CN110430573A - A kind of information authentication method, electronic equipment and network side equipment - Google Patents

A kind of information authentication method, electronic equipment and network side equipment Download PDF

Info

Publication number
CN110430573A
CN110430573A CN201910703660.9A CN201910703660A CN110430573A CN 110430573 A CN110430573 A CN 110430573A CN 201910703660 A CN201910703660 A CN 201910703660A CN 110430573 A CN110430573 A CN 110430573A
Authority
CN
China
Prior art keywords
encrypted authentication
authentication information
information
electronic equipment
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910703660.9A
Other languages
Chinese (zh)
Inventor
毛源泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910703660.9A priority Critical patent/CN110430573A/en
Publication of CN110430573A publication Critical patent/CN110430573A/en
Priority to PCT/CN2020/098848 priority patent/WO2021017720A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The present invention provides a kind of information authentication method, electronic equipment and network side equipment, this method comprises: sending the first encrypted authentication information to network side equipment;The second encrypted authentication information that the network side equipment is sent is received, the second encrypted authentication information is the network side equipment to the information obtained after the first encrypted authentication information update;It, will be in the configuration information of the second encrypted authentication information update to the electronic equipment if the second encrypted authentication information meets preset condition.The configuration information of electronic equipment is updated by using the second encrypted authentication information for meeting preset condition in this way, it is possible to prevente effectively from when the authentication information in the second encrypted authentication information and configuration information has differences the phenomenon that the failure of caused authentication, and improve the authentication efficiency of WIFI phone and register power.

