CN110731094B - User equipment authentication detection method and related product - Google Patents

User equipment authentication detection method and related product Download PDF

Info

Publication number
CN110731094B
CN110731094B CN201780091777.5A CN201780091777A CN110731094B CN 110731094 B CN110731094 B CN 110731094B CN 201780091777 A CN201780091777 A CN 201780091777A CN 110731094 B CN110731094 B CN 110731094B
Authority
CN
China
Prior art keywords
request
rrc
simulator
authentication
nth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780091777.5A
Other languages
Chinese (zh)
Other versions
CN110731094A (en
Inventor
史同井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huantai Technology Co Ltd
Original Assignee
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huantai Technology Co Ltd filed Critical Shenzhen Huantai Technology Co Ltd
Publication of CN110731094A publication Critical patent/CN110731094A/en
Application granted granted Critical
Publication of CN110731094B publication Critical patent/CN110731094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a user equipment authentication detection method and a related product, wherein the method comprises the following steps: receiving a random access preamble sent by User Equipment (UE) and sending a random access response to the UE; the emulator receives a first RRC request sent by the UE, and sends a first authentication request to the UE, wherein the first authentication request comprises: wrong authentication information; the simulator receives a second RRC request sent by the UE, and sends a second authentication request to the UE, wherein the second authentication request comprises: incorrect authentication information; detecting whether an Nth RRC request is received, wherein the Nth RRC request comprises: an nth cell identifier, if the simulator does not receive the nth RRC request, determines that the UE fails to detect, and sends a detection failure message to the UE, where the detection failure message includes: and (4) identifying the Nth cell. The method and the device have the advantage of improving the user experience.

