimedia subsystem System)) under transmitted, communicated, while realizing the extension of business.
When practical application, when the identification card is virtual identification card, the terminal needs to apply for card information to operator, So as to network is accessed by identification card, carries out various network services etc..
Based on this, in one embodiment, as shown in figure 4, this method can also include:
Step 300, the terminal are to the first virtual identification card of carrier network application.
After the terminal succeeds to the virtual identification card of the first carrier network application, can obtain card parameter (can also be managed Solution is card information), so as to have access to network etc. by virtual identification card.
Here, when practical application, VSIM card is a kind of common virtual identification card.When the virtual identification card is VSIM card When, it may appear that following two situation:
The first situation, the second operation belonging to the first operator and the target network belonging to the virtual SIM card Quotient is same operator.
Second situation, the second operation belonging to the first operator and the target network belonging to the virtual SIM card Quotient is different operators.
Certainly, for other kinds of virtual identification card and Entity recognition card, it also will appear above-mentioned two situations.
Wherein, for the first case, before access without carrying out authorization judgement, directly according to by VSIM card from service The target network parameter that device obtains accesses target network.At this point, the process of accessing terminal to network, as shown in Figure 5, comprising:
Step 501, terminal obtain target network parameter from server by VSIM identification card.
Step 502 determines the operator belonging to VSIM card and operator belonging to the target network parameter is identical Targeted carrier.
Step 503 accesses target network according to the target network parameter obtained by VSIM card from server.
Specifically, it is assumed that target network is VoLTE network, in the VoLTE of the not preset any operator in terminal side before factory Parameter, but terminal is to the VSIM card of certain carrier network application operator, by the VSIM card from server (server end The server that can be some operator is also possible to the third-party server for the number segment that some has purchased multiple operators) The VoLTE parameter of the operator is downloaded, with the VoLTE network of the adaptive access operator.And in the related technology, VoLTE Parameter comes from terminal local database.The VoLTE parameter of the embodiment of the present application is provided by server, Ke Yisui VSIM card parameter is handed down to terminal together, and certain server can also only provide the terminal with VoLTE parameter.VoLTE parameter, refers to It is the parameter for needing to use when terminal carries out VoLTE business, is generally provided by operator.For example voice coding modes, IPSec add Whether close algorithm supports VoLTE etc..VSIM card parameter refers to those parameters being originally stored in entity SIM card, including But it is not limited to MCC (Mobile Country Code, mobile device country code), (Mobile Network Code is moved MNC Dynamic network number), IMSI (International Mobile Subscriber Identity, international mobile subscriber identification Code), ICCID (Integrate Circuit Card Identity, integrated circuit card identification code), between SIM card and operator Encryption data transmitting Ki, FPLMN (Forbidden PLMN, the home network being denied access), HPLMN (Home PLMN, The public land mobile network of terminal user's ownership) etc..
In addition, as previously mentioned, working as second belonging to the first operator belonging to the virtual SIM card and the target network When operator is same operator, using the scheme of the embodiment of the present application, the operation in the related technology according to identification card is eliminated The complicated processes for the operator that quotient's attribute goes matched and searched adaptable in the operator list of storage, simplify treatment process, Greatly accelerate processing speed.
For the first situation, in VoLTE scene, as shown in fig. 6, the side of the embodiment of the present application accessing terminal to network Method process includes:
Step 601, terminal are to the first carrier network application VSIM card.
Step 602, terminal obtain the VoLTE parameter of VoLTE network by VSIM card;Wherein the VoLTE network is institute State the VoLTE network of the first operator.
Step 603 accesses VoLTE network according to the VoLTE parameter.
In view of safety, a kind of security mechanism is in order to avoid applied VSIM card is stolen, and the terminal is to first Random number is obtained when carrier network application VSIM card;The terminal sends the random number to the first carrier network, passes through After the proof of identity that first carrier network is executed according to the random number, passes through the VSIM card and obtain VoLTE network VoLTE parameter.
More specifically, the method flow of the embodiment of the present application accessing terminal to network, as shown in fig. 7, comprises:
Random number is obtained when step 701, terminal are to the first carrier network application VSIM card.
For example, terminal user can obtain random number from the server after application VSIM card completes charge.
Step 702, terminal send the random number to the first carrier network.
The random number that step 703, the first carrier network will network sides the local random number stored and receive from terminal It is compared, if the two random numbers are consistent, proof of identity success.
After step 704, proof of identity success, the VoLTE parameter of VoLTE network is obtained by VSIM card;It is wherein described VoLTE network is the VoLTE network of first operator.
Another security mechanism is: cipher mode.That is: terminal passes through VSIM to carrier network application VSIM card, terminal Block " SIM card parameter and the VoLTE parameter " that encrypted form is obtained from the server, terminal is by " the SIM card parameter of encrypted form With VoLTE parameter " it is stored in terminal side, after it is decrypted in terminal side, obtain " SIM card parameter and VoLTE parameter ".Root Target network is accessed according to " SIM card parameter and VoLTE parameter ".