Description

A kind of information authentication method, electronic equipment and network side equipment
Technical field
The present invention relates to field of communication technology more particularly to a kind of information authentication methods, electronic equipment and network side equipment.
Background technique
With the rapid development of mobile Internet, by WIFI telephony, user can use mobile Internet Meanwhile dialing and answering voice or visual telephone.Wherein, when using WIFI phone, need first to register WIFI phone, and In the registration process of WIFI phone, need to carry out encrypted authentication certification so that the encrypted authentication algorithm of consumer electronic devices with The encrypted authentication algorithm of network side equipment is consistent, to complete the authentication of WIFI phone.
However, during the certification of the encrypted authentication of WIFI phone, due to the encrypted authentication algorithm of consumer electronic devices There is configuration error or configure infull situation, so as to cause the encrypted authentication algorithm and network side equipment of consumer electronic devices Encrypted authentication algorithm it is inconsistent so that WIFI phone is unable to complete authentication, cause user can not normal use WIFI phone.
As it can be seen that there is authentication low efficiency in the registration process of existing WIFI phone.
Summary of the invention
The embodiment of the present invention provides a kind of information authentication method, electronic equipment and network side equipment, existing to solve In the registration process of VOWIFI, there are problems that authentication low efficiency.
In order to solve the above technical problems, the present invention is implemented as follows:
In a first aspect, being applied to electronic equipment the embodiment of the invention provides a kind of information authentication method, comprising:
The first encrypted authentication information is sent to network side equipment;
The second encrypted authentication information that the network side equipment is sent is received, the second encrypted authentication information is the net Network side apparatus is to the information obtained after the first encrypted authentication information update;
If the second encrypted authentication information meets preset condition, by the second encrypted authentication information update to described In the configuration information of electronic equipment.
Second aspect, the embodiment of the invention provides a kind of information authentication methods, are applied to network side equipment, comprising:
Receive the first encrypted authentication information that electronic equipment is sent;
The second encrypted authentication information is generated based on the first encrypted authentication information;
The second encrypted authentication information is sent to the electronic equipment;
Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information For being updated in the configuration information of the electronic equipment.
The third aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising:
First sending module, for sending the first encrypted authentication information to network side equipment;
First receiving module, the second encrypted authentication information sent for receiving the network side equipment, described second adds Close authentication information is the network side equipment to the information obtained after the first encrypted authentication information update;
First update module encrypts if meeting preset condition for the second encrypted authentication information by described second Authentication information is updated in the configuration information of the electronic equipment.
Fourth aspect, the embodiment of the present invention also provide a kind of network side equipment, comprising:
Third receiving module, for receiving the first encrypted authentication information of electronic equipment transmission;
Generation module, for generating the second encrypted authentication information based on the first encrypted authentication information;
Third sending module, for sending the second encrypted authentication information, second encrypted authentication to the electronic equipment Information is for being updated the configuration information of the electronic equipment.
5th aspect, the embodiment of the present invention also provide a kind of electronic equipment, including processor, memory and are stored in described It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor The step of existing above- mentioned information authentication method.
6th aspect, the embodiment of the present invention also provide a kind of network side equipment, including processor, memory and are stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing above- mentioned information authentication method.
7th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage It is stored with computer program on medium, the information authentication method of first aspect is realized when the computer program is executed by processor The step of and second aspect described in information authentication method the step of.
In embodiments of the present invention, by sending the first encrypted authentication information to network side equipment;Receive the network side The second encrypted authentication information that equipment is sent, the second encrypted authentication information are the network side equipment to first encryption The information that authentication information obtains after updating;If the second encrypted authentication information meets preset condition, described second is encrypted Authentication information is updated in the configuration information of the electronic equipment.In this way by using the second encrypted authentication for meeting preset condition Information is updated the configuration information of electronic equipment, it is possible to prevente effectively from when in the second encrypted authentication information and configuration information The phenomenon that caused authentication fails when authentication information has differences, and improve the authentication efficiency and registration of WIFI phone Success rate.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart for the information authentication method that one embodiment of the invention provides;
Fig. 2 be another embodiment of the present invention provides information authentication method flow chart;
Fig. 3 is the flow chart for the information authentication method that further embodiment of this invention provides;
Fig. 4 is the structure chart for the electronic equipment that one embodiment of the invention provides;
Fig. 5 is the structure chart for the network side equipment that one embodiment of the invention provides;
Fig. 6 be another embodiment of the present invention provides electronic equipment structure chart;
Fig. 7 be another embodiment of the present invention provides network side equipment structure chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It is the flow chart for the information authentication method that one embodiment of the invention provides referring to Fig. 1, Fig. 1, the embodiment of the present invention mentions The information authentication method of confession is applied to electronic equipment, as shown in Figure 1, comprising the following steps:
Step 101 sends the first encrypted authentication information to network side equipment.
In the step, the first encrypted authentication information includes the Encryption Algorithm negotiation letter that electronic equipment is used to update configuration information Breath, authentication information etc..
Step 102 receives the second encrypted authentication information that the network side equipment is sent.
In the step, the second encrypted authentication information is network side equipment to the letter obtained after the first encrypted authentication information update Breath.
Wherein, it in network side equipment during to the first encrypted authentication information update, can first reflect to the first encryption Encryption Algorithm negotiation information, authentication information in power information etc. are parsed, compared and are authenticated, and are then updated and are obtained second Encrypted authentication information.
Wherein, the second encrypted authentication information includes the Encryption Algorithm and desired Encryption Algorithm that network side equipment is supported, with Just electronic equipment can carry out the update of configuration information based on the second encrypted authentication information, complete the authentication of WIFI phone.