Description

User equipment authentication detection method and related product
Technical Field
The embodiment of the invention relates to the technical field of terminals, in particular to a user equipment authentication detection method and a related product.
Background
With the continuous progress of communication technology, communication networks are more and more complex, operators in different countries and regions have different network deployment conditions, and used devices may have larger difference, so that the requirements on terminals are higher and higher, the terminals are required to have stronger fault-tolerant capability, and the terminals can be ensured to be normally used as far as possible under the worst condition, and the condition of no service is avoided as far as possible. The existing terminal does not detect the authentication of the terminal when leaving the factory, so that the use of a consumer is influenced if the authentication of the terminal fails, and the user experience is influenced.
Disclosure of Invention
The invention provides a user equipment authentication detection method and a related product, which are used for carrying out authentication detection on the existing terminal, so that the use of the outgoing terminal cannot be influenced due to authentication failure, and the user experience is improved.
In a first aspect, an embodiment of the present invention provides a method for detecting authentication of user equipment, where the method includes: the method comprises the steps that an emulator receives a random access preamble sent by User Equipment (UE) and sends a random access response to the UE; the simulator receives a first Radio Resource Control (RRC) request sent by the UE, wherein the first RRC request comprises: a first cell identity; sending a first authentication request to the UE, the first authentication request comprising: wrong authentication information; the emulator receives a second RRC request sent by the UE, wherein the second RRC request comprises: a second cell identifier, configured to send a second authentication request to the UE, where the second authentication request includes: wrong authentication information; the emulator detects whether an nth RRC request is received, the nth RRC request including: and determining that the UE fails to detect if the simulator does not receive the Nth RRC request.
In a second aspect, an authentication detection method is provided, which includes the following steps:
user Equipment (UE) sends a random access preamble to a simulator and receives a random access response sent by the simulator;
the UE sends a first Radio Resource Control (RRC) request to the emulator, the first RRC request comprising: a first cell identity; receiving a first authentication request sent by the emulator, the first authentication request comprising: error authentication information;
when the UE determines that the authentication information contained in the first authentication information is wrong, sending a second RRC request to the simulator, wherein the second RRC request comprises a second cell identifier; and receiving a second authentication request sent by the simulator, wherein the second authentication request contains wrong authentication information.
In a third aspect, a simulator is provided, the simulator comprising:
a communication unit, configured to receive a random access preamble sent by a user equipment UE, and send a random access response to the UE; receiving a first Radio Resource Control (RRC) request sent by the UE, wherein the first RRC request comprises: a first cell identity; sending a first authentication request to the UE, the first authentication request comprising: wrong authentication information; receiving a second RRC request sent by the UE, wherein the second RRC request comprises: a second cell identifier, configured to send a second authentication request to the UE, where the second authentication request includes: wrong authentication information;
a processing unit, configured to detect whether an nth RRC request is received, where the nth RRC request includes: an nth cell identifier, if an nth RRC request is not received, determines that the UE fails to detect, and sends a detection failure message to the UE, where the detection failure message includes: and (4) identifying the Nth cell.
In a fourth aspect, a user equipment is provided, the user equipment comprising:
the communication unit is used for sending a random access preamble to the simulator and receiving a random access response sent by the simulator; sending a first radio resource control, RRC, request to the emulator, the first RRC request including: a first cell identity; receiving a first authentication request sent by the emulator, the first authentication request comprising: error authentication information;
the processing unit is configured to determine whether the authentication information included in the first authentication information is in error, and control the communication unit to send a second RRC request to the emulator when the authentication information is in error, where the second RRC request includes a second cell identifier;
the communication unit is further configured to receive a second authentication request sent by the simulator, where the second authentication request includes wrong authentication information.
In a fifth aspect, there is provided an emulator, the device comprising one or more processors, memory, a transceiver, a camera module, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps of the method of the first aspect.
In a sixth aspect, a smart device is provided, the device comprising one or more processors, memory, a transceiver, a camera module, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps in the method provided by the second aspect.
In a seventh aspect, a computer-readable storage medium is provided, which stores a computer program for electronic data exchange, wherein the computer program causes a computer to execute the method provided in the first or second aspect.
In an eighth aspect, there is provided a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform the method provided by the first or second aspect.
The embodiment of the invention has the following beneficial effects:
it can be seen that the embodiment of the present invention implements detection of UE in an abnormal network environment, that is, simulates a plurality of cells, at least 1 LTE cell, at least 1 CDMA cell, and at least 1 GSM cell, implements access of UE between cells of different systems and the same system, and determines whether UE re-initiates an RRC connection request when authentication is wrong, thereby avoiding that UE cannot access other base stations due to authentication error of one base station, avoiding that factory UE cannot provide service for a user, improving reliability of UE, and having advantages of high reliability and good user experience.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a diagram illustrating the results of a user equipment.