Specifically, when terminal is dispatched from the factory, the VoLTE parameter of terminal side not preset any operator in software version, terminal The VSIM card for applying for targeted carrier, from the VSIM card parameter of server downloading encrypted form and the VoLTE parameter of the operator And decrypt, it is thus possible to the operator according to belonging to operator and the VoLTE parameter that VSIM card parameter is judged belonging to VSIM card When for identical targeted carrier, the VoLTE parameter that terminal uses server to provide is successfully accessed the VoLTE net of the operator Network.In the present embodiment, VoLTE parameter is the newest VoLTE parameter of the targeted carrier of dynamic acquisition.
For second situation, the second operator belonging to the first operator belonging to VSIM card and the target network, The two is non-one-to-one relationship.Such situation, needing that authorization judgement can be carried out before access can if authorized To access target network according to target network parameter;Otherwise, illustrate unauthorized, access target network failure.Wherein it is possible to by VSIM card in VSIM card parameter identifies to carry out authorization judgement.That is, the virtual SIM applied to first operator The card parameter of card is identified including at least SIM card;The terminal sends the SIM card and identifies to target network, and receives the mesh Mark the feedback message of network;The feedback message is used to indicate the acquisition of virtual SIM card described in the terminal target network and connects Enter authorization;Then, according to the feedback message and target network parameter, the terminal accesses the target network.
At this point, the detailed process of accessing terminal to network, as shown in Figure 8, comprising:
Step 801, terminal obtain target network parameter from server by VSIM card.
Step 802 determines that operator and operator belonging to the target network parameter belonging to VSIM card are different Targeted carrier.
Step 803, target network side carries out authorization judgement before accessing target network, if authorized, executes step Rapid 804;Otherwise, illustrate unauthorized, execute step 805.
Step 804 accesses target network according to the target network parameter obtained by VSIM card from server.
Step 805, access target network failure.
Wherein, when practical application, when judging whether authorization, the target network can use VSIM card mark and obtain institute The signing information of terminal is stated, there is the information whether authorized in signing information, may determine that operation belonging to the VSIM card accordingly Whether the authorization of network insertion is had between operator belonging to quotient and the target network parameter.Card mark includes but is not limited to: IMSI, IMSI are the marks for distinguishing mobile subscriber, and total length is no more than 15,0~9 number can be used to indicate effective Information (for distinguishing the effective information of mobile subscriber).
When practical application, the target network list for obtaining authorization can be presented, to user so that user carries out as needed Selection.Based on this, in one embodiment, as shown in figure 9, step 302 may include:
Step 901, the display identification card obtain the target network list of authorization.
Step 902 chooses target network to be accessed from the target network list.
Step 903, the target network parameter that the target network to be accessed is obtained from server.
Wherein, for second situation, the embodiment of the present application terminal obtains target network from server by identification card The process of parameter, as shown in Figure 10, comprising:
Step 1001 shows the target network list for authorizing access network to match with VSIM card in terminal.
Step 1002, user are from target network list selection target network, after terminal receives the selection operation of user, from The target network is selected in the target network list, obtains the target network parameter of the corresponding target network.
Specifically, this be it is a kind of by authorization message in such a way that interface shows.Such as the VSIM of a connection The insertion authority that card obtains network needs to access mobile network for example, present terminal is in the coverage area of mobile network Network, then, the target network parameter for going the server of server to download corresponding mobile network after mobile network is selected, so as to basis Download obtained target network parameter access to mobile network.
It, can be first from the base station of roaming place after the position that terminal is presently in is roaming place for second situation The operator's informaiton for wanting access is obtained, quickly can obtain target network parameter from server in this way.
Based on this, the embodiment of the present application terminal obtains the process of target network parameter by identification card from server, such as schemes Shown in 11, comprising:
Step 1101 obtains the current location information of the terminal.
Step 1102, from obtaining accessible target according to the base station in the corresponding network coverage distance range of location information The operator's informaiton of network.
Step 1103 obtains target network ginseng corresponding with the operator's informaiton from the server by VSIM card Number.
Here, when practical application, location information can be obtained by positioning system.It, can basis after obtaining location information Location information obtains neighbouring base station information, so as to obtain operator's informaiton to base station.
Wherein, when practical application, the operator's informaiton refers to the information that can identify operator, such as MCC and MNC Deng.The terminal can by VSIM card parameter MCC and MNC be compared with the MCC and MNC obtained from base station, so as to To know whether the terminal is in roaming place.
