CN110430573A - A kind of information authentication method, electronic equipment and network side equipment - Google Patents
A kind of information authentication method, electronic equipment and network side equipment Download PDFInfo
- Publication number
- CN110430573A CN110430573A CN201910703660.9A CN201910703660A CN110430573A CN 110430573 A CN110430573 A CN 110430573A CN 201910703660 A CN201910703660 A CN 201910703660A CN 110430573 A CN110430573 A CN 110430573A
- Authority
- CN
- China
- Prior art keywords
- encrypted authentication
- authentication information
- information
- electronic equipment
- network side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000004422 calculation algorithm Methods 0.000 claims description 60
- 238000004590 computer program Methods 0.000 claims description 15
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000005303 weighing Methods 0.000 claims 1
- 230000008569 process Effects 0.000 description 14
- 230000008859 change Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 230000006854 communication Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000005611 electricity Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The present invention provides a kind of information authentication method, electronic equipment and network side equipment, this method comprises: sending the first encrypted authentication information to network side equipment;The second encrypted authentication information that the network side equipment is sent is received, the second encrypted authentication information is the network side equipment to the information obtained after the first encrypted authentication information update;It, will be in the configuration information of the second encrypted authentication information update to the electronic equipment if the second encrypted authentication information meets preset condition.The configuration information of electronic equipment is updated by using the second encrypted authentication information for meeting preset condition in this way, it is possible to prevente effectively from when the authentication information in the second encrypted authentication information and configuration information has differences the phenomenon that the failure of caused authentication, and improve the authentication efficiency of WIFI phone and register power.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of information authentication methods, electronic equipment and network side equipment.
Background technique
With the rapid development of mobile Internet, by WIFI telephony, user can use mobile Internet
Meanwhile dialing and answering voice or visual telephone.Wherein, when using WIFI phone, need first to register WIFI phone, and
In the registration process of WIFI phone, need to carry out encrypted authentication certification so that the encrypted authentication algorithm of consumer electronic devices with
The encrypted authentication algorithm of network side equipment is consistent, to complete the authentication of WIFI phone.
However, during the certification of the encrypted authentication of WIFI phone, due to the encrypted authentication algorithm of consumer electronic devices
There is configuration error or configure infull situation, so as to cause the encrypted authentication algorithm and network side equipment of consumer electronic devices
Encrypted authentication algorithm it is inconsistent so that WIFI phone is unable to complete authentication, cause user can not normal use
WIFI phone.
As it can be seen that there is authentication low efficiency in the registration process of existing WIFI phone.
Summary of the invention
The embodiment of the present invention provides a kind of information authentication method, electronic equipment and network side equipment, existing to solve
In the registration process of VOWIFI, there are problems that authentication low efficiency.
In order to solve the above technical problems, the present invention is implemented as follows:
In a first aspect, being applied to electronic equipment the embodiment of the invention provides a kind of information authentication method, comprising:
The first encrypted authentication information is sent to network side equipment;
The second encrypted authentication information that the network side equipment is sent is received, the second encrypted authentication information is the net
Network side apparatus is to the information obtained after the first encrypted authentication information update;
If the second encrypted authentication information meets preset condition, by the second encrypted authentication information update to described
In the configuration information of electronic equipment.
Second aspect, the embodiment of the invention provides a kind of information authentication methods, are applied to network side equipment, comprising:
Receive the first encrypted authentication information that electronic equipment is sent;
The second encrypted authentication information is generated based on the first encrypted authentication information;
The second encrypted authentication information is sent to the electronic equipment;
Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information
For being updated in the configuration information of the electronic equipment.
The third aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising:
First sending module, for sending the first encrypted authentication information to network side equipment;
First receiving module, the second encrypted authentication information sent for receiving the network side equipment, described second adds
Close authentication information is the network side equipment to the information obtained after the first encrypted authentication information update;
First update module encrypts if meeting preset condition for the second encrypted authentication information by described second
Authentication information is updated in the configuration information of the electronic equipment.
Fourth aspect, the embodiment of the present invention also provide a kind of network side equipment, comprising:
Third receiving module, for receiving the first encrypted authentication information of electronic equipment transmission;
Generation module, for generating the second encrypted authentication information based on the first encrypted authentication information;
Third sending module, for sending the second encrypted authentication information, second encrypted authentication to the electronic equipment
Information is for being updated the configuration information of the electronic equipment.
5th aspect, the embodiment of the present invention also provide a kind of electronic equipment, including processor, memory and are stored in described
It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor
The step of existing above- mentioned information authentication method.
6th aspect, the embodiment of the present invention also provide a kind of network side equipment, including processor, memory and are stored in institute
The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor
The step of realizing above- mentioned information authentication method.
7th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage
It is stored with computer program on medium, the information authentication method of first aspect is realized when the computer program is executed by processor
The step of and second aspect described in information authentication method the step of.