Fig. 1A is a schematic diagram of a network architecture.
Fig. 2 is a schematic diagram of a terminal access procedure.
Fig. 3 is a flowchart illustrating a method for detecting authentication of user equipment according to an embodiment of the present invention.
Fig. 4A is a schematic structural diagram of an emulator according to an embodiment of the present invention.
Fig. 4B is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
Fig. 5A is a schematic diagram of a hardware structure of an emulator according to an embodiment of the present invention.
Fig. 5B is a schematic diagram of a hardware structure of an intelligent device according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of the invention and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic diagram of a User equipment result, as shown in fig. 1, the User equipment may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a laptop computer, a Mobile Internet device (MID, mobile Internet Devices), a wearable device, and the like, and the User equipment includes, but is not limited to, the User equipment, and for convenience of description, the User equipment is referred to as User Equipment (UE) or a terminal in the following embodiments. Of course, in practical applications, the user equipment is not limited to the above presentation form, and may also include: intelligent vehicle-mounted terminal, computer equipment, intelligent wrist-watch etc.. As shown in fig. 1, the terminal includes: the communication module 103 may be a Long Term Evolution (LTE) communication module, a CDMA (Code Division Multiple Access) communication module, or a 2G communication module in practical applications, and in practical applications, the LTE communication module and the 2G communication module may also be integrated together.
Referring to fig. 1A, fig. 1A may be a schematic diagram of a network architecture, as shown in fig. 1A, and as shown in fig. 1A, there are 1 MSC on the core network side. As shown in fig. 1A, the Network architecture diagram includes 1 LTE base station, that is, an eNB (Evolved Node B Access base station), 1 CDMA base station, that is, a Node B, and 1 2G base station, that is, a GSM Radio Access Network (GSM EDGE Radio Access Network, GERAN), and for a UE, the UE may Access the Network through any one of the eNB, the Node B, and the GERAN, and the Access Network may be a data service or a voice service or a data service.
As shown in fig. 2, a schematic flow of terminal access is shown, and as shown in fig. 2, the flow of terminal access includes the following steps:
step S200, UE sends random access preamble to eNB;
step S201, eNB sends a Random Access Response (English) to UE;
step S202, the UE transmits an RRC connection request (RRC connection request, radio resource control connection request) to the eNB.
Step S203, the eNB sends an authentication request (authentication request) to the UE.
Step S204, the UE sends an authentication response (authentication response) to the eNB.
Step S205, the eNB sends an RRC connection setup (radio resource control connection setup) to the UE.
Step S206, the UE sends an RRC connection setup complete (RRC connection setup complete) to the eNB.
Referring to fig. 2, after the UE randomly accesses to the eNB and successfully authenticates the UE, the RRC connection is established, so that the data service can be provided to the UE through the established RRC connection.
Optionally, in the method provided in the first aspect, the method may further include:
the simulator receives a detection failure response returned by the UE, wherein the detection failure response comprises: a log of the UE, the log comprising: and all operation records of the UE between the first time of sending the random access preamble and the receiving of the detection failure message.
Optionally, in the method provided in the first aspect, the method may further include:
and the simulator extracts the content of the log and performs data analysis on the content to obtain a preliminary failure result.
Optionally, in the method provided in the first aspect, the method may further include:
the data analysis of the content to obtain a preliminary failure result comprises:
and the simulator extracts the first number of the RRC connection requests in the log, acquires the second number of the base stations simulated by the simulator, and determines that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
Optionally, in the method provided in the second aspect, the method may further include:
when the UE determines that the second authentication request contains wrong authentication information, the UE sends an Nth RRC connection request to the simulator, wherein the Nth RRC connection request comprises: and (4) identifying the Nth cell.
Optionally, in the method provided in the second aspect, the method may further include:
the UE creates a log recording all operations of the UE between the time the UE sends a random access request and the time the UE receives a verification failure message.
Optionally, in the method provided in the second aspect, the method may further include:
the UE receives a detection failure message sent by the simulator and sends a detection failure response to the simulator, wherein the detection failure response comprises: a log of the UE.
Optionally, in the method provided in the second aspect, the detecting the failure message includes: the nth cell identifier may further include: and the UE analyzes the detection failure message to determine the identity of the Mth cell, extracts all operation records related to the identity of the Mth cell from the log, and sends all operation records related to the identity of the Mth cell to the simulator.
In the emulator provided in the third aspect, the emulator may further include:
the communication unit is further configured to receive a detection failure response returned by the UE, where the detection failure response includes: a log of the UE, the log comprising: and all operation records of the UE between the first time of sending the random access preamble and the receiving of the detection failure message.
In the emulator provided in the third aspect, the emulator may further include: the processing unit is further configured to extract the content of the log, and perform data analysis on the content to obtain a preliminary failure result.
In the emulator provided in the third aspect, the emulator may further include: the processing unit is specifically configured to extract a first number of RRC connection requests in the log, obtain a second number of base stations simulated by the simulator, and determine that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