When the terminal is in roaming place, in the related technology, need according to the operation such as country code obtained from base station Quotient's information carries out network switching, and handoff procedure is quite cumbersome, and in the embodiment of the present application, when the terminal is in roaming place When, the cumbersome network switching process carried out based on MCC etc. is not needed, network insertion speed is greatly accelerated, is promoted User experience.
Using above-mentioned the embodiment of the present application, solve in target network parameter itself adjustment or international roaming of server Target network is successfully accessed the low problem of rate, and greatly the user experience is improved.In international roaming using above-mentioned various Embodiment, in simple terms, terminal obtain target network parameter from server according to identification card dynamic, and target network parameter is simultaneously not required to It to be preset in terminal side in advance, parameter is bound in advance with identification card, in this way, having saved the memory space of terminal side.Together When, the target network parameter obtained from server is newest parameter always, therefore access target network would not fail, and guarantee Terminal is successfully accessed network.
A kind of terminal is additionally provided in the present embodiment, which had carried out explanation for realizing above-described embodiment Repeat no more.As used below, the combination of the software and/or hardware of predetermined function may be implemented in term " module ".To the greatest extent Device described in pipe following embodiment is preferably realized with software, but the combined reality of hardware or software and hardware Now and may and it be contemplated.
Figure 12 is according to the structural block diagram of the terminal of the embodiment of the present application, a kind of terminal of the embodiment of the present application, comprising: obtain Take unit 121 for by identification card from server acquisition target network parameter.Access unit 122 is used for according to the target network Network parameter accesses target network.The identification card are as follows: virtual identification card or Entity recognition card.By taking virtual identification card as an example, virtually Identification number includes but is not limited to: at least one of eSIM, SoftSIM, VSIM, virtual UICC card.
In the embodiment of the present application, when the virtual identification card is VSIM card, the first operator belonging to the VSIM card It is same operator with the second operator belonging to the target network.
In the embodiment of the present application, when the virtual identification card is VSIM card, the first operator belonging to the VSIM card It is different operators with the second operator belonging to the target network.
As shown in figure 13, the terminal further include: application unit 123 is used for the first carrier network application VSIM card.
In one embodiment, when the first affiliated operator of the VSIM card and the second operation belonging to the target network When quotient is different operators, the card parameter for the VSIM card applied to first operator is identified including at least SIM card;
The acquiring unit 121, which is further used for sending the SIM card, to be identified to target network, and receives the target network The feedback message of network;The feedback message is used to indicate the acquisition of virtual SIM card described in the terminal target network access and awards Power;
The access unit 122, for accessing the target network according to the feedback message and target network parameter.
In one embodiment, the acquiring unit 121, for showing that the identification card obtains the target network column of authorization Table;
Target network to be accessed is chosen from the target network list;
The target network parameter of the target network to be accessed is obtained from server.
In one embodiment, when the first affiliated operator of the VSIM card and the second operation belonging to the target network When quotient is different operators, the acquiring unit 121, for obtaining the current location information of the terminal;
The fortune of accessible target network is obtained from the base station in the corresponding network coverage distance range of the location information Seek quotient's information;
Target network parameter corresponding with the operator's informaiton is obtained from the server by VSIM card
In one embodiment, when the first affiliated operator of the VSIM card and the second operation belonging to the target network When quotient is same operator, the acquiring unit 121, for obtaining the VoLTE parameter of VoLTE network by the VSIM card; Wherein the VoLTE network is the VoLTE network of first operator.
In one embodiment, the acquiring unit 121 obtains at random when for the first carrier network application VSIM card Number, sends the random number to the first carrier network, the identity executed by the first carrier network according to the random number After verification, the VoLTE parameter of VoLTE network is obtained by the virtual SIM card;Wherein the VoLTE network is described first The VoLTE network of operator.
In the embodiment of the present application, when the target network for needing to access is VoLTE, from the mesh of server acquisition Mark network parameter is VoLTE parameter;When the target network for needing to access is VoWiFi, from the mesh of server acquisition Mark network parameter is WiFi parameter;When the target network for needing to access is 5G, from the target network of server acquisition Network parameter is VoNR parameter;When the target network for needing to access is RCS, the target network obtained from server is joined Number includes at least one of VoLTE parameter, WiFi parameter, VoNR parameter.
It should be understood that terminal provided by the above embodiment is when carrying out network insertion, only with above-mentioned each program module Division progress for example, in practical application, can according to need and distribute above-mentioned processing complete by different program modules At the internal structure of device being divided into different program modules, to complete all or part of processing described above.Separately Outside, terminal provided by the above embodiment and method for network access embodiment belong to same design, the specific implementation process side of being detailed in Method embodiment, which is not described herein again.