In embodiments of the present invention, by sending the first encrypted authentication information to network side equipment;Receive the network side
The second encrypted authentication information that equipment is sent, the second encrypted authentication information are the network side equipment to first encryption
The information that authentication information obtains after updating;If the second encrypted authentication information meets preset condition, described second is encrypted
Authentication information is updated in the configuration information of the electronic equipment.In this way by using the second encrypted authentication for meeting preset condition
Information is updated the configuration information of electronic equipment, it is possible to prevente effectively from when in the second encrypted authentication information and configuration information
The phenomenon that caused authentication fails when authentication information has differences, and improve the authentication efficiency and registration of WIFI phone
Success rate.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention
Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention,
For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the flow chart for the information authentication method that one embodiment of the invention provides;
Fig. 2 be another embodiment of the present invention provides information authentication method flow chart;
Fig. 3 is the flow chart for the information authentication method that further embodiment of this invention provides;
Fig. 4 is the structure chart for the electronic equipment that one embodiment of the invention provides;
Fig. 5 is the structure chart for the network side equipment that one embodiment of the invention provides;
Fig. 6 be another embodiment of the present invention provides electronic equipment structure chart;
Fig. 7 be another embodiment of the present invention provides network side equipment structure chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It is the flow chart for the information authentication method that one embodiment of the invention provides referring to Fig. 1, Fig. 1, the embodiment of the present invention mentions
The information authentication method of confession is applied to electronic equipment, as shown in Figure 1, comprising the following steps:
Step 101 sends the first encrypted authentication information to network side equipment.
In the step, the first encrypted authentication information includes the Encryption Algorithm negotiation letter that electronic equipment is used to update configuration information
Breath, authentication information etc..
Step 102 receives the second encrypted authentication information that the network side equipment is sent.
In the step, the second encrypted authentication information is network side equipment to the letter obtained after the first encrypted authentication information update
Breath.
Wherein, it in network side equipment during to the first encrypted authentication information update, can first reflect to the first encryption
Encryption Algorithm negotiation information, authentication information in power information etc. are parsed, compared and are authenticated, and are then updated and are obtained second
Encrypted authentication information.
Wherein, the second encrypted authentication information includes the Encryption Algorithm and desired Encryption Algorithm that network side equipment is supported, with
Just electronic equipment can carry out the update of configuration information based on the second encrypted authentication information, complete the authentication of WIFI phone.
If step 103, the second encrypted authentication information meet preset condition, more by the second encrypted authentication information
In the new extremely configuration information of the electronic equipment.
In the step, if the configuration information of the second encrypted authentication information and electronic equipment has differences, for example match confidence
There are extra or missing parts relative to the second encrypted authentication information for initial encryption authentication information in breath, it is determined that second
Encrypted authentication information meets preset condition.Or the configuration information of electronic equipment occurs relative to last authentication
Change or modification, cause the second encrypted authentication information to have differences with the authentication information in configuration information, then can also determine
Think that the second encrypted authentication information meets preset condition.
It wherein, can be by the second encrypted authentication information in the second encrypted authentication information in the case where meeting preset condition
It is updated in the configuration information of electronic equipment, i.e., is carried out more using configuration information of the second encrypted authentication information to electronic equipment
Newly, to complete the authentication of the WIFI phone of electronic equipment, meet user to the use demand of WIFI phone.
During being updated using the second encrypted authentication information to configuration information, lacked if existing in configuration information
The part of missing is then filled in the part of mistake using the second encrypted authentication information;If there are extra parts in configuration information, then
Using the extra part of the second encrypted authentication information deletion, to complete update of the second encrypted authentication information to configuration information.
In this way, being carried out more by using the second encrypted authentication information for meeting preset condition to the configuration information of electronic equipment
Newly, it is possible to prevente effectively from caused authentication is recognized when the second encrypted authentication information has differences with the authentication information in configuration information
The phenomenon that card failure, and improve the authentication efficiency of WIFI phone and register power, meet the normal use of user, is promoted
The usage experience of user.
Optionally, after described the step of receiving the second encrypted authentication information that the network side equipment sends, and
If the second encrypted authentication information meets preset condition, by the second encrypted authentication information update to the electronics
Before step in the configuration information of equipment, the method also includes: the second encrypted authentication information is matched into confidence with described
Initial encryption authentication information in breath is compared;If the second encrypted authentication information is deposited with the initial encryption authentication information
In difference, it is determined that the second encrypted authentication information meets preset condition.
It, can be by by the initial encryption authentication information in the second encrypted authentication information and configuration information in present embodiment
It is compared, to confirm that the second encrypted authentication information and initial encryption authentication information whether there is difference;Difference if it exists, then really
Fixed second encrypted authentication information meets preset condition.
In this way, determining whether the second encrypted authentication information deposits with initial encryption authentication information by way of Determination
In difference, the accuracy of Difference test can be effectively promoted, and then improves the authentication efficiency of WIFI phone and succeeds in registration
Rate.
Optionally, if meeting preset condition in the second encrypted authentication information, by second encrypted authentication
After step of the information update into the configuration information of the electronic equipment, the method also includes: it receives the network side and sets
The third encrypted authentication information that preparation is sent, the third encrypted authentication information are that the network side equipment is based on second encryption
It is obtained after authentication information change;By the third encrypted authentication information update into the configuration information.