In the user equipment provided in the fourth aspect, the method may further include:
the processing unit is further configured to control the communication unit to send an nth RRC connection request to the emulator when it is determined that the second authentication request includes incorrect authentication information, where the nth RRC connection request includes: and (4) identifying the Nth cell.
In the emulator provided in the fourth aspect, the method may further include: the processing unit is further configured to create a log, where the log records all operations of the UE between the time when the UE sends the random access request and the time when the check failure message is received.
In the emulator provided in the fourth aspect, the method may further include: the communication unit is further configured to receive a detection failure message sent by the simulator, and send a detection failure response to the simulator, where the detection failure response includes: a log of the UE.
Referring to fig. 3, fig. 3 provides a method for detecting authentication of user equipment, where an emulator is located in a network framework shown in fig. 1A, the emulator is connected to both devices in the network framework, and the connection mode may be a wired connection mode, or may be a wireless connection mode, and the specific embodiment of the present invention does not limit the connection mode between the emulator and the devices in the network framework, and the network framework includes: at least 1 LTE cell, at least 1 CDMA cell, and at least 1 GSM cell. The method is shown in fig. 3, and comprises the following steps:
step S300, UE sends random access preamble to simulator;
step S301, the simulator sends a Random Access Response (English) to the UE;
step S302, the UE sends a first RRC request to the emulator, where the first RRC request may include: a first cell identity (which may be an LTE cell identity).
Step S303, the emulator receives the first RRC request sent by the UE, and sends a first authentication request (authentication request) to the UE, where the first authentication request includes: wrong authentication information.
Step S304, when the UE determines that the authentication information included in the first authentication information is incorrect, sending a second RRC request to the emulator, where the second RRC request includes: a second cell identity (which may be a CDMA cell identity);
step S305, the emulator receives the second RRC request, and sends a second authentication request to the UE, where the second authentication request includes: the wrong authentication information (which may be the same as the first authentication request or different from the wrong authentication information contained in the first authentication request).
Step S306, the emulator detects whether an nth RRC request is received, where the nth RRC request includes: an nth cell identifier (which may be a GSM cell identifier), if the emulator does not receive the nth RRC request, determining that the UE fails to detect, and sending a detection failure message to the UE, where the detection failure message includes: and (4) identifying the Nth cell.
The technical scheme provided by the invention realizes the detection of the UE under the abnormal network environment, namely simulates a plurality of cells, at least 1 LTE cell, at least 1 CDMA cell and at least 1 GSM cell, realizes the access of the UE between the cells with different systems and the same system, determines whether the UE can reinitiate the RRC connection request when the authentication is wrong, avoids the condition that the UE cannot access other base stations due to the authentication error of one base station, avoids the condition that the factory UE cannot provide service for the user, improves the reliability of the UE, and has the advantages of high reliability and good user experience.
The steps of the method provided by the embodiment shown in fig. 3 have different technical solutions in different combinations, for example, the combination of the above steps S300 and S302 may be a user equipment authentication detection method on the user equipment side, and the combination of the above steps S301, S303, S304, S305 and S306 may be a user equipment authentication detection method on the emulator side.
Optionally, the method may further include:
the detection failure message includes: identity of the nth cell.
After receiving the detection failure message, the UE may send a detection failure response to the emulator, where the detection failure response may include a log of the UE.
The specific identifier of the nth cell may be a self-defined identifier, and certainly, a general identifier may also be used in practical application, and the specific embodiment of the present invention does not limit the specific representation form of the identifier of the nth cell, and here, the reason of the failure is returned to the UE, so that the UE can adjust the content of the log record, and a debugging person can conveniently and accurately obtain the reason of the failure of the UE to access the nth cell.
The identifier of the nth cell may also be a name or a location of the nth cell.
The message of the detection failure may be represented in various ways, for example, in an optional technical solution of the present invention, the message of the detection failure may be a NACK message, and in practical application, the message of the detection failure may also be a NACK message carrying a continuous number, for example, 10 continuous 1 s or 11 continuous zeros, and the like. Of course, in practical applications, the detection failure message may also be a newly set message.
Optionally, the method further includes:
when the UE sends the random access preamble, a log is recorded, wherein the log comprises all operation records of the UE between the first time of sending the random access preamble and the time of receiving the detection failure message.
Optionally, the method further includes:
if the UE receives the detection failure message, the UE analyzes the detection failure message to determine the identity of the Wth cell, extracts all operation records related to the identity of the Wth cell from the log, and sends all operation records related to the identity of the Wth cell to the simulator.
Optionally, the record of the operation includes but is not limited to: receiving and sending messages, frequency point scanning times, wrong authentication information contained in the authentication request, frequency point scanning results or execution commands or any combination thereof.
Optionally, the method may further include:
and the simulator extracts the content of the log and performs data analysis on the content of the log to obtain a primary failure result.
The analyzing the data of the log content to obtain the preliminary failure result may specifically include:
and the simulator extracts the first number of the RRC connection requests in the log, acquires the second number of the base stations simulated by the simulator, and determines that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
The reason for the preliminary failure result may be that, for the UE, the number of the RRC requests sent by the UE is generally not greater than the second number of the base stations simulated by the simulator, and if the UE is normal, the first number of the UE is not greater than the second number, and the first number and the second number are necessarily equal to each other, so if the first number is not equal to the second number, an error must occur in an RRC message of the UE, and it is determined that the preliminary failure result of the UE at this time is an RRC message error.
The simulator extracts a first group of cell identifiers of the RRC connection request, compares the first group of cell identifiers with a second group of cell identifiers of the base station simulated by the simulator to determine a unique identifier, which may be assigned to the second group of cell identifiers but not to the first group of cell identifiers, identifies the unique identifier to determine the type of the cell to which the unique identifier belongs, if the type of the cell is an LTE cell, determines that the preliminary failure result is an RRC message error of the LTE cell, if the type of the cell is a CDMA cell, determines that the preliminary failure result is an RRC message error of the CDMA cell, if the type of the cell is a GSM cell, determines that the preliminary failure result is an RRC message error of the GSM cell.
The number of the second group of cell identifiers may be multiple, and the number of the first group of cell identifiers may be at least one. Of course, the specific value of the number is not limited in the embodiment of the present application, and only the number of the second group of cell identifiers is not greater than the number of the first group of cell identifiers.
The analyzing the data of the log to obtain the preliminary failure result may specifically include:
the simulator extracts all the messages in the log, inquires whether all the messages have authentication responses (e.g., if the log has a sound response), extracts the Mth cell identifier contained in the sound response, and determines that the preliminary failure result is an error configuration of the wrong authentication information or an error authentication of the base station, if the Mth cell identifier is in the second group of cell identifiers (i.e., the cell identifiers simulated by the simulator).
The principle of the technical scheme is that for the UE, because the authentication request issued by the simulator carries wrong authentication information, the UE cannot be authenticated successfully, namely, an authentication response message cannot be generated, if the authentication response is generated and belongs to a cell identifier simulated by the simulator, only 2 conditions can be provided for the analysis error, the first condition is that the wrong authentication information is configured into correct authentication information, and the second condition is that the base station authentication of the UE side is wrong and the wrong authentication information is authenticated, so that a preliminary failure result can be determined through the analysis, and a corresponding basis is provided for the modification of research personnel.
Referring to fig. 4A, fig. 4A provides a simulator, as shown in fig. 4A, including:
a communication unit 401, configured to receive a random access preamble sent by a user equipment UE, and send a random access response to the UE; receiving a first Radio Resource Control (RRC) request sent by the UE, wherein the first RRC request comprises: a first cell identity; sending a first authentication request to the UE, the first authentication request comprising: wrong authentication information; receiving a second RRC request sent by the UE, wherein the second RRC request comprises: a second cell identifier, configured to send a second authentication request to the UE, where the second authentication request includes: wrong authentication information;
a processing unit 402, configured to detect whether an nth RRC request is received, where the nth RRC request includes: an nth cell identifier, if an nth RRC request is not received, determines that the UE fails to detect, and sends a detection failure message to the UE, where the detection failure message includes: and (4) identifying the Nth cell.
Optionally, the communication unit 401 is further configured to receive a detection failure response returned by the UE, where the detection failure response includes: a log of the UE, the log comprising: and all operation records of the UE between the first time of sending the random access preamble and the receiving of the detection failure message.
Optionally, the processing unit is further configured to extract content of the log, and perform data analysis on the content to obtain a preliminary failure result error.
Optionally, the processing unit is further configured to extract a first number of RRC connection requests in the log, obtain a second number of base stations simulated by the emulator, and determine that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
The processing unit 402 is further specifically configured to extract, by the emulator, a first number of RRC connection requests in the log, obtain a second number of base stations simulated by the emulator, and determine that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
The processing unit 402 is further configured to extract a first group of cell identifiers of the RRC connection request, compare the first group of cell identifiers with a second group of cell identifiers of the base station simulated by the simulator to determine a unique identifier, where the unique identifier may be assigned to the second group of cell identifiers but not to the first group of cell identifiers, identify the unique identifier to determine a type of a cell to which the unique identifier belongs, and if the type of the cell is an LTE cell, determine that a preliminary failure result is an RRC message error of the LTE cell, if the type of the cell is a CDMA cell, determine that a preliminary failure result is an RRC message error of the CDMA cell, and if the type of the cell is a GSM cell, determine that a preliminary failure result is an RRC message error of the GSM cell.
The processing unit 402 is further configured to, specifically, the simulator extracts all messages in the log, query whether all messages have an authentication response (authentication response), if so, extract an mth cell identifier included in the authentication response, if so, extract the mth cell identifier included in the authentication response, and determine that the preliminary failure result is an erroneous authentication information configuration error or a base station authentication error.