In the embodiment of the present application, a kind of computer readable storage medium is additionally provided, for storing computer program, with complete The step of at preceding method.Computer readable storage medium can be FRAM, ROM, PROM, EPROM, EEPROM, Flash The memories such as Memory, magnetic surface storage, CD or CD-ROM;It is also possible to include one of above-mentioned memory or any group The various equipment closed.
It should be understood that between technical solution documented by the embodiment of the present application, in the absence of conflict, Ke Yiren Meaning combination.
The application Application Example is described in detail with reference to the accompanying drawing.
In this application embodiment, by taking VoLTE as an example, the embodiment of the present application realizes a kind of by VSIM card dynamic acquisition The VoLTE parameter of server, thus the method for adaptive access VoLTE network.Specifically, dispatch from the factory preceding terminal side do not reinitialize appoint The VoLTE parameter of what operator, but apply for VSIM card, the VoLTE parameter of operator is downloaded from server by the VSIM card To access VoLTE network.
In an exemplary embodiment, Figure 14 is to show using one, terminal optional structure of above-described embodiment method It is intended to, as shown in figure 14, the terminal of the application includes detection module 141, application module 142, download module 143, memory module 144, configuration module 145, enquiry module 146.Detection module 141 is used to detect the local validity period for whether storing certain operator Interior VSIM card parameter and VoLTE parameter, application module 142 be used for server application operator VSIM card number code and VoLTE parameter, the VoLTE parameter of VSIM card parameter and the operator that download module 143 is provided for download server, storage Module 144 is used to the VSIM card parameter of downloading and VoLTE parameter being saved in local, based on the considerations of information security, using adding Close mode saves.Configuration module 145 is saved in local VoLTE parameter for parsing, and is written into the NV of terminal actual use Or in file, whether the VoLTE switch that enquiry module 146 is used to inquire terminal is opened.
For example, the VoLTE parameter that configuration module 145 is read is as follows:
AMR_WB=1
IPSec=0
ViLTE=0
The then parsing of configuration module 145 learns that operator VoLTE network requirement terminal opens adaptive AMR-WB (Adaptive Multi-Rate Wideband, multi-rate broadband coding) voice coding, close IPSec (IP Security, IP safety) it authenticates and ViLTE (Video over LTE, the video calling based on LTE).Then, which goes to modify the above function Corresponding NV or file can be put.
In an exemplary embodiment, Figure 15 is using the present embodiment based on VSIM card adaptive access VoLTE The process of network, the process include the following steps:
Step 1501, terminal are successfully accessed LTE network.
Step 1502, notice detection module 141 detect the local virtual SIM whether stored in the validity period of the operator Card parameter and VoLTE parameter.
Here, judge whether to store the parameter in validity period? if it is not, then continuing to execute step 1503;If so, executing Step 1507.
Step 1503, notice application VSIM card number code and VoLTE parameter of the module 142 to the server application operator.
The VoLTE ginseng of VSIM card parameter and the operator that step 1504, notice 143 download server of download module provide Number.
The parameter of downloading is saved in local by step 1505, notice memory module 144.
Step 1506, the notice parsing of configuration module 145 are saved in local VoLTE parameter, are written into that terminal is practical to be made In NV or file.
Whether the VoLTE switch that step 1507, notice enquiry module 146 inquire terminal is opened.
Here, do you judge to open? if so, continuing to execute step 1508;If it is not, thening follow the steps 1509.
Step 1508: initiating VoLTE registration.
Step 1509: this conversation end.
In the present embodiment, detection module 141 for detect it is local whether store it is virtual in the validity period of certain operator SIM card parameter and VoLTE parameter.From the point of view of the development trend of current intelligent terminal, the presence of entity SIM card, partial extent The evolution of mobile terminal is limited, space and the design of equipment are limited, and increases the technology difficulty and manufacturing cost of equipment. Therefore, major intelligent terminal manufacturer starts to make a decision to widely popularize virtual SIM technology.
VoLTE parameter refers to the parameter for needing to use when terminal carries out VoLTE business, is generally provided by operator.Than Whether such as voice coding modes ipsec encryption algorithm, support ViLTE.
It can be seen that the VSIM card parameter and VoLTE parameter of the referred to herein as same operator.For example, terminal application After the virtual SIM card number of China Unicom, the SIM card parameter of the number and the VoLTE ginseng of China Unicom are downloaded from server Number.The embodiment of the present application eliminates the PLMN in the prior art according to entity SIM card, and the operator is matched in software version VoLTE parameter process.
Herein by taking VoLTE as an example, practical includes but is not limited to that the operators such as VoLTE, VoWiFi, RCS, 5G business are related Parameter.
In an exemplary embodiment, application module 142 is used to join to server application VSIM card parameter and VoLTE Number.Server end can be the server of some operator, be also possible to the of the number segment that some has purchased multiple operators Tripartite's server.
Apply for that module 142 and the interaction diagrams of server are as shown in figure 16, which includes the following steps:
Step 1601, the VSIM card of terminal to server application operator and VoLTE parameter.
Step 1602, terminal receive the instruction of server requirement " authentication ".
Step 1603, terminal to server send the device identification of terminal, and the identity of terminal is verified in request.