In present embodiment, third encrypted authentication information is obtained after network side equipment is based on the change of the second encrypted authentication information
It arrives, such as in the use process of electronic equipment, if changing or repairing occur in the encrypted authentication algorithm of network side equipment
Change, it is different so as to cause the encrypted authentication algorithm in the encrypted authentication algorithm of network side equipment and the configuration information of electronic equipment
It causes, and then causes electronic equipment can not normal use WIFI phone.And pass through the encrypted authentication algorithm based on network side equipment
It changes or modifies, obtain third encrypted authentication information to update, and use third encrypted authentication information update to configuration information
In, to guarantee that the encrypted authentication after encrypted authentication algorithm and network side equipment the side change in the configuration information of electronic equipment is calculated
The consistency of method so that user can continue normal use WIFI phone, and promotes user experience.
Optionally, if meeting preset condition in the second encrypted authentication information, by second encrypted authentication
After step of the information update into the configuration information of the electronic equipment, the method also includes: Xiang Suoshu network side equipment
Negotiation information is sent, the negotiation information includes encrypted authentication algorithm corresponding with the second encrypted authentication information.
It, can after being successfully updated the second encrypted authentication information in the configuration information to electronic equipment in present embodiment
To send negotiation information to network side equipment, it is backed up so that network side equipment carries out storage to negotiation information, it is subsequent right to meet
The use demand of negotiation information.
Wherein, negotiation information includes the encrypted authentication algorithm being updated in configuration information.
The information authentication method of the embodiment of the present invention, by sending the first encrypted authentication information to network side equipment;It receives
The second encrypted authentication information that the network side equipment is sent, the second encrypted authentication information is the network side equipment to institute
State the information obtained after the first encrypted authentication information update;If the second encrypted authentication information meets preset condition, by institute
The second encrypted authentication information update is stated into the configuration information of the electronic equipment.In this way by using meeting the of preset condition
Two encrypted authentication information are updated the configuration information of electronic equipment, it is possible to prevente effectively from working as the second encrypted authentication information and matching
When authentication information in confidence breath has differences the phenomenon that the failure of caused authentication, and improve the authentication of WIFI phone
Efficiency and register power.
Referring to fig. 2, Fig. 2 be another embodiment of the present invention provides information authentication method flow chart, the embodiment of the present invention
The information authentication method of offer is applied to network side equipment, as shown in Figure 2, comprising the following steps:
Step 201 receives the first encrypted authentication information that electronic equipment is sent.
In the step, the first encrypted authentication information includes the Encryption Algorithm negotiation letter that electronic equipment is used to update configuration information
Breath, authentication information etc..
Step 202 generates the second encrypted authentication information based on the first encrypted authentication information.
In the step, the second encrypted authentication information is network side equipment to the letter obtained after the first encrypted authentication information update
Breath.
Wherein, it in network side equipment during to the first encrypted authentication information update, can first reflect to the first encryption
Encryption Algorithm negotiation information, authentication information in power information etc. are parsed, compared and are authenticated, and are then updated and are obtained second
Encrypted authentication information.
Wherein, the second encrypted authentication information includes the Encryption Algorithm and desired Encryption Algorithm that network side equipment is supported, with
Just electronic equipment can carry out the update of configuration information based on the second encrypted authentication information, complete the authentication of WIFI phone.
Step 203, Xiang Suoshu electronic equipment send the second encrypted authentication information.
In the step, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is used for
It is updated in the configuration information of electronic equipment.
Wherein, if the configuration information of the second encrypted authentication information and electronic equipment has differences, such as in configuration information
Initial encryption authentication information relative to the second encrypted authentication information there are it is extra or missing part, it is determined that second encryption
Authentication information meets preset condition.Or there is change relative to last authentication in the configuration information of electronic equipment
Or modification, cause the second encrypted authentication information to have differences with the authentication information in configuration information, then can also determine and think
Second encrypted authentication information meets preset condition.
It wherein, can be by the second encrypted authentication information in the second encrypted authentication information in the case where meeting preset condition
It is updated in the configuration information of electronic equipment, i.e., is carried out more using configuration information of the second encrypted authentication information to electronic equipment
Newly, to complete the authentication of the WIFI phone of electronic equipment, meet user to the use demand of WIFI phone.
In this way, the second encrypted authentication information is generated by the first encrypted authentication information sent based on electronic equipment, so as to
Electronic equipment can be based on second encrypted authentication information update its configuration information, to effectively avoid when the second encrypted authentication information
The phenomenon that caused authentication fails when having differences with the authentication information in configuration information, and improve the authentication of WIFI phone
Authentication efficiency and power is registered, meets the normal use of user, promote the usage experience of user.
Optionally, after the second encrypted authentication information of transmission to the electronic equipment, the method also includes: if institute
The the second encrypted authentication information for stating network side equipment is changed to third encrypted authentication information, then to described in electronic equipment transmission
Third encrypted authentication information;Wherein, the third encrypted authentication information is for being updated in the configuration information.
Optionally, after the second encrypted authentication information of transmission to the electronic equipment, the method also includes: it receives
The negotiation information that the electronic equipment is sent, the negotiation information include encryption mirror corresponding with the second encrypted authentication information
Weigh algorithm;Store the negotiation information.
It should be noted that the embodiment in the embodiment of the present invention can reach same with the above-mentioned embodiment or phase
Close effect, to avoid repeating, which is not described herein again.
The information authentication method of the embodiment of the present invention, the first encrypted authentication information sent by receiving electronic equipment;Base
The second encrypted authentication information is generated in the first encrypted authentication information;The second encrypted authentication letter is sent to the electronic equipment
Breath;Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is for more
In the new extremely configuration information of the electronic equipment.The authentication efficiency of WIFI phone can be improved in this way and register power.