Referring to fig. 4B, as shown in fig. 4B, there is provided a user equipment, including:
a communication unit 406, configured to send a random access preamble to an emulator, and receive a random access response sent by the emulator; sending a first radio resource control, RRC, request to the emulator, the first RRC request including: a first cell identity; receiving a first authentication request sent by the emulator, the first authentication request comprising: wrong authentication information;
a processing unit 407, configured to determine whether the authentication information included in the first authentication information is in error, and when the authentication information is in error, control the communication unit to send a second RRC request to the emulator, where the second RRC request includes a second cell identifier;
the communication unit 406 is further configured to receive a second authentication request sent by the emulator, where the second authentication request includes wrong authentication information.
Referring to fig. 5A, fig. 5A provides an emulator, the device comprising one or more processors 501, memory 502, a transceiver 503, a detection module 504, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the emulator side steps of the user equipment authentication detection method.
Referring to fig. 5B, fig. 5B provides a smart device comprising one or more processors 506, memory 507, a transceiver 508, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps in the method on the UE side of the user equipment authentication detection method.
Fig. 6 is a block diagram illustrating a portion of the results of a handset associated with a user device provided by an embodiment of the present invention. Referring to fig. 6, the handset includes: radio Frequency (RF) circuit 910, memory 920, input unit 930, sensor 950, audio circuit 960, wireless Fidelity (WiFi) module 970, application processor AP980, communication module 991, and power supply 990. Those skilled in the art will appreciate that the handset shown in fig. 6 does not constitute a limitation of the handset and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components.
The following specifically describes each constituent component of the mobile phone with reference to fig. 6:
the communication module 991 may be specifically an LTE communication module.
The input unit 930 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 930 may include a touch display 933, a fingerprint recognition device 931, and other input devices 932. The fingerprint recognition device 931 is coupled to the touch display screen 933. The input unit 930 may also include other input devices 932. In particular, other input devices 932 may include, but are not limited to, one or more of physical keys, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like. The touch display screen 933 is configured to, when it is detected that a user performs a sliding operation on the touch display screen 933, acquire a touch parameter set, notify the fingerprint identification device 931 to perform fingerprint acquisition, and send the touch parameter set to the AP980; the fingerprint identification device 931 is configured to collect a fingerprint image and send the fingerprint image to the AP980; the AP980 is configured to verify the touch parameter set and the fingerprint image, respectively.
The AP980 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 920 and calling data stored in the memory 920, thereby integrally monitoring the mobile phone. Optionally, AP980 may include one or more processing units; alternatively, the AP980 may integrate an application processor that handles primarily the operating system, user interface, and applications, etc., and a modem processor that handles primarily wireless communications. It will be appreciated that the modem processor described above may not be integrated into the AP 980.
Further, the memory 920 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
RF circuitry 910 may be used for the reception and transmission of information. In general, the RF circuit 910 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 910 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), general Packet Radio Service (GPRS), code Division Multiple Access (CDMA), wideband Code Division Multiple Access (WCDMA), long Term Evolution (LTE), email, short Messaging Service (SMS), and the like.
The handset may also include at least one sensor 950, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the touch display screen according to the brightness of ambient light, and the proximity sensor may turn off the touch display screen and/or the backlight when the mobile phone moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing gestures of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometers and taps), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 960, speaker 961, microphone 962 may provide an audio interface between a user and a cell phone. The audio circuit 960 may transmit the electrical signal converted from the received audio data to the speaker 961, and the audio signal is converted by the speaker 961 to be played; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal, and the electrical signal is received by the audio circuit 960 and converted into audio data, and the audio data is processed by the audio playing AP980, and then sent to another mobile phone via the RF circuit 910, or played to the memory 920 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 970, and provides wireless broadband Internet access for the user. Although fig. 6 shows the WiFi module 970, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The handset also includes a power supply 990 (e.g., a battery) for supplying power to various components, and optionally, the power supply may be logically connected to the AP980 via a power management system, so that functions of managing charging, discharging, and power consumption are implemented via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, a light supplement device, a light sensor, and the like, which are not described herein again.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the user equipment authentication detection methods described in the above method embodiments.
Embodiments of the present invention also provide a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute some or all of the steps of any one of the user equipment authentication detection methods described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that the acts and modules illustrated are not necessarily required to practice the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, read-Only memories (ROMs), random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (12)