Here, progress authentication (determines when the device identification of the terminal is for downloading SIM card parameter and VoLTE parameter The above-mentioned virtual SIM card that has been the terminal application, so that it is guaranteed that downloaded with SIM card parameter corresponding to SIM card and VoLTE parameter Safety), the device identification of the terminal also can be used as the encryption factor of these SIM card parameters and VoLTE parameter.
After step 1604, server pass through the authentication of terminal, terminal receives " applying successfully " of server return Message, application obtain VSIM card and VoLTE parameter.
Here, in application process, virtual SIM card parameter and VoLTE of the download module 143 for download server offer Parameter, and " downloading finishes message " is sent to server after the download is complete;In addition, downloading finishes when the encryption of these parameters By obtaining VSIM card parameter and VoLTE parameter after decryption processing.
In an exemplary embodiment, for the sake of security, further increase random number, application module 142 with The interaction diagrams of server, as shown in figure 17:
Step 1701, terminal to server application operator VSIM card.
Step 1702, terminal receive the instruction of server requirement " authentication ".
Step 1703, terminal to server send the device identification of terminal, and the identity of terminal is verified in request.
After step 1704, server pass through the authentication of terminal, application obtains VSIM card, and sends together random Number.
Authentication is carried out when the random number can be used for downloading SIM card parameter and VoLTE parameter, and (determination is to possess the void The terminal of quasi- SIM card will download SIM card parameter and VoLTE parameter, so that it is guaranteed that with SIM card parameter corresponding to SIM card and The safety of VoLTE parameter downloading), which also can be used as the encryption factor of these SIM card parameters and VoLTE parameter.
Terminal receives the message of " applying successfully " of server return, and application obtains virtual SIM card, so that subsequent terminal is logical Crossing the SIM card can download to obtain SIM card parameter and VoLTE parameter from server.
In an exemplary embodiment, for the sake of security, further increase random number, application module 142, under It carries module 143 and the interaction flow of server is as shown in figure 18, which includes the following steps:
Step 1801, terminal (application module 142) request to download the VSIM card parameter and VoLTE of certain operator to server Parameter.
Step 1802, terminal (application module 142) receive the instruction of server requirement " authentication ".
Step 1803, terminal (application module 142) send the device identification and RANDOM NUMBER request identity of terminal to server Verifying.
In this step, random number can also be only sent.It is in the device identification by terminal in application process before It realizes and just gets random number after terminal identity is verified, therefore, it is also safe for only sending random number.
Terminal to server sends the device identification and random number of terminal, alternatively, terminal is only sent at random to server Number is provided to carry out authentication (the determination above-mentioned void that has been the terminal application to downloading SIM card parameter and when VoLTE parameter Quasi- SIM card, so that it is guaranteed that the safety downloaded with SIM card parameter corresponding to SIM card and VoLTE parameter).
Step 1804, terminal (download module 143) receive the VSIM card parameter and VoLTE parameter of server transmission.
Step 1805, terminal (download module 143) send the message of " downloading finishes " to server.
In an exemplary embodiment, the authorization before accessing network judges that process is as shown in figure 19, which includes Following steps:
Step 1901, terminal to P-CSCF (, Proxy-Call Session Control Function, agent call meeting Talk about control function) network element transmission VoLTE registration message.
Step 1902, P-CSCF network element are according to the IMSI in SIM card, to the HSS (Home where the SIM card Subscriber Server, home signature user server) server inquiry whether obtain VoLTE authorization.
Here there are two kinds of situations, first is that: P-CSCF network element and HSS network element belong to the same operator, second is that: P- CSCF network element and HSS network element do not belong to the same operator.
IMSI is stored in SIM card, is the unique identification of SIM card (including virtual SIM card and entity SIM card).
P-CSCF is the network element of network side, and the VoLTE Signalling exchange of terminal and sip server will pass through P-CSCF.HSS It is also the network element of network side, is used for storing user subscription information.
Step 1903, HSS network element pass through instruction to P- after inquiring authorization message according to the user signing contract information stored CSCF network element, so that P-CSCF, which inquires to obtain the SIM card, has obtained VoLTE authorization.
Step 1904, terminal are successfully registered to VoLTE network.
View of the above, it will be seen that improving the versatility of software version, greatly using the scheme of this application embodiment Amplitude reduces the quantity of software version, shortens software development, test period, reduces costs.Solves network side parameter Adjustment or success rate of business insertion is low when international roaming, the low success rate of problem of intercommunication, is able to solve network service and always exists Interconnect, transnational intercommunication the problems such as, for the new business under the networks such as 5G it is rapid popularization provide help, greatly promoted User experience.Development also for identification card business provides more possibility.
In addition, operator can be different according to flexible configurations such as class of subscriber, terminal class, classs of service network service Parameter.
Although for illustrative purposes, embodiments herein has been disclosed, those skilled in the art will recognize various It is also possible for improving, increasing and replacing, and therefore, scope of the present application should be not limited to the above embodiments.