If step 103, the second encrypted authentication information meet preset condition, more by the second encrypted authentication information In the new extremely configuration information of the electronic equipment.
In the step, if the configuration information of the second encrypted authentication information and electronic equipment has differences, for example match confidence There are extra or missing parts relative to the second encrypted authentication information for initial encryption authentication information in breath, it is determined that second Encrypted authentication information meets preset condition.Or the configuration information of electronic equipment occurs relative to last authentication Change or modification, cause the second encrypted authentication information to have differences with the authentication information in configuration information, then can also determine Think that the second encrypted authentication information meets preset condition.
It wherein, can be by the second encrypted authentication information in the second encrypted authentication information in the case where meeting preset condition It is updated in the configuration information of electronic equipment, i.e., is carried out more using configuration information of the second encrypted authentication information to electronic equipment Newly, to complete the authentication of the WIFI phone of electronic equipment, meet user to the use demand of WIFI phone.
During being updated using the second encrypted authentication information to configuration information, lacked if existing in configuration information The part of missing is then filled in the part of mistake using the second encrypted authentication information;If there are extra parts in configuration information, then Using the extra part of the second encrypted authentication information deletion, to complete update of the second encrypted authentication information to configuration information.
In this way, being carried out more by using the second encrypted authentication information for meeting preset condition to the configuration information of electronic equipment Newly, it is possible to prevente effectively from caused authentication is recognized when the second encrypted authentication information has differences with the authentication information in configuration information The phenomenon that card failure, and improve the authentication efficiency of WIFI phone and register power, meet the normal use of user, is promoted The usage experience of user.
Optionally, after described the step of receiving the second encrypted authentication information that the network side equipment sends, and If the second encrypted authentication information meets preset condition, by the second encrypted authentication information update to the electronics Before step in the configuration information of equipment, the method also includes: the second encrypted authentication information is matched into confidence with described Initial encryption authentication information in breath is compared;If the second encrypted authentication information is deposited with the initial encryption authentication information In difference, it is determined that the second encrypted authentication information meets preset condition.
It, can be by by the initial encryption authentication information in the second encrypted authentication information and configuration information in present embodiment It is compared, to confirm that the second encrypted authentication information and initial encryption authentication information whether there is difference;Difference if it exists, then really Fixed second encrypted authentication information meets preset condition.
In this way, determining whether the second encrypted authentication information deposits with initial encryption authentication information by way of Determination In difference, the accuracy of Difference test can be effectively promoted, and then improves the authentication efficiency of WIFI phone and succeeds in registration Rate.
Optionally, if meeting preset condition in the second encrypted authentication information, by second encrypted authentication After step of the information update into the configuration information of the electronic equipment, the method also includes: it receives the network side and sets The third encrypted authentication information that preparation is sent, the third encrypted authentication information are that the network side equipment is based on second encryption It is obtained after authentication information change;By the third encrypted authentication information update into the configuration information.
In present embodiment, third encrypted authentication information is obtained after network side equipment is based on the change of the second encrypted authentication information It arrives, such as in the use process of electronic equipment, if changing or repairing occur in the encrypted authentication algorithm of network side equipment Change, it is different so as to cause the encrypted authentication algorithm in the encrypted authentication algorithm of network side equipment and the configuration information of electronic equipment It causes, and then causes electronic equipment can not normal use WIFI phone.And pass through the encrypted authentication algorithm based on network side equipment It changes or modifies, obtain third encrypted authentication information to update, and use third encrypted authentication information update to configuration information In, to guarantee that the encrypted authentication after encrypted authentication algorithm and network side equipment the side change in the configuration information of electronic equipment is calculated The consistency of method so that user can continue normal use WIFI phone, and promotes user experience.
Optionally, if meeting preset condition in the second encrypted authentication information, by second encrypted authentication After step of the information update into the configuration information of the electronic equipment, the method also includes: Xiang Suoshu network side equipment Negotiation information is sent, the negotiation information includes encrypted authentication algorithm corresponding with the second encrypted authentication information.
It, can after being successfully updated the second encrypted authentication information in the configuration information to electronic equipment in present embodiment To send negotiation information to network side equipment, it is backed up so that network side equipment carries out storage to negotiation information, it is subsequent right to meet The use demand of negotiation information.
Wherein, negotiation information includes the encrypted authentication algorithm being updated in configuration information.
The information authentication method of the embodiment of the present invention, by sending the first encrypted authentication information to network side equipment;It receives The second encrypted authentication information that the network side equipment is sent, the second encrypted authentication information is the network side equipment to institute State the information obtained after the first encrypted authentication information update;If the second encrypted authentication information meets preset condition, by institute The second encrypted authentication information update is stated into the configuration information of the electronic equipment.In this way by using meeting the of preset condition Two encrypted authentication information are updated the configuration information of electronic equipment, it is possible to prevente effectively from working as the second encrypted authentication information and matching When authentication information in confidence breath has differences the phenomenon that the failure of caused authentication, and improve the authentication of WIFI phone Efficiency and register power.
Referring to fig. 2, Fig. 2 be another embodiment of the present invention provides information authentication method flow chart, the embodiment of the present invention The information authentication method of offer is applied to network side equipment, as shown in Figure 2, comprising the following steps:
Step 201 receives the first encrypted authentication information that electronic equipment is sent.
In the step, the first encrypted authentication information includes the Encryption Algorithm negotiation letter that electronic equipment is used to update configuration information Breath, authentication information etc..
Step 202 generates the second encrypted authentication information based on the first encrypted authentication information.
In the step, the second encrypted authentication information is network side equipment to the letter obtained after the first encrypted authentication information update Breath.