1. A method for detecting authentication of user equipment, comprising:
the method comprises the steps that a simulator receives a random access preamble sent by User Equipment (UE) and sends a random access response to the UE;
the simulator receives a first Radio Resource Control (RRC) request sent by the UE, wherein the first RRC request comprises: a first cell identity; sending a first authentication request to the UE, the first authentication request comprising: wrong authentication information;
the emulator receives a second RRC request sent by the UE, wherein the second RRC request comprises: a second cell identifier, configured to send a second authentication request to the UE, where the second authentication request includes: wrong authentication information;
the emulator detects whether an nth RRC request is received, the nth RRC request including: an nth cell identifier, if the simulator does not receive an nth RRC request, determines that the UE fails to detect, and sends a detection failure message to the UE, where the detection failure message includes: an Nth cell identity;
the simulator receives a detection failure response returned by the UE, wherein the detection failure response comprises: a log of the UE, the log comprising: all operation records of the UE between the first time of sending the random access preamble and the time of receiving the detection failure message;
and the simulator extracts the content of the log and performs data analysis on the content to obtain a preliminary failure result.
2. The method of claim 1, wherein the analyzing the content data for preliminary failure results comprises:
and the simulator extracts the first number of the RRC connection requests in the log, acquires the second number of the base stations simulated by the simulator, and determines that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
3. An authentication detection method, characterized in that the method comprises the steps of:
user Equipment (UE) sends a random access preamble to an emulator and receives a random access response sent by the emulator;
the UE sends a first Radio Resource Control (RRC) request to the simulator, wherein the first RRC request comprises: a first cell identity; receiving a first authentication request sent by the emulator, the first authentication request comprising: wrong authentication information;
when the UE determines that the authentication information contained in the first authentication request is wrong, sending a second RRC request to the simulator, wherein the second RRC request comprises a second cell identifier; receiving a second authentication request sent by the simulator, wherein the second authentication request contains wrong authentication information;
the UE creates a log which records all operations of the UE between the time when the UE sends a random access request and the time when a check failure message is received;
the UE receives a detection failure message sent by the simulator and sends a detection failure response to the simulator, wherein the detection failure response comprises: a log of the UE.
4. The method of claim 3, further comprising:
when the UE determines that the second authentication request contains wrong authentication information, the UE sends an Nth RRC connection request to the simulator, wherein the Nth RRC connection request comprises: and (4) identifying the Nth cell.
5. The method of claim 4, wherein the detecting the failure message comprises: an nth cell identity, the method further comprising: and the UE analyzes the detection failure message to determine the identity of the Wth cell, extracts all operation records related to the identity of the Wth cell from the log, and sends all operation records related to the identity of the Wth cell to the simulator.
6. A simulator, comprising:
a communication unit, configured to receive a random access preamble sent by a user equipment UE, and send a random access response to the UE; receiving a first Radio Resource Control (RRC) request sent by the UE, wherein the first RRC request comprises: a first cell identity; sending a first authentication request to the UE, the first authentication request comprising: wrong authentication information; receiving a second RRC request sent by the UE, wherein the second RRC request comprises: a second cell identifier, configured to send a second authentication request to the UE, where the second authentication request includes: wrong authentication information;
a processing unit, configured to detect whether an nth RRC request is received, where the nth RRC request includes: an nth cell identifier, if an nth RRC request is not received, determines that the UE fails to detect, and sends a detection failure message to the UE, where the detection failure message includes: an Nth cell identity;
the communication unit is further configured to receive a detection failure response returned by the UE, where the detection failure response includes: a log of the UE, the log comprising: all operation records of the UE between the first time of sending the random access preamble and the time of receiving the detection failure message;
the processing unit is further configured to extract the content of the log, and perform data analysis on the content to obtain a preliminary failure result.
7. The emulator of claim 6, wherein the processing unit is specifically configured to extract a first number of RRC connection requests in the log, obtain a second number of base stations emulated by the emulator, and determine that the preliminary failure result is an RRC message error if the first number is not equal to the second number.
8. A user equipment, the user equipment comprising:
the communication unit is used for sending a random access preamble to the simulator and receiving a random access response sent by the simulator; sending a first radio resource control, RRC, request to the emulator, the first RRC request including: a first cell identity; receiving a first authentication request sent by the emulator, the first authentication request comprising: wrong authentication information;
the processing unit is used for determining whether the authentication information contained in the first authentication request is wrong or not, and controlling the communication unit to send a second RRC request to the simulator when the authentication information is wrong, wherein the second RRC request comprises a second cell identifier;
the communication unit is further configured to receive a second authentication request sent by the simulator, where the second authentication request includes wrong authentication information;
the processing unit is further configured to create a log, where the log records all operations of the user equipment between when the user equipment sends a random access request and when a verification failure message is received;
the communication unit is further configured to receive a detection failure message sent by the simulator, and send a detection failure response to the simulator, where the detection failure response includes: a log of the user equipment.
9. The user equipment of claim 8,
the processing unit is further configured to control the communication unit to send an nth RRC connection request to the emulator when it is determined that the second authentication request includes incorrect authentication information, where the nth RRC connection request includes: and (4) identifying the Nth cell.
10. Simulator comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to claim 1 or 2 when executing the computer program.
11. User equipment comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 3-5 when executing the computer program.
12. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method of claim 1 or 2 or the method of any one of claims 3-5.
CN201780091777.5A 2017-10-26 2017-10-26 User equipment authentication detection method and related product Active CN110731094B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/107877 WO2019080062A1 (en) 2017-10-26 2017-10-26 User equipment authentication detection method and related product