It is the flow chart for the information authentication method that further embodiment of this invention provides referring to Fig. 3, Fig. 3, as shown in figure 3, packet
Include following steps:
The encrypted authentication algorithm of WIFI phone is written to configuration information by step 301, user terminal.
In the step, IKE2 and EAP-AKA associated encryption authentication arithmetic can be written to configuration information in user terminal,
As at present untrusted WIFI phone be write-in iwlan_s2b_config.xml file.
Step 302, user terminal initiate Encryption Algorithm negotiation and authentication to network side equipment.
In the step, user terminal can send certification request information to network side equipment, to initiate Encryption Algorithm negotiation
And authentication.
For example, can be when user terminal is inserted into WIFI phone SIM card, user terminal carries encrypted authentication algorithm to net
Network side apparatus initiates Encryption Algorithm negotiation and authentication.
Step 303, network side equipment are completed Encryption Algorithm and are negotiated, and the Encryption Algorithm after negotiation is sent to user's end
End.
In the step, when network side equipment receives the Encryption Algorithm of user terminal initiation, network side equipment can be to adding
Close algorithm is parsed, compared and is authenticated, and the Encryption Algorithm that network side equipment is supported and desired Encryption Algorithm are packaged hair
Give user terminal.
Configuration information is written in the Encryption Algorithm of certification by step 304, user terminal in order, and continues to send out Encryption Algorithm
Give network side equipment.
In the step, when user terminal receives the Encryption Algorithm and desired Encryption Algorithm of the support of network side equipment transmission
When, configuration information can be written in the Encryption Algorithm of network side equipment support and desired Encryption Algorithm in order, and use network
The Encryption Algorithm and desired Encryption Algorithm that side apparatus is supported delete extra in configuration information or missing Encryption Algorithm
Subtract or supplement, to complete the modification certification of user terminal, and the Encryption Algorithm after modification certification is sent to network side equipment.
Step 305, when network side equipment encrypted authentication algorithm change when, the encrypted authentication algorithm after change is sent to
User terminal, user terminal modify encrypted authentication algorithm configuration information based on the encrypted authentication algorithm after change.
In the step, when the encrypted authentication algorithm of network side equipment is changed, network side equipment can will be after change
Encrypted authentication algorithm is sent to user terminal, and user terminal will use the encrypted authentication algorithm dynamic modification after the change received and match
Encrypted authentication algorithm in confidence breath, to guarantee the consistency of the encrypted authentication algorithm of user terminal and network side equipment, thus
It improves the authentication efficiency of WIFI phone and registers power.
Wherein, network side equipment can save the encrypted authentication algorithm after the negotiation of user terminal transmission, subsequent to meet
Use demand.
Referring to fig. 4, Fig. 4 is the structure chart for the terminal that one embodiment of the invention provides, as shown in figure 4, terminal 400 includes:
First sending module 401, for sending the first encrypted authentication information to network side equipment;
First receiving module 402, the second encrypted authentication information sent for receiving the network side equipment, described second
Encrypted authentication information is the network side equipment to the information obtained after the first encrypted authentication information update;
First update module 403 adds if meeting preset condition for the second encrypted authentication information by described second
Close authentication information is updated in the configuration information of the electronic equipment.
Optionally, the electronic equipment 400 further include:
Comparison module, for by the initial encryption authentication information in the second encrypted authentication information and the configuration information
It is compared;
Determining module, if being had differences for the second encrypted authentication information and the initial encryption authentication information,
Determine that the second encrypted authentication information meets preset condition.
Optionally, the electronic equipment 400 further include:
Second receiving module, the third encrypted authentication information sent for receiving the network side equipment, the third add
Close authentication information is obtained after the network side equipment is changed based on the second encrypted authentication information;
Second update module is used for the third encrypted authentication information update into the configuration information.
Optionally, the electronic equipment 400 further include:
Second sending module, for the network side equipment send negotiation information, the negotiation information include with it is described
The corresponding encrypted authentication algorithm of second encrypted authentication information.
Electronic equipment 400 can be realized each process that electronic equipment is realized in the embodiment of the method for Fig. 1, to avoid weight
Multiple, which is not described herein again.
The electronic equipment 400 of the embodiment of the present invention, by sending the first encrypted authentication information to network side equipment;Receive institute
The second encrypted authentication information of network side equipment transmission is stated, the second encrypted authentication information is the network side equipment to described
The information obtained after first encrypted authentication information update;It, will be described if the second encrypted authentication information meets preset condition
Second encrypted authentication information update is into the configuration information of the electronic equipment.In this way by using meeting the second of preset condition
Encrypted authentication information is updated the configuration information of electronic equipment, it is possible to prevente effectively from when the second encrypted authentication information and configuration
The phenomenon that caused authentication fails when authentication information in information has differences, and improve the authentication effect of WIFI phone
Rate and register power.
It is the structure chart for the network side equipment that one embodiment of the invention provides referring to Fig. 5, Fig. 5, as shown in figure 5, network side
Equipment 500 includes:
Third receiving module 501, for receiving the first encrypted authentication information of electronic equipment transmission;
Generation module 502, for generating the second encrypted authentication information based on the first encrypted authentication information;
Third sending module 503, for sending the second encrypted authentication information, the second encryption mirror to the electronic equipment
Power information is for being updated the configuration information of the electronic equipment.
Optionally, the network side equipment 500 further include:
4th sending module, if the second encrypted authentication information for the network side equipment is changed to third encrypted authentication
Information then sends the third encrypted authentication information to the electronic equipment;
Wherein, the third encrypted authentication information is for being updated in the configuration information.
Optionally, the network side equipment 500 further include:
4th receiving module, the negotiation information sent for receiving the electronic equipment, the negotiation information include and institute
State the corresponding encrypted authentication algorithm of the second encrypted authentication information;
Memory module, for storing the negotiation information.
Network side equipment 500 can be realized each process that network side equipment is realized in the embodiment of the method for Fig. 2, to avoid
It repeats, which is not described herein again.
The network side equipment 500 of the embodiment of the present invention, the first encrypted authentication information sent by receiving electronic equipment;Base
The second encrypted authentication information is generated in the first encrypted authentication information;The second encrypted authentication letter is sent to the electronic equipment
Breath;Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is for more
In the new extremely configuration information of the electronic equipment.The authentication efficiency of WIFI phone can be improved in this way and register power.
The hardware structural diagram of Fig. 6 a kind of electronic equipment of each embodiment to realize the present invention, as shown in fig. 6, should
Electronic equipment 600 includes but is not limited to: radio frequency unit 601, network module 602, audio output unit 603, input unit 604,
Sensor 605, display unit 606, user input unit 607, interface unit 608, memory 609, processor 610, Yi Ji electricity
The components such as source 611.It will be understood by those skilled in the art that electronic devices structure shown in Fig. 6 is not constituted to electronic equipment
Restriction, electronic equipment may include perhaps combining certain components or different components than illustrating more or fewer components
Arrangement.In embodiments of the present invention, electronic equipment include but is not limited to mobile phone, tablet computer, laptop, palm PC,
Vehicle electronic device, wearable device and pedometer etc..
Wherein, processor 610, for sending the first encrypted authentication information to network side equipment;The network side is received to set
The second encrypted authentication information that preparation is sent, the second encrypted authentication information are that the network side equipment reflects to first encryption
The information obtained after power information update;If the second encrypted authentication information meets preset condition, second encryption is reflected
Information update is weighed into the configuration information of the electronic equipment.
Optionally, the processor 610 is also used to: will be first in the second encrypted authentication information and the configuration information
Beginning encrypted authentication information is compared;If the second encrypted authentication information has differences with the initial encryption authentication information,
Then determine that the second encrypted authentication information meets preset condition.
Optionally, the processor 610 is also used to: the third encrypted authentication information that the network side equipment is sent is received,
The third encrypted authentication information is obtained after the network side equipment is changed based on the second encrypted authentication information;By institute
Third encrypted authentication information update is stated into the configuration information.
Optionally, the processor 610 is also used to: Xiang Suoshu network side equipment sends negotiation information, the negotiation information
Including encrypted authentication algorithm corresponding with the second encrypted authentication information.
Electronic equipment 600 can be realized each process that electronic equipment is realized in previous embodiment, to avoid repeating, here
It repeats no more.
The electronic equipment 600 of the embodiment of the present invention, by sending the first encrypted authentication information to network side equipment;Receive institute
The second encrypted authentication information of network side equipment transmission is stated, the second encrypted authentication information is the network side equipment to described
The information obtained after first encrypted authentication information update;It, will be described if the second encrypted authentication information meets preset condition
Second encrypted authentication information update is into the configuration information of the electronic equipment.In this way by using meeting the second of preset condition
Encrypted authentication information is updated the configuration information of electronic equipment, it is possible to prevente effectively from when the second encrypted authentication information and configuration
The phenomenon that caused authentication fails when authentication information in information has differences, and improve the authentication effect of WIFI phone
Rate and register power.
It should be understood that the embodiment of the present invention in, radio frequency unit 601 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 610 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 601 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 601 can also by wireless communication system and network and other set
Standby communication.
Electronic equipment provides wireless broadband internet by network module 602 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 603 can be received by radio frequency unit 601 or network module 602 or in memory 609
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 603 can also provide and electricity
The relevant audio output of specific function that sub- equipment 600 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 603 includes loudspeaker, buzzer and receiver etc..
Input unit 604 is for receiving audio or video signal.Input unit 604 may include graphics processor
(Graphics Processing Unit, GPU) 6041 and microphone 6042, graphics processor 6041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 606.Through graphics processor 6041, treated that picture frame can be deposited
Storage is sent in memory 609 (or other storage mediums) or via radio frequency unit 601 or network module 602.Mike
Wind 6042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 601 is converted in the case where telephone calling model.
Electronic equipment 600 further includes at least one sensor 605, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 6061, and proximity sensor can close when electronic equipment 600 is moved in one's ear
Display panel 6061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify electronic equipment posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 605 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 606 is for showing information input by user or being supplied to the information of user.Display unit 606 can wrap
Display panel 6061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 6061.
User input unit 607 can be used for receiving the number or character information of input, and generate the use with electronic equipment
Family setting and the related key signals input of function control.Specifically, user input unit 607 include touch panel 6071 and
Other input equipments 6072.Touch panel 6071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 6071 or in touch panel 6071
Neighbouring operation).Touch panel 6071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 610, receiving area
It manages the order that device 610 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 6071.In addition to touch panel 6071, user input unit 607 can also include other input equipments
6072.Specifically, other input equipments 6072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 6071 can be covered on display panel 6061, when touch panel 6071 is detected at it
On or near touch operation after, send processor 610 to determine the type of touch event, be followed by subsequent processing device 610 according to touching
The type for touching event provides corresponding visual output on display panel 6061.Although in Fig. 6, touch panel 6071 and display
Panel 6061 is the function that outputs and inputs of realizing electronic equipment as two independent components, but in some embodiments
In, can be integrated by touch panel 6071 and display panel 6061 and realize the function that outputs and inputs of electronic equipment, it is specific this
Place is without limitation.
Interface unit 608 is the interface that external device (ED) is connect with electronic equipment 600.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 608 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in electronic equipment 600 or can be used in 600 He of electronic equipment
Data are transmitted between external device (ED).
Memory 609 can be used for storing software program and various data.Memory 609 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 609 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 610 is the control centre of electronic equipment, utilizes each of various interfaces and the entire electronic equipment of connection
A part by running or execute the software program and/or module that are stored in memory 609, and calls and is stored in storage
Data in device 609 execute the various functions and processing data of electronic equipment, to carry out integral monitoring to electronic equipment.Place
Managing device 610 may include one or more processing units;Preferably, processor 610 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 610.
Electronic equipment 600 can also include the power supply 611 (such as battery) powered to all parts, it is preferred that power supply 611
Can be logically contiguous by power-supply management system and processor 610, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, electronic equipment 600 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of electronic equipment, including processor 610, and memory 609 is stored in
On memory 609 and the computer program that can run on the processor 610, the computer program are executed by processor 610
Each process of Shi Shixian above- mentioned information authentication method embodiment, and identical technical effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above- mentioned information authentication method embodiment, and energy when the computer program is executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It is the structure chart for the network side equipment that the embodiment of the present invention mentions referring to Fig. 7, Fig. 7, as shown in fig. 7, network side equipment
700 include memory 701, processor 702 and are stored in the computer that can be run on memory 701 and on processor 702
Program;Wherein:
Processor 702, for receiving the first encrypted authentication information of electronic equipment transmission;Based on first encrypted authentication
Information generates the second encrypted authentication information;The second encrypted authentication information is sent to the electronic equipment;Wherein, add described second
In the case that close authentication information meets preset condition, the second encrypted authentication information is for being updated to matching for the electronic equipment
In confidence breath.
Optionally, the processor 702 is also used to: if the second encrypted authentication information of the network side equipment is changed to
Three encrypted authentication information then send the third encrypted authentication information to the electronic equipment;Wherein, the third encrypted authentication
Information is for being updated in the configuration information.
Optionally, the processor 702 is also used to: receiving the negotiation information that the electronic equipment is sent, the negotiation letter
Breath includes encrypted authentication algorithm corresponding with the second encrypted authentication information;Store the negotiation information.
In Fig. 7, bus architecture may include the bus and bridge of any number of interconnection, specifically be represented by processor 702
One or more processors and the various circuits of memory that represent of memory 701 link together.Bus architecture can be with
Various other circuits of such as peripheral equipment, voltage-stablizer and management circuit or the like are linked together, these are all these
Well known to field, therefore, it will not be further described herein.Bus interface provides interface.Processor 702 is responsible for pipe
Bus architecture and common processing are managed, memory 701 can store the used data when executing operation of processor 702.
In addition, network side equipment 700 further includes some unshowned functional modules, details are not described herein.
Network side equipment 700 provided in an embodiment of the present invention can be realized each process of Fig. 2 embodiment of the method realization, and
Reach identical beneficial effect, to avoid repeating, which is not described herein again.
The network side equipment 700 of the embodiment of the present invention, the first encrypted authentication information sent by receiving electronic equipment;Base
The second encrypted authentication information is generated in the first encrypted authentication information;The second encrypted authentication letter is sent to the electronic equipment
Breath;Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is for more
In the new extremely configuration information of the electronic equipment.The authentication efficiency of WIFI phone can be improved in this way and register power.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above- mentioned information authentication method embodiment, and energy when the computer program is executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that an electronic equipment (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (17)
1. a kind of information authentication method is applied to electronic equipment characterized by comprising
The first encrypted authentication information is sent to network side equipment;
The second encrypted authentication information that the network side equipment is sent is received, the second encrypted authentication information is the network side
Equipment is to the information obtained after the first encrypted authentication information update;
If the second encrypted authentication information meets preset condition, by the second encrypted authentication information update to the electronics
In the configuration information of equipment.
2. the method according to claim 1, wherein second in the reception network side equipment transmission adds
After the step of close authentication information, and if meet preset condition in the second encrypted authentication information, by described second
Before step of the encrypted authentication information update into the configuration information of the electronic equipment, the method also includes:
The second encrypted authentication information is compared with the initial encryption authentication information in the configuration information;
If the second encrypted authentication information has differences with the initial encryption authentication information, it is determined that the second encryption mirror
Power information meets preset condition.