Wherein, it in network side equipment during to the first encrypted authentication information update, can first reflect to the first encryption Encryption Algorithm negotiation information, authentication information in power information etc. are parsed, compared and are authenticated, and are then updated and are obtained second Encrypted authentication information.
Wherein, the second encrypted authentication information includes the Encryption Algorithm and desired Encryption Algorithm that network side equipment is supported, with Just electronic equipment can carry out the update of configuration information based on the second encrypted authentication information, complete the authentication of WIFI phone.
Step 203, Xiang Suoshu electronic equipment send the second encrypted authentication information.
In the step, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is used for It is updated in the configuration information of electronic equipment.
Wherein, if the configuration information of the second encrypted authentication information and electronic equipment has differences, such as in configuration information Initial encryption authentication information relative to the second encrypted authentication information there are it is extra or missing part, it is determined that second encryption Authentication information meets preset condition.Or there is change relative to last authentication in the configuration information of electronic equipment Or modification, cause the second encrypted authentication information to have differences with the authentication information in configuration information, then can also determine and think Second encrypted authentication information meets preset condition.
It wherein, can be by the second encrypted authentication information in the second encrypted authentication information in the case where meeting preset condition It is updated in the configuration information of electronic equipment, i.e., is carried out more using configuration information of the second encrypted authentication information to electronic equipment Newly, to complete the authentication of the WIFI phone of electronic equipment, meet user to the use demand of WIFI phone.
In this way, the second encrypted authentication information is generated by the first encrypted authentication information sent based on electronic equipment, so as to Electronic equipment can be based on second encrypted authentication information update its configuration information, to effectively avoid when the second encrypted authentication information The phenomenon that caused authentication fails when having differences with the authentication information in configuration information, and improve the authentication of WIFI phone Authentication efficiency and power is registered, meets the normal use of user, promote the usage experience of user.
Optionally, after the second encrypted authentication information of transmission to the electronic equipment, the method also includes: if institute The the second encrypted authentication information for stating network side equipment is changed to third encrypted authentication information, then to described in electronic equipment transmission Third encrypted authentication information;Wherein, the third encrypted authentication information is for being updated in the configuration information.
Optionally, after the second encrypted authentication information of transmission to the electronic equipment, the method also includes: it receives The negotiation information that the electronic equipment is sent, the negotiation information include encryption mirror corresponding with the second encrypted authentication information Weigh algorithm;Store the negotiation information.
It should be noted that the embodiment in the embodiment of the present invention can reach same with the above-mentioned embodiment or phase Close effect, to avoid repeating, which is not described herein again.
The information authentication method of the embodiment of the present invention, the first encrypted authentication information sent by receiving electronic equipment;Base The second encrypted authentication information is generated in the first encrypted authentication information;The second encrypted authentication letter is sent to the electronic equipment Breath;Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is for more In the new extremely configuration information of the electronic equipment.The authentication efficiency of WIFI phone can be improved in this way and register power.
It is the flow chart for the information authentication method that further embodiment of this invention provides referring to Fig. 3, Fig. 3, as shown in figure 3, packet Include following steps:
The encrypted authentication algorithm of WIFI phone is written to configuration information by step 301, user terminal.
In the step, IKE2 and EAP-AKA associated encryption authentication arithmetic can be written to configuration information in user terminal, As at present untrusted WIFI phone be write-in iwlan_s2b_config.xml file.
Step 302, user terminal initiate Encryption Algorithm negotiation and authentication to network side equipment.
In the step, user terminal can send certification request information to network side equipment, to initiate Encryption Algorithm negotiation And authentication.
For example, can be when user terminal is inserted into WIFI phone SIM card, user terminal carries encrypted authentication algorithm to net Network side apparatus initiates Encryption Algorithm negotiation and authentication.
Step 303, network side equipment are completed Encryption Algorithm and are negotiated, and the Encryption Algorithm after negotiation is sent to user's end End.
In the step, when network side equipment receives the Encryption Algorithm of user terminal initiation, network side equipment can be to adding Close algorithm is parsed, compared and is authenticated, and the Encryption Algorithm that network side equipment is supported and desired Encryption Algorithm are packaged hair Give user terminal.
Configuration information is written in the Encryption Algorithm of certification by step 304, user terminal in order, and continues to send out Encryption Algorithm Give network side equipment.
In the step, when user terminal receives the Encryption Algorithm and desired Encryption Algorithm of the support of network side equipment transmission When, configuration information can be written in the Encryption Algorithm of network side equipment support and desired Encryption Algorithm in order, and use network The Encryption Algorithm and desired Encryption Algorithm that side apparatus is supported delete extra in configuration information or missing Encryption Algorithm Subtract or supplement, to complete the modification certification of user terminal, and the Encryption Algorithm after modification certification is sent to network side equipment.
Step 305, when network side equipment encrypted authentication algorithm change when, the encrypted authentication algorithm after change is sent to User terminal, user terminal modify encrypted authentication algorithm configuration information based on the encrypted authentication algorithm after change.
In the step, when the encrypted authentication algorithm of network side equipment is changed, network side equipment can will be after change Encrypted authentication algorithm is sent to user terminal, and user terminal will use the encrypted authentication algorithm dynamic modification after the change received and match Encrypted authentication algorithm in confidence breath, to guarantee the consistency of the encrypted authentication algorithm of user terminal and network side equipment, thus It improves the authentication efficiency of WIFI phone and registers power.
Wherein, network side equipment can save the encrypted authentication algorithm after the negotiation of user terminal transmission, subsequent to meet Use demand.
Referring to fig. 4, Fig. 4 is the structure chart for the terminal that one embodiment of the invention provides, as shown in figure 4, terminal 400 includes:
First sending module 401, for sending the first encrypted authentication information to network side equipment;
First receiving module 402, the second encrypted authentication information sent for receiving the network side equipment, described second Encrypted authentication information is the network side equipment to the information obtained after the first encrypted authentication information update;
First update module 403 adds if meeting preset condition for the second encrypted authentication information by described second Close authentication information is updated in the configuration information of the electronic equipment.
Optionally, the electronic equipment 400 further include:
Comparison module, for by the initial encryption authentication information in the second encrypted authentication information and the configuration information It is compared;
Determining module, if being had differences for the second encrypted authentication information and the initial encryption authentication information, Determine that the second encrypted authentication information meets preset condition.
Optionally, the electronic equipment 400 further include:
Second receiving module, the third encrypted authentication information sent for receiving the network side equipment, the third add Close authentication information is obtained after the network side equipment is changed based on the second encrypted authentication information;
Second update module is used for the third encrypted authentication information update into the configuration information.
Optionally, the electronic equipment 400 further include:
Second sending module, for the network side equipment send negotiation information, the negotiation information include with it is described The corresponding encrypted authentication algorithm of second encrypted authentication information.
Electronic equipment 400 can be realized each process that electronic equipment is realized in the embodiment of the method for Fig. 1, to avoid weight Multiple, which is not described herein again.
The electronic equipment 400 of the embodiment of the present invention, by sending the first encrypted authentication information to network side equipment;Receive institute The second encrypted authentication information of network side equipment transmission is stated, the second encrypted authentication information is the network side equipment to described The information obtained after first encrypted authentication information update;It, will be described if the second encrypted authentication information meets preset condition Second encrypted authentication information update is into the configuration information of the electronic equipment.In this way by using meeting the second of preset condition Encrypted authentication information is updated the configuration information of electronic equipment, it is possible to prevente effectively from when the second encrypted authentication information and configuration The phenomenon that caused authentication fails when authentication information in information has differences, and improve the authentication effect of WIFI phone Rate and register power.
It is the structure chart for the network side equipment that one embodiment of the invention provides referring to Fig. 5, Fig. 5, as shown in figure 5, network side Equipment 500 includes:
Third receiving module 501, for receiving the first encrypted authentication information of electronic equipment transmission;
Generation module 502, for generating the second encrypted authentication information based on the first encrypted authentication information;
Third sending module 503, for sending the second encrypted authentication information, the second encryption mirror to the electronic equipment Power information is for being updated the configuration information of the electronic equipment.
Optionally, the network side equipment 500 further include:
4th sending module, if the second encrypted authentication information for the network side equipment is changed to third encrypted authentication Information then sends the third encrypted authentication information to the electronic equipment;
Wherein, the third encrypted authentication information is for being updated in the configuration information.
Optionally, the network side equipment 500 further include:
4th receiving module, the negotiation information sent for receiving the electronic equipment, the negotiation information include and institute State the corresponding encrypted authentication algorithm of the second encrypted authentication information;
Memory module, for storing the negotiation information.
Network side equipment 500 can be realized each process that network side equipment is realized in the embodiment of the method for Fig. 2, to avoid It repeats, which is not described herein again.
The network side equipment 500 of the embodiment of the present invention, the first encrypted authentication information sent by receiving electronic equipment;Base The second encrypted authentication information is generated in the first encrypted authentication information;The second encrypted authentication letter is sent to the electronic equipment Breath;Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is for more In the new extremely configuration information of the electronic equipment.The authentication efficiency of WIFI phone can be improved in this way and register power.
The hardware structural diagram of Fig. 6 a kind of electronic equipment of each embodiment to realize the present invention, as shown in fig. 6, should Electronic equipment 600 includes but is not limited to: radio frequency unit 601, network module 602, audio output unit 603, input unit 604, Sensor 605, display unit 606, user input unit 607, interface unit 608, memory 609, processor 610, Yi Ji electricity The components such as source 611.It will be understood by those skilled in the art that electronic devices structure shown in Fig. 6 is not constituted to electronic equipment Restriction, electronic equipment may include perhaps combining certain components or different components than illustrating more or fewer components Arrangement.In embodiments of the present invention, electronic equipment include but is not limited to mobile phone, tablet computer, laptop, palm PC, Vehicle electronic device, wearable device and pedometer etc..
Wherein, processor 610, for sending the first encrypted authentication information to network side equipment;The network side is received to set The second encrypted authentication information that preparation is sent, the second encrypted authentication information are that the network side equipment reflects to first encryption The information obtained after power information update;If the second encrypted authentication information meets preset condition, second encryption is reflected Information update is weighed into the configuration information of the electronic equipment.
Optionally, the processor 610 is also used to: will be first in the second encrypted authentication information and the configuration information Beginning encrypted authentication information is compared;If the second encrypted authentication information has differences with the initial encryption authentication information, Then determine that the second encrypted authentication information meets preset condition.
Optionally, the processor 610 is also used to: the third encrypted authentication information that the network side equipment is sent is received, The third encrypted authentication information is obtained after the network side equipment is changed based on the second encrypted authentication information;By institute Third encrypted authentication information update is stated into the configuration information.
Optionally, the processor 610 is also used to: Xiang Suoshu network side equipment sends negotiation information, the negotiation information Including encrypted authentication algorithm corresponding with the second encrypted authentication information.
Electronic equipment 600 can be realized each process that electronic equipment is realized in previous embodiment, to avoid repeating, here It repeats no more.
The electronic equipment 600 of the embodiment of the present invention, by sending the first encrypted authentication information to network side equipment;Receive institute The second encrypted authentication information of network side equipment transmission is stated, the second encrypted authentication information is the network side equipment to described The information obtained after first encrypted authentication information update;It, will be described if the second encrypted authentication information meets preset condition Second encrypted authentication information update is into the configuration information of the electronic equipment.In this way by using meeting the second of preset condition Encrypted authentication information is updated the configuration information of electronic equipment, it is possible to prevente effectively from when the second encrypted authentication information and configuration The phenomenon that caused authentication fails when authentication information in information has differences, and improve the authentication effect of WIFI phone Rate and register power.
It should be understood that the embodiment of the present invention in, radio frequency unit 601 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 610 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 601 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 601 can also by wireless communication system and network and other set Standby communication.
Electronic equipment provides wireless broadband internet by network module 602 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 603 can be received by radio frequency unit 601 or network module 602 or in memory 609 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 603 can also provide and electricity The relevant audio output of specific function that sub- equipment 600 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 603 includes loudspeaker, buzzer and receiver etc..
Input unit 604 is for receiving audio or video signal.Input unit 604 may include graphics processor (Graphics Processing Unit, GPU) 6041 and microphone 6042, graphics processor 6041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 606.Through graphics processor 6041, treated that picture frame can be deposited Storage is sent in memory 609 (or other storage mediums) or via radio frequency unit 601 or network module 602.Mike Wind 6042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 601 is converted in the case where telephone calling model.
Electronic equipment 600 further includes at least one sensor 605, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 6061, and proximity sensor can close when electronic equipment 600 is moved in one's ear Display panel 6061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify electronic equipment posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 605 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 606 is for showing information input by user or being supplied to the information of user.Display unit 606 can wrap Display panel 6061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 6061.
User input unit 607 can be used for receiving the number or character information of input, and generate the use with electronic equipment Family setting and the related key signals input of function control.Specifically, user input unit 607 include touch panel 6071 and Other input equipments 6072.Touch panel 6071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 6071 or in touch panel 6071 Neighbouring operation).Touch panel 6071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 610, receiving area It manages the order that device 610 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 6071.In addition to touch panel 6071, user input unit 607 can also include other input equipments 6072.Specifically, other input equipments 6072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 6071 can be covered on display panel 6061, when touch panel 6071 is detected at it On or near touch operation after, send processor 610 to determine the type of touch event, be followed by subsequent processing device 610 according to touching The type for touching event provides corresponding visual output on display panel 6061.Although in Fig. 6, touch panel 6071 and display Panel 6061 is the function that outputs and inputs of realizing electronic equipment as two independent components, but in some embodiments In, can be integrated by touch panel 6071 and display panel 6061 and realize the function that outputs and inputs of electronic equipment, it is specific this Place is without limitation.
Interface unit 608 is the interface that external device (ED) is connect with electronic equipment 600.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 608 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in electronic equipment 600 or can be used in 600 He of electronic equipment Data are transmitted between external device (ED).
Memory 609 can be used for storing software program and various data.Memory 609 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 609 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 610 is the control centre of electronic equipment, utilizes each of various interfaces and the entire electronic equipment of connection A part by running or execute the software program and/or module that are stored in memory 609, and calls and is stored in storage Data in device 609 execute the various functions and processing data of electronic equipment, to carry out integral monitoring to electronic equipment.Place Managing device 610 may include one or more processing units;Preferably, processor 610 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 610.
Electronic equipment 600 can also include the power supply 611 (such as battery) powered to all parts, it is preferred that power supply 611 Can be logically contiguous by power-supply management system and processor 610, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, electronic equipment 600 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of electronic equipment, including processor 610, and memory 609 is stored in On memory 609 and the computer program that can run on the processor 610, the computer program are executed by processor 610 Each process of Shi Shixian above- mentioned information authentication method embodiment, and identical technical effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above- mentioned information authentication method embodiment, and energy when the computer program is executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It is the structure chart for the network side equipment that the embodiment of the present invention mentions referring to Fig. 7, Fig. 7, as shown in fig. 7, network side equipment 700 include memory 701, processor 702 and are stored in the computer that can be run on memory 701 and on processor 702 Program;Wherein:
Processor 702, for receiving the first encrypted authentication information of electronic equipment transmission;Based on first encrypted authentication Information generates the second encrypted authentication information;The second encrypted authentication information is sent to the electronic equipment;Wherein, add described second In the case that close authentication information meets preset condition, the second encrypted authentication information is for being updated to matching for the electronic equipment In confidence breath.
Optionally, the processor 702 is also used to: if the second encrypted authentication information of the network side equipment is changed to Three encrypted authentication information then send the third encrypted authentication information to the electronic equipment;Wherein, the third encrypted authentication Information is for being updated in the configuration information.
Optionally, the processor 702 is also used to: receiving the negotiation information that the electronic equipment is sent, the negotiation letter Breath includes encrypted authentication algorithm corresponding with the second encrypted authentication information;Store the negotiation information.
In Fig. 7, bus architecture may include the bus and bridge of any number of interconnection, specifically be represented by processor 702 One or more processors and the various circuits of memory that represent of memory 701 link together.Bus architecture can be with Various other circuits of such as peripheral equipment, voltage-stablizer and management circuit or the like are linked together, these are all these Well known to field, therefore, it will not be further described herein.Bus interface provides interface.Processor 702 is responsible for pipe Bus architecture and common processing are managed, memory 701 can store the used data when executing operation of processor 702.
In addition, network side equipment 700 further includes some unshowned functional modules, details are not described herein.
Network side equipment 700 provided in an embodiment of the present invention can be realized each process of Fig. 2 embodiment of the method realization, and Reach identical beneficial effect, to avoid repeating, which is not described herein again.
The network side equipment 700 of the embodiment of the present invention, the first encrypted authentication information sent by receiving electronic equipment;Base The second encrypted authentication information is generated in the first encrypted authentication information;The second encrypted authentication letter is sent to the electronic equipment Breath;Wherein, in the case where the second encrypted authentication information meets preset condition, the second encrypted authentication information is for more In the new extremely configuration information of the electronic equipment.The authentication efficiency of WIFI phone can be improved in this way and register power.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above- mentioned information authentication method embodiment, and energy when the computer program is executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that an electronic equipment (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (17)

1. a kind of information authentication method is applied to electronic equipment characterized by comprising
The first encrypted authentication information is sent to network side equipment;
The second encrypted authentication information that the network side equipment is sent is received, the second encrypted authentication information is the network side Equipment is to the information obtained after the first encrypted authentication information update;
If the second encrypted authentication information meets preset condition, by the second encrypted authentication information update to the electronics In the configuration information of equipment.
2. the method according to claim 1, wherein second in the reception network side equipment transmission adds After the step of close authentication information, and if meet preset condition in the second encrypted authentication information, by described second Before step of the encrypted authentication information update into the configuration information of the electronic equipment, the method also includes:
The second encrypted authentication information is compared with the initial encryption authentication information in the configuration information;
If the second encrypted authentication information has differences with the initial encryption authentication information, it is determined that the second encryption mirror Power information meets preset condition.
3. method according to claim 1 or 2, which is characterized in that if meeting in the second encrypted authentication information Preset condition, then by after the step in the configuration information of the second encrypted authentication information update to the electronic equipment, institute State method further include:
The third encrypted authentication information that the network side equipment is sent is received, the third encrypted authentication information is the network side What equipment was obtained after being changed based on the second encrypted authentication information;
By the third encrypted authentication information update into the configuration information.
4. method according to claim 1 or 2, which is characterized in that if meeting in the second encrypted authentication information Preset condition, then by after the step in the configuration information of the second encrypted authentication information update to the electronic equipment, institute State method further include:
Negotiation information is sent to the network side equipment, the negotiation information includes corresponding with the second encrypted authentication information Encrypted authentication algorithm.
5. a kind of information authentication method is applied to network side equipment characterized by comprising
Receive the first encrypted authentication information that electronic equipment is sent;
The second encrypted authentication information is generated based on the first encrypted authentication information;
The second encrypted authentication information is sent to the electronic equipment, the second encrypted authentication information is used for the electronic equipment Configuration information be updated.
6. according to the method described in claim 5, it is characterized in that, sending the second encrypted authentication to the electronic equipment described After the step of information, the method also includes:
If the second encrypted authentication information of the network side equipment is changed to third encrypted authentication information, to the electronic equipment Send the third encrypted authentication information.
7. according to the method described in claim 5, it is characterized in that, sending the second encrypted authentication to the electronic equipment described After the step of information, the method also includes:
The negotiation information that the electronic equipment is sent is received, the negotiation information includes corresponding with the second encrypted authentication information Encrypted authentication algorithm;
Store the negotiation information.
8. a kind of electronic equipment characterized by comprising
First sending module, for sending the first encrypted authentication information to network side equipment;
First receiving module, the second encrypted authentication information sent for receiving the network side equipment, the second encryption mirror Weighing information is the network side equipment to the information obtained after the first encrypted authentication information update;
First update module, if meeting preset condition for the second encrypted authentication information, by second encrypted authentication Information update is into the configuration information of the electronic equipment.
9. electronic equipment according to claim 8, which is characterized in that the electronic equipment further include:
Comparison module, for carrying out the initial encryption authentication information in the second encrypted authentication information and the configuration information It compares;
Determining module, if being had differences for the second encrypted authentication information and the initial encryption authentication information, it is determined that The second encrypted authentication information meets preset condition.
10. electronic equipment according to claim 8 or claim 9, which is characterized in that the electronic equipment further include:
Second receiving module, the third encrypted authentication information sent for receiving the network side equipment, the third encryption mirror Power information is obtained after the network side equipment is changed based on the second encrypted authentication information;
Second update module is used for the third encrypted authentication information update into the configuration information.
11. electronic equipment according to claim 8 or claim 9, which is characterized in that the electronic equipment further include:
Second sending module, for sending negotiation information to the network side equipment, the negotiation information includes and described second The corresponding encrypted authentication algorithm of encrypted authentication information.
12. a kind of network side equipment characterized by comprising
Third receiving module, for receiving the first encrypted authentication information of electronic equipment transmission;
Generation module, for generating the second encrypted authentication information based on the first encrypted authentication information;
Third sending module, for sending the second encrypted authentication information, the second encrypted authentication information to the electronic equipment It is updated for the configuration information to the electronic equipment.
13. network side equipment according to claim 12, which is characterized in that the network side equipment further include:
4th sending module, if the second encrypted authentication information for the network side equipment is changed to third encrypted authentication letter Breath then sends the third encrypted authentication information to the electronic equipment;
Wherein, the third encrypted authentication information is for being updated in the configuration information.
14. network side equipment according to claim 12, which is characterized in that the network side equipment further include:
4th receiving module, the negotiation information sent for receiving the electronic equipment, the negotiation information include and described the The corresponding encrypted authentication algorithm of two encrypted authentication information;
Memory module, for storing the negotiation information.
15. a kind of electronic equipment, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as Claims 1-4 is realized when the computer program is executed by the processor Any one of described in information authentication method the step of.
16. a kind of network side equipment, which is characterized in that including processor, memory and be stored on the memory and can be The computer program run on the processor realizes such as claim 5 when the computer program is executed by the processor The step of to information authentication method described in any one of 7.
17. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize information authentication method according to any one of claims 1 to 4 when being executed by processor The step of, alternatively, the step of realizing the information authentication method as described in any one of claim 5 to 7.
CN201910703660.9A 2019-07-31 2019-07-31 A kind of information authentication method, electronic equipment and network side equipment Pending CN110430573A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910703660.9A CN110430573A (en) 2019-07-31 2019-07-31 A kind of information authentication method, electronic equipment and network side equipment
PCT/CN2020/098848 WO2021017720A1 (en) 2019-07-31 2020-06-29 Information verification method, electronic device and network-side device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910703660.9A CN110430573A (en) 2019-07-31 2019-07-31 A kind of information authentication method, electronic equipment and network side equipment