Claims (14)

1. a kind of method for network access, which is characterized in that the described method includes:
Terminal obtains target network parameter from server by identification card;
Target network is accessed according to the target network parameter.
2. the method according to claim 1, wherein the identification card are as follows: virtual identification card or Entity recognition card.
3. the method is also wrapped the method according to claim 1, wherein the identification card is virtual identification card It includes:
The terminal is to the first virtual identification card of carrier network application.
4. according to the method described in claim 3, it is characterized in that, the virtual identification card is virtual client identification module SIM Card;
Second operator belonging to first operator belonging to the virtual SIM card and the target network is same operator.
5. according to the method described in claim 3, it is characterized in that, the virtual identification card is virtual client identification module SIM Card;
Second operator belonging to first operator belonging to the virtual SIM card and the target network is different operators.
6. according to the method described in claim 5, it is characterized in that, the card for the virtual SIM card applied to first operator Parameter is identified including at least SIM card;
It is described that target network is accessed according to target network parameter, comprising:
The terminal sends the SIM card and identifies to target network, and receives the feedback message of the target network;The feedback Message is used to indicate virtual SIM card described in the terminal and obtains the target network insertion authority;
According to the feedback message and target network parameter, the terminal accesses the target network.
7. method according to claim 1 or 5, which is characterized in that the terminal obtains mesh from server by identification card Mark network parameter, comprising:
Show that the identification card obtains the target network list of authorization;
Target network to be accessed is chosen from the target network list;
The target network parameter of the target network to be accessed is obtained from server.
8. according to the method described in claim 5, it is characterized in that, the terminal obtains target network from network side by identification card Network parameter, comprising:
Obtain the current location information of the terminal;
The operator of accessible target network is obtained from the base station in the corresponding network coverage distance range of the location information Information;
Target network parameter corresponding with the operator's informaiton is obtained from the server by virtual SIM card.
9. according to the method described in claim 4, it is characterized in that,
The target network is the voice VoLTE based on LTE, and the target network parameter is VoLTE parameter;
Alternatively, the target network is the voice VoWiFi based on WiFi, the target network parameter is WiFi parameter;
Alternatively, the target network is 5G, the target network parameter is VoNR parameter;
Alternatively, the target network be converged communication RCS, the target network parameter include VoLTE parameter, WiFi parameter, At least one of VoNR parameter.
10. according to the method described in claim 9, it is characterized in that, the terminal obtains target from server by identification card Network parameter includes:
The terminal is to the first carrier network application virtual SIM card;
The VoLTE parameter of VoLTE network is obtained by the virtual SIM card;Wherein the VoLTE network is first operation The VoLTE network of quotient.
11. the method according to claim 1, wherein the method also includes:
Random number is obtained when the terminal is to the first carrier network application virtual SIM card;
The terminal obtains target network parameter from server by identification card
The terminal sends the random number to the first carrier network, is held by the first carrier network according to the random number After capable proof of identity, the VoLTE parameter of VoLTE network is obtained by the virtual SIM card;Wherein the VoLTE network is The VoLTE network of first operator.
12. a kind of terminal, which is characterized in that the terminal includes:
Acquiring unit, for obtaining target network parameter from server by identification card;
Access unit, for accessing target network according to the target network parameter.
13. a kind of terminal, which is characterized in that the terminal includes:
It is stored with the memory of computer program;
Processor, when for executing the computer program the step of any one of realization claim 1 to 11 the method.
14. a kind of computer storage medium, which is characterized in that be stored thereon with computer program, the computer program is located Manage the step of any one of claim 1 to 11 the method is realized when device executes.
CN201811210797.2A 2018-10-17 2018-10-17 A kind of method for network access, terminal and computer storage medium Pending CN109246700A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811210797.2A CN109246700A (en) 2018-10-17 2018-10-17 A kind of method for network access, terminal and computer storage medium
PCT/CN2019/111684 WO2020078425A1 (en) 2018-10-17 2019-10-17 Network access method, terminal, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811210797.2A CN109246700A (en) 2018-10-17 2018-10-17 A kind of method for network access, terminal and computer storage medium