3. method according to claim 1 or 2, which is characterized in that if meeting in the second encrypted authentication information
Preset condition, then by after the step in the configuration information of the second encrypted authentication information update to the electronic equipment, institute
State method further include:
The third encrypted authentication information that the network side equipment is sent is received, the third encrypted authentication information is the network side
What equipment was obtained after being changed based on the second encrypted authentication information;
By the third encrypted authentication information update into the configuration information.
4. method according to claim 1 or 2, which is characterized in that if meeting in the second encrypted authentication information
Preset condition, then by after the step in the configuration information of the second encrypted authentication information update to the electronic equipment, institute
State method further include:
Negotiation information is sent to the network side equipment, the negotiation information includes corresponding with the second encrypted authentication information
Encrypted authentication algorithm.
5. a kind of information authentication method is applied to network side equipment characterized by comprising
Receive the first encrypted authentication information that electronic equipment is sent;
The second encrypted authentication information is generated based on the first encrypted authentication information;
The second encrypted authentication information is sent to the electronic equipment, the second encrypted authentication information is used for the electronic equipment
Configuration information be updated.
6. according to the method described in claim 5, it is characterized in that, sending the second encrypted authentication to the electronic equipment described
After the step of information, the method also includes:
If the second encrypted authentication information of the network side equipment is changed to third encrypted authentication information, to the electronic equipment
Send the third encrypted authentication information.
7. according to the method described in claim 5, it is characterized in that, sending the second encrypted authentication to the electronic equipment described
After the step of information, the method also includes:
The negotiation information that the electronic equipment is sent is received, the negotiation information includes corresponding with the second encrypted authentication information
Encrypted authentication algorithm;
Store the negotiation information.
8. a kind of electronic equipment characterized by comprising
First sending module, for sending the first encrypted authentication information to network side equipment;
First receiving module, the second encrypted authentication information sent for receiving the network side equipment, the second encryption mirror
Weighing information is the network side equipment to the information obtained after the first encrypted authentication information update;
First update module, if meeting preset condition for the second encrypted authentication information, by second encrypted authentication
Information update is into the configuration information of the electronic equipment.
9. electronic equipment according to claim 8, which is characterized in that the electronic equipment further include:
Comparison module, for carrying out the initial encryption authentication information in the second encrypted authentication information and the configuration information
It compares;
Determining module, if being had differences for the second encrypted authentication information and the initial encryption authentication information, it is determined that
The second encrypted authentication information meets preset condition.
10. electronic equipment according to claim 8 or claim 9, which is characterized in that the electronic equipment further include:
Second receiving module, the third encrypted authentication information sent for receiving the network side equipment, the third encryption mirror
Power information is obtained after the network side equipment is changed based on the second encrypted authentication information;
Second update module is used for the third encrypted authentication information update into the configuration information.
11. electronic equipment according to claim 8 or claim 9, which is characterized in that the electronic equipment further include:
Second sending module, for sending negotiation information to the network side equipment, the negotiation information includes and described second
The corresponding encrypted authentication algorithm of encrypted authentication information.
12. a kind of network side equipment characterized by comprising
Third receiving module, for receiving the first encrypted authentication information of electronic equipment transmission;
Generation module, for generating the second encrypted authentication information based on the first encrypted authentication information;
Third sending module, for sending the second encrypted authentication information, the second encrypted authentication information to the electronic equipment
It is updated for the configuration information to the electronic equipment.
13. network side equipment according to claim 12, which is characterized in that the network side equipment further include:
4th sending module, if the second encrypted authentication information for the network side equipment is changed to third encrypted authentication letter
Breath then sends the third encrypted authentication information to the electronic equipment;
Wherein, the third encrypted authentication information is for being updated in the configuration information.
14. network side equipment according to claim 12, which is characterized in that the network side equipment further include:
4th receiving module, the negotiation information sent for receiving the electronic equipment, the negotiation information include and described the
The corresponding encrypted authentication algorithm of two encrypted authentication information;
Memory module, for storing the negotiation information.
15. a kind of electronic equipment, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as Claims 1-4 is realized when the computer program is executed by the processor
Any one of described in information authentication method the step of.
16. a kind of network side equipment, which is characterized in that including processor, memory and be stored on the memory and can be
The computer program run on the processor realizes such as claim 5 when the computer program is executed by the processor
The step of to information authentication method described in any one of 7.
17. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program, the computer program realize information authentication method according to any one of claims 1 to 4 when being executed by processor
The step of, alternatively, the step of realizing the information authentication method as described in any one of claim 5 to 7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910703660.9A CN110430573A (en) | 2019-07-31 | 2019-07-31 | A kind of information authentication method, electronic equipment and network side equipment |
PCT/CN2020/098848 WO2021017720A1 (en) | 2019-07-31 | 2020-06-29 | Information verification method, electronic device and network-side device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910703660.9A CN110430573A (en) | 2019-07-31 | 2019-07-31 | A kind of information authentication method, electronic equipment and network side equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110430573A true CN110430573A (en) | 2019-11-08 |
Family
ID=68413507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910703660.9A Pending CN110430573A (en) | 2019-07-31 | 2019-07-31 | A kind of information authentication method, electronic equipment and network side equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110430573A (en) |
WO (1) | WO2021017720A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021017720A1 (en) * | 2019-07-31 | 2021-02-04 | 维沃移动通信有限公司 | Information verification method, electronic device and network-side device |
CN112351425A (en) * | 2020-10-15 | 2021-02-09 | 维沃移动通信有限公司 | Access authentication method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102056162A (en) * | 2009-11-03 | 2011-05-11 | 华为技术有限公司 | Method and device for carrying out access authentication and authentication system |
CN103179016A (en) * | 2011-12-21 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Method and system for updating multi-case terminal roaming configuration data and server |
CN108307389A (en) * | 2016-09-26 | 2018-07-20 | 中兴通讯股份有限公司 | Data security protection method, network access equipment and terminal |
CN108337695A (en) * | 2017-01-20 | 2018-07-27 | 维沃移动通信有限公司 | A kind of terminal capacity report method, base station and terminal |
US20180309570A1 (en) * | 2017-04-21 | 2018-10-25 | Netgear, Inc. | Secure communication in network access points |
CN108882185A (en) * | 2017-05-11 | 2018-11-23 | 展讯通信(上海)有限公司 | Configuration method, device and the mobile terminal of supplementary service |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101854625B (en) * | 2009-04-03 | 2014-12-03 | 华为技术有限公司 | Selective processing method and device of security algorithm, network entity and communication system |
JP6340996B2 (en) * | 2014-08-22 | 2018-06-13 | 富士通株式会社 | ENCRYPTION METHOD, INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING DEVICE |
CN106686589B (en) * | 2015-11-09 | 2020-04-28 | 中国电信股份有限公司 | Method, system and AAA server for realizing VoWiFi service |
CN110430573A (en) * | 2019-07-31 | 2019-11-08 | 维沃移动通信有限公司 | A kind of information authentication method, electronic equipment and network side equipment |
-
2019
- 2019-07-31 CN CN201910703660.9A patent/CN110430573A/en active Pending
-
2020
- 2020-06-29 WO PCT/CN2020/098848 patent/WO2021017720A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102056162A (en) * | 2009-11-03 | 2011-05-11 | 华为技术有限公司 | Method and device for carrying out access authentication and authentication system |
CN103179016A (en) * | 2011-12-21 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Method and system for updating multi-case terminal roaming configuration data and server |
CN108307389A (en) * | 2016-09-26 | 2018-07-20 | 中兴通讯股份有限公司 | Data security protection method, network access equipment and terminal |
CN108337695A (en) * | 2017-01-20 | 2018-07-27 | 维沃移动通信有限公司 | A kind of terminal capacity report method, base station and terminal |
US20180309570A1 (en) * | 2017-04-21 | 2018-10-25 | Netgear, Inc. | Secure communication in network access points |
CN108882185A (en) * | 2017-05-11 | 2018-11-23 | 展讯通信(上海)有限公司 | Configuration method, device and the mobile terminal of supplementary service |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021017720A1 (en) * | 2019-07-31 | 2021-02-04 | 维沃移动通信有限公司 | Information verification method, electronic device and network-side device |
CN112351425A (en) * | 2020-10-15 | 2021-02-09 | 维沃移动通信有限公司 | Access authentication method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2021017720A1 (en) | 2021-02-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107770760B (en) | A kind of method and mobile terminal of the type identifying bluetooth equipment | |
CN108924817A (en) | A kind of SIM card state switching method and mobile terminal | |
CN108459797A (en) | A kind of control method and mobile terminal of Folding screen | |
CN110034876A (en) | PUCCH resource instruction, processing method, network side equipment, user terminal | |
CN108108007A (en) | A kind of processing method and mobile terminal for reducing power consumption | |
CN107911445A (en) | A kind of information push method, mobile terminal and storage medium | |
CN110149663A (en) | Condition handover cancelling method and communication equipment | |
CN109257336A (en) | It is a kind of based on the encrypted message processing method of block chain, terminal device | |
CN109710349A (en) | A kind of screenshotss method and mobile terminal | |
CN109885257A (en) | A kind of disk file reading/writing method and device | |
CN109743503A (en) | Reminding method and terminal | |
CN109888928A (en) | A kind of terminal and wireless charging control method | |
CN109831359A (en) | A kind of detection method and its terminal device of data network connection state | |
CN109491230A (en) | A kind of clocking method and electronic equipment | |
CN110430573A (en) | A kind of information authentication method, electronic equipment and network side equipment | |
CN107979385B (en) | A kind of radio-frequency front-end data processing method and mobile terminal | |
CN109745699A (en) | A kind of method and terminal device responding touch control operation | |
CN110287655A (en) | A kind of verifying code imput method, device and mobile terminal | |
CN110096203A (en) | A kind of screenshot method and mobile terminal | |
CN109831582A (en) | Non- response events processing method and terminal | |
CN109443261A (en) | The acquisition methods and mobile terminal of Folding screen mobile terminal folding angles | |
CN107704334A (en) | A kind of SDK processing method and mobile terminal | |
CN108540951A (en) | A kind of recharge method and mobile terminal | |
CN110366182A (en) | A kind of data transmission method and terminal device | |
CN110531908A (en) | A kind of shortcut operation method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191108 |
|
RJ01 | Rejection of invention patent application after publication |