Publications (1)

Publication Number Publication Date
CN110430573A true CN110430573A (en) 2019-11-08

Family

ID=68413507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910703660.9A Pending CN110430573A (en) 2019-07-31 2019-07-31 A kind of information authentication method, electronic equipment and network side equipment

Country Status (2)

Country Link
CN (1) CN110430573A (en)
WO (1) WO2021017720A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021017720A1 (en) * 2019-07-31 2021-02-04 维沃移动通信有限公司 Information verification method, electronic device and network-side device
CN112351425A (en) * 2020-10-15 2021-02-09 维沃移动通信有限公司 Access authentication method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056162A (en) * 2009-11-03 2011-05-11 华为技术有限公司 Method and device for carrying out access authentication and authentication system
CN103179016A (en) * 2011-12-21 2013-06-26 腾讯科技(深圳)有限公司 Method and system for updating multi-case terminal roaming configuration data and server
CN108307389A (en) * 2016-09-26 2018-07-20 中兴通讯股份有限公司 Data security protection method, network access equipment and terminal
CN108337695A (en) * 2017-01-20 2018-07-27 维沃移动通信有限公司 A kind of terminal capacity report method, base station and terminal
US20180309570A1 (en) * 2017-04-21 2018-10-25 Netgear, Inc. Secure communication in network access points
CN108882185A (en) * 2017-05-11 2018-11-23 展讯通信(上海)有限公司 Configuration method, device and the mobile terminal of supplementary service

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854625B (en) * 2009-04-03 2014-12-03 华为技术有限公司 Selective processing method and device of security algorithm, network entity and communication system
JP6340996B2 (en) * 2014-08-22 2018-06-13 富士通株式会社 ENCRYPTION METHOD, INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING DEVICE
CN106686589B (en) * 2015-11-09 2020-04-28 中国电信股份有限公司 Method, system and AAA server for realizing VoWiFi service
CN110430573A (en) * 2019-07-31 2019-11-08 维沃移动通信有限公司 A kind of information authentication method, electronic equipment and network side equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056162A (en) * 2009-11-03 2011-05-11 华为技术有限公司 Method and device for carrying out access authentication and authentication system
CN103179016A (en) * 2011-12-21 2013-06-26 腾讯科技(深圳)有限公司 Method and system for updating multi-case terminal roaming configuration data and server
CN108307389A (en) * 2016-09-26 2018-07-20 中兴通讯股份有限公司 Data security protection method, network access equipment and terminal
CN108337695A (en) * 2017-01-20 2018-07-27 维沃移动通信有限公司 A kind of terminal capacity report method, base station and terminal
US20180309570A1 (en) * 2017-04-21 2018-10-25 Netgear, Inc. Secure communication in network access points
CN108882185A (en) * 2017-05-11 2018-11-23 展讯通信(上海)有限公司 Configuration method, device and the mobile terminal of supplementary service

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021017720A1 (en) * 2019-07-31 2021-02-04 维沃移动通信有限公司 Information verification method, electronic device and network-side device
CN112351425A (en) * 2020-10-15 2021-02-09 维沃移动通信有限公司 Access authentication method and device and electronic equipment

Also Published As

Publication number Publication date
WO2021017720A1 (en) 2021-02-04

Similar Documents

Publication Publication Date Title
CN107770760B (en) A kind of method and mobile terminal of the type identifying bluetooth equipment
CN108924817A (en) A kind of SIM card state switching method and mobile terminal
CN108459797A (en) A kind of control method and mobile terminal of Folding screen
CN110034876A (en) PUCCH resource instruction, processing method, network side equipment, user terminal
CN108108007A (en) A kind of processing method and mobile terminal for reducing power consumption
CN107911445A (en) A kind of information push method, mobile terminal and storage medium
CN110149663A (en) Condition handover cancelling method and communication equipment
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN109710349A (en) A kind of screenshotss method and mobile terminal
CN109885257A (en) A kind of disk file reading/writing method and device
CN109743503A (en) Reminding method and terminal
CN109888928A (en) A kind of terminal and wireless charging control method
CN109831359A (en) A kind of detection method and its terminal device of data network connection state
CN109491230A (en) A kind of clocking method and electronic equipment
CN110430573A (en) A kind of information authentication method, electronic equipment and network side equipment
CN107979385B (en) A kind of radio-frequency front-end data processing method and mobile terminal
CN109745699A (en) A kind of method and terminal device responding touch control operation
CN110287655A (en) A kind of verifying code imput method, device and mobile terminal
CN110096203A (en) A kind of screenshot method and mobile terminal
CN109831582A (en) Non- response events processing method and terminal
CN109443261A (en) The acquisition methods and mobile terminal of Folding screen mobile terminal folding angles
CN107704334A (en) A kind of SDK processing method and mobile terminal
CN108540951A (en) A kind of recharge method and mobile terminal
CN110366182A (en) A kind of data transmission method and terminal device
CN110531908A (en) A kind of shortcut operation method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191108

RJ01 Rejection of invention patent application after publication