Publications (1)

Publication Number Publication Date
CN109246700A true CN109246700A (en) 2019-01-18

Family

ID=65053817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811210797.2A Pending CN109246700A (en) 2018-10-17 2018-10-17 A kind of method for network access, terminal and computer storage medium

Country Status (2)

Country Link
CN (1) CN109246700A (en)
WO (1) WO2020078425A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109769245A (en) * 2019-02-27 2019-05-17 努比亚技术有限公司 A kind of mobile terminal radio frequency compatibility method, mobile terminal and computer readable storage medium
CN110149677A (en) * 2019-06-10 2019-08-20 广东以诺通讯有限公司 A kind of method and mobile terminal of terminal selection access VoWiFi network
WO2020078425A1 (en) * 2018-10-17 2020-04-23 中兴通讯股份有限公司 Network access method, terminal, and computer storage medium
CN111787552A (en) * 2019-04-04 2020-10-16 安克创新科技股份有限公司 Network operation control method and device
CN111818518A (en) * 2020-06-29 2020-10-23 珠海市小源科技有限公司 5G message receiving method and device based on application software and storage medium
CN112866975A (en) * 2020-12-29 2021-05-28 恒宝股份有限公司 Cross-border roaming code number control method, device and system

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654824B (en) * 2020-05-29 2023-07-25 Oppo广东移动通信有限公司 Network condition prompting method, device, electronic equipment and storage medium
CN112492575B (en) * 2020-11-19 2023-05-23 惠州Tcl移动通信有限公司 Execution path setting method and device, storage medium and mobile terminal
CN112312514B (en) * 2020-11-23 2023-06-20 惠州Tcl移动通信有限公司 Method, device, equipment and computer readable storage medium for accessing network
CN115086207A (en) * 2022-06-14 2022-09-20 深信服科技股份有限公司 Network card detection method and device, electronic equipment and storage medium
CN115190467B (en) * 2022-06-28 2023-09-01 盖泰柯通信系统(上海)有限公司 Method, system, electronic equipment and storage medium for universal call in mobile private network

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2387293B (en) * 2001-07-31 2005-11-23 Inventec Appliances Corp Method for automatically setting network configuration of portable communication device
CN1829344A (en) * 2005-07-29 2006-09-06 华为技术有限公司 Parameter allocating system and method for mobile station
CN101222711A (en) * 2008-02-02 2008-07-16 代邦(江西)制卡有限公司 Mobile communication network system supporting virtual SIM card and authentication method thereof
JP4392035B2 (en) * 2007-06-20 2009-12-24 ソフトバンクモバイル株式会社 Mobile communication terminal
CN104640096A (en) * 2015-02-05 2015-05-20 西安酷派软件科技有限公司 Data transmission method and device as well as terminal
CN106162606A (en) * 2016-07-26 2016-11-23 努比亚技术有限公司 A kind of method for switching network and mobile terminal
CN106488435A (en) * 2015-08-31 2017-03-08 中兴通讯股份有限公司 A kind of client identification module approaches to IM and mobile terminal
CN107182046A (en) * 2017-05-25 2017-09-19 深圳市万普拉斯科技有限公司 Network collocating method, device, user terminal and readable storage medium storing program for executing
CN107682850A (en) * 2017-10-18 2018-02-09 影响力技术有限公司 A kind of soft SIM card selection, acquisition methods and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581889A (en) * 2012-07-31 2014-02-12 鸿富锦精密工业(深圳)有限公司 Method and system for automatically updating network configuration parameters
CN103415017A (en) * 2013-08-23 2013-11-27 深圳市中兴物联科技有限公司 Method, device and mobile terminal of virtual SIM card
CN107995613A (en) * 2016-10-26 2018-05-04 中兴通讯股份有限公司 A kind of method, mobile terminal and server for obtaining virtual SIM card
CN107172588A (en) * 2017-06-14 2017-09-15 广东艾檬电子科技有限公司 A kind of WiFi network recommends method and device
CN107241783B (en) * 2017-06-23 2020-01-21 山东润达信息技术有限公司 Network searching method and terminal
CN109246700A (en) * 2018-10-17 2019-01-18 中兴通讯股份有限公司 A kind of method for network access, terminal and computer storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2387293B (en) * 2001-07-31 2005-11-23 Inventec Appliances Corp Method for automatically setting network configuration of portable communication device
CN1829344A (en) * 2005-07-29 2006-09-06 华为技术有限公司 Parameter allocating system and method for mobile station
JP4392035B2 (en) * 2007-06-20 2009-12-24 ソフトバンクモバイル株式会社 Mobile communication terminal
CN101222711A (en) * 2008-02-02 2008-07-16 代邦(江西)制卡有限公司 Mobile communication network system supporting virtual SIM card and authentication method thereof
CN104640096A (en) * 2015-02-05 2015-05-20 西安酷派软件科技有限公司 Data transmission method and device as well as terminal
CN106488435A (en) * 2015-08-31 2017-03-08 中兴通讯股份有限公司 A kind of client identification module approaches to IM and mobile terminal
CN106162606A (en) * 2016-07-26 2016-11-23 努比亚技术有限公司 A kind of method for switching network and mobile terminal
CN107182046A (en) * 2017-05-25 2017-09-19 深圳市万普拉斯科技有限公司 Network collocating method, device, user terminal and readable storage medium storing program for executing
CN107682850A (en) * 2017-10-18 2018-02-09 影响力技术有限公司 A kind of soft SIM card selection, acquisition methods and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020078425A1 (en) * 2018-10-17 2020-04-23 中兴通讯股份有限公司 Network access method, terminal, and computer storage medium
CN109769245A (en) * 2019-02-27 2019-05-17 努比亚技术有限公司 A kind of mobile terminal radio frequency compatibility method, mobile terminal and computer readable storage medium
CN111787552A (en) * 2019-04-04 2020-10-16 安克创新科技股份有限公司 Network operation control method and device
CN111787552B (en) * 2019-04-04 2023-09-22 安克创新科技股份有限公司 Control method and device for network operation
CN110149677A (en) * 2019-06-10 2019-08-20 广东以诺通讯有限公司 A kind of method and mobile terminal of terminal selection access VoWiFi network
CN110149677B (en) * 2019-06-10 2021-03-02 深圳市福日中诺电子科技有限公司 Method for selecting VoWiFi network access by terminal and mobile terminal
CN111818518A (en) * 2020-06-29 2020-10-23 珠海市小源科技有限公司 5G message receiving method and device based on application software and storage medium
CN111818518B (en) * 2020-06-29 2023-12-26 珠海市小源科技有限公司 5G message receiving method and device based on application software and storage medium
CN112866975A (en) * 2020-12-29 2021-05-28 恒宝股份有限公司 Cross-border roaming code number control method, device and system
CN112866975B (en) * 2020-12-29 2022-11-18 恒宝股份有限公司 Cross-border roaming code number control method, device and system

Also Published As

Publication number Publication date
WO2020078425A1 (en) 2020-04-23

Similar Documents

Publication Publication Date Title
CN109246700A (en) A kind of method for network access, terminal and computer storage medium
US10349267B1 (en) Systems and methods for transferring SIM profiles between eUICC devices
US9787343B2 (en) Method and system for dynamic managing of subscriber devices in mobile networks
US8626708B2 (en) Management of user data
TWI533658B (en) Methods and apparatus for access control client assisted roaming
US10141966B2 (en) Update of a trusted name list
US8417234B2 (en) Method and apparatus for tracking the programming of a mobile device with multiple service accounts
US8190198B1 (en) Enabling portability of credentials across dual mode devices
US11523261B2 (en) Handling of subscription profiles for a set of wireless devices
CN101573934A (en) Authentication in a communications network
US20070192838A1 (en) Management of user data
AU2006348737B2 (en) Policy control architecture comprising an indepent identity provider
CN110268731A (en) For obtaining the technology of network insertion profile
CN107113540B (en) Method for downloading subscriptions to an identification unit
US10820265B2 (en) IoT device connectivity provisioning
US20200008052A1 (en) Attachment of a wireless device to a mobile network operator
CA2866717C (en) Systems and methods for performing over-the-air activation while roaming
EP3216274B1 (en) Method and device for accessing an internet protocol multimedia subsystem type subsystem
US11930558B2 (en) Method for providing subscription profiles, subscriber identity module and subscription server
CN109121132A (en) A kind of information processing method, device and computer readable storage medium
WO2023072428A1 (en) Method for managing at least one euicc information set (eis) of a euicc and intermediate buffer proxy
US9544760B2 (en) Method of activation on a second network of a terminal comprising a memory module associated with a first network
KR20160114877A (en) Method and apparatus for downloading policy rule in wireless communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190118

WD01 Invention patent application deemed withdrawn after publication