Publications (2)

Publication Number Publication Date
CN110731094A CN110731094A (en) 2020-01-24
CN110731094B true CN110731094B (en) 2023-02-24

Family

ID=66247687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780091777.5A Active CN110731094B (en) 2017-10-26 2017-10-26 User equipment authentication detection method and related product

Country Status (2)

Country Link
CN (1) CN110731094B (en)
WO (1) WO2019080062A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459927A (en) * 2008-12-19 2009-06-17 中国移动通信集团浙江有限公司 Method for service test by analogue mobile phone terminal
CN102421127A (en) * 2010-09-28 2012-04-18 飞思达技术(北京)有限公司 Method for testing core network data traffic performance through signaling simulation
CN103078740A (en) * 2012-12-28 2013-05-01 广州中大微电子有限公司 RFID (Radio Frequency Identification Devices) smart card digital baseband verification system
CN105813072A (en) * 2014-12-29 2016-07-27 中国移动通信集团公司 Terminal authentication method, system and cloud server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8885552B2 (en) * 2009-12-11 2014-11-11 At&T Intellectual Property I, L.P. Remote control via local area network
CN102468985B (en) * 2010-11-01 2016-03-23 北京神州绿盟信息安全科技股份有限公司 The method and system of penetration testing is carried out for Network Security Device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459927A (en) * 2008-12-19 2009-06-17 中国移动通信集团浙江有限公司 Method for service test by analogue mobile phone terminal
CN102421127A (en) * 2010-09-28 2012-04-18 飞思达技术(北京)有限公司 Method for testing core network data traffic performance through signaling simulation
CN103078740A (en) * 2012-12-28 2013-05-01 广州中大微电子有限公司 RFID (Radio Frequency Identification Devices) smart card digital baseband verification system
CN105813072A (en) * 2014-12-29 2016-07-27 中国移动通信集团公司 Terminal authentication method, system and cloud server

Also Published As

Publication number Publication date
WO2019080062A1 (en) 2019-05-02
CN110731094A (en) 2020-01-24

Similar Documents

Publication Publication Date Title
CN107273263B (en) Abnormal operation analysis method, application terminal and monitoring server
CN106912048B (en) Access point information sharing method and device
CN105100213B (en) Apparatus bound method and device
CN107493378B (en) Method and device for logging in application program, computer equipment and readable storage medium
CN104852885B (en) Method, device and system for verifying verification code
CN107480489B (en) unlocking control method and related product
CN107506646B (en) Malicious application detection method and device and computer readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN109257793B (en) Network connection method, device, equipment and storage medium
CN107346392B (en) Terminal system change identification method and device and readable storage medium
CN107743108B (en) Method and device for identifying medium access control address
CN106413032B (en) Hotspot establishing method and terminal equipment
CN111475359B (en) System testing method, device and storage medium under multi-message interaction scene
CN107635289B (en) Method for detecting terminal call and related product
CN104038900A (en) Locating method and equipment
CN110855807A (en) Method and equipment for adding contact person
CN107529171B (en) Method for detecting terminal access pseudo base station and related product
CN110731094B (en) User equipment authentication detection method and related product
CN107864487B (en) Method for detecting terminal call and related product
CN107038414B (en) Fingerprint template synchronization method and device
CN106535229B (en) WiFi signal receiving sensitivity testing method and mobile terminal
CN108400994A (en) User authen method, mobile terminal, server and computer readable storage medium
CN107454599B (en) Method for detecting terminal access pseudo base station and related product
CN107820287B (en) Detect the method and Related product of terminal access
CN110800334B (en) User equipment call detection method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant