CN111010694A - Mobile communication method and electronic equipment - Google Patents

Mobile communication method and electronic equipment Download PDF

Info

Publication number
CN111010694A
CN111010694A CN201911318515.5A CN201911318515A CN111010694A CN 111010694 A CN111010694 A CN 111010694A CN 201911318515 A CN201911318515 A CN 201911318515A CN 111010694 A CN111010694 A CN 111010694A
Authority
CN
China
Prior art keywords
communication
mobile terminal
communication manager
user
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911318515.5A
Other languages
Chinese (zh)
Inventor
林锋
谭立彦
张永兴
田兴华
董芸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Capitek Co ltd
Original Assignee
Beijing Capitek Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Capitek Co ltd filed Critical Beijing Capitek Co ltd
Priority to CN201911318515.5A priority Critical patent/CN111010694A/en
Publication of CN111010694A publication Critical patent/CN111010694A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a mobile communication method and electronic equipment, which solve the technical problem that in the prior art, when a mobile communication operator positions a mobile terminal accessed to a mobile communication network, the position information of a user is leaked. The method comprises the following steps: the fixed equipment is accessed into the mobile communication network through a USIM card, wherein the USIM card is arranged on the fixed equipment; the fixed device sends a first link establishment request to the communication manager so as to establish a first link with the communication manager, wherein the communication manager establishes a second link with the mobile terminal by receiving a second link establishment request sent by the mobile terminal. Through the mobile communication method and the electronic equipment, a mobile communication operator can only master the position of the fixed equipment through the base station and cannot master the real position of the user, so that the position information of the user is prevented from being leaked, and the privacy of the user is protected.

Description

Mobile communication method and electronic equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a mobile communication method and an electronic device.
Background
With the development of mobile communication technology, mobile communication networks are about to enter the 5G era, and the coverage area of base stations is smaller and smaller, and the distribution is denser and denser. Meanwhile, based on the development of advanced positioning technologies such as toa (time of arrival), aoa (angle of arrival), etc., the positioning accuracy of the base station can reach several tens of meters or even several meters at present, and the positioning accuracy of the 5G base station can reach about 1 meter.
In the prior art, an operator can position a mobile terminal accessing a mobile communication network according to the position of a base station and the signal coverage, and grasp the position of a user. Therefore, if the conventional mobile terminal is used for communication by the conventional mobile communication method, leakage of the location information of the user is easily caused, so that potential safety hazards and privacy leakage risks are brought to the user.
Disclosure of Invention
In order to solve the above problems in the prior art, embodiments of the present application provide a mobile communication method and an electronic device.
According to a first aspect of embodiments of the present application, there is provided a mobile communication method, including: the method comprises the following steps that a fixed device is connected into a mobile communication network through a USIM card, wherein the USIM card is installed on the fixed device; the fixed equipment sends a first link establishment request to a communication manager so as to establish a first link with the communication manager, wherein the communication manager establishes a second link with a mobile terminal by receiving a second link establishment request sent by the mobile terminal.
In some embodiments of the present application, the sending, by the fixed device, the first link establishment request to the communication manager includes: the fixed equipment sends the first link establishment request to the pipe connector through the Internet; after the fixed device sends the first link establishment request to the communication manager through the internet, the method of the first aspect further comprises: and after the communication manager verifies the first link establishment request and successfully verifies the first link establishment request, the fixed equipment establishes the first link with the communication manager, wherein the communication manager records the identity information of the fixed equipment in advance.
In some embodiments of the present application, the method of the first aspect further comprises: the fixed equipment receives a first signal sent by a base station and converts the first signal into a first IP data packet; and the fixed equipment sends the first IP data packet to the communication manager so that the communication manager forwards the first IP data packet to the mobile terminal.
In some embodiments of the present application, the method of the first aspect further comprises: the fixed equipment receives a second IP data packet forwarded by the communication manager, wherein the second IP data packet is sent to the communication manager by the mobile terminal; and the fixed equipment converts the second IP data packet into a second signal and sends the second signal to the base station.
In some embodiments of the present application, the first link establishment request and the second link establishment request are VPN encrypted tunnel establishment requests; the first link and the second link are VPN encryption tunnels.
According to a second aspect of embodiments of the present application, there is provided a mobile communication method, including: the mobile terminal establishes connection with the Internet; the mobile terminal sends a second link establishment request to a communication manager through the internet so as to establish a second link with the communication manager, wherein the communication manager establishes a first link with a fixed device by receiving a first link establishment request sent by the fixed device.
In some embodiments of the present application, after the mobile terminal sends the second link establishment request to the communication manager through the internet, the method of the second aspect further includes: and after the communication manager verifies the second link establishment request and successfully verifies the second link establishment request, the mobile terminal establishes the second link with the communication manager, wherein the communication manager records the identity information of the mobile terminal in advance.
In some embodiments of the present application, the method of the second aspect further comprises: the mobile terminal receives second user communication data input by a user and encapsulates the second user communication data into a second IP data packet; and the mobile terminal sends the second IP data packet to the communication manager so that the communication manager can forward the second IP data packet to the fixed equipment.
In some embodiments of the present application, the method of the second aspect further comprises: the mobile terminal receives a first IP data packet forwarded by the communication manager, wherein the first IP data packet is sent to the communication manager by the fixed equipment; and the mobile terminal acquires first user communication data from the first IP data packet and provides the first user communication data for the user.
According to a third aspect of embodiments of the present application, there is provided an electronic apparatus, including: a processor; a memory, wherein the memory is to store instructions executable by the processor; when the processor executes the instructions, the mobile communication method provided by the first aspect and the second aspect is realized.
The mobile communication method and the electronic device provided by the embodiment of the application at least have the following effects:
when a user accesses a mobile communication network, a mobile communication operator can only master the position of the fixed equipment through the base station and cannot master the real position of the user, so that the position information of the user is prevented from being leaked, and the privacy of the user is protected.
It should be understood that the above description of technical effects is exemplary and explanatory only and is not restrictive of the application.
Brief description of the drawings
In order to make the objects, technical solutions and advantages of the embodiments of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings. It is to be understood that the drawings form a part of the specification, illustrate the present application together with embodiments thereof, and are not to be construed as limiting the present application. Unless otherwise indicated, like reference numbers and designations in the drawings generally refer to like steps or components.
Fig. 1 is a schematic diagram of an exemplary system provided by an embodiment of the present application.
Fig. 2 is a flowchart illustrating a mobile communication method according to an exemplary embodiment of the present application.
Fig. 3 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application.
Fig. 4 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application.
Fig. 5 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application.
Fig. 6 is a flowchart illustrating a mobile communication method according to an exemplary embodiment of the present application.
Fig. 7 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application.
Fig. 8 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application.
Fig. 9 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application.
Fig. 10a is a flowchart illustrating a method of operating an exemplary system according to an embodiment of the present application.
Fig. 10b is a flowchart illustrating a method of operating another exemplary system according to an embodiment of the present application.
Fig. 11 is a schematic structural diagram of a mobile communication device according to an exemplary embodiment of the present application.
Fig. 12 is a schematic structural diagram of a mobile communication device according to another exemplary embodiment of the present application.
Fig. 13 is a schematic structural diagram of a mobile communication device according to another exemplary embodiment of the present application.
Fig. 14 is a schematic structural diagram of an exemplary electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. The embodiments described below are only a part of the embodiments of the present application, and not all of the embodiments of the present application. It should be understood that the following examples are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Summary of the application
In the prior art, when a user uses a conventional mobile terminal to perform activities such as call, sending and receiving short messages, accessing internet, etc., the conventional mobile terminal needs to access a mobile communication network of a home or roaming place through a Universal Subscriber Identity Module (USIM) card.
In the process of accessing a mobile communication network, a conventional mobile terminal needs to be in communication connection with a base station, so that a mobile communication operator can locate a user through the position and the signal coverage of the base station to acquire the position range of the user. Thereby exposing the user of a conventional mobile terminal to the exposure of personal location and whereabouts.
In addition, since the USIM card carries the IMSI Number (International Mobile subscriber identity Number) information of the subscriber, when the subscriber uses the conventional Mobile terminal through the conventional Mobile communication method, the operator can query the individual identification information of the subscriber through the IMSI Number information even if only the Mobile communication network is accessed. This further poses a risk of the user being exposed to privacy such as personal information.
When a user uses a mobile terminal abroad, the mobile terminal will access a base station of an overseas mobile communication network operator, and its location information may be acquired by the overseas operator. If the user is a core enterprise or a government enterprise and public staff going out of business, the personal whereabouts and privacy disclosure of the user can be caused, and even the confidentiality and national security of the enterprise can be seriously threatened.
In view of the above technical problems, the basic concept of the present application is to provide a mobile communication method and an electronic device, which can enable a user to normally perform a mobile communication service by using his/her number without carrying a USIM card by separating the functions of a conventional mobile terminal and replacing the conventional mobile terminal with at least two spatially separated devices, thereby protecting privacy of the user such as location information, personal information, and communication information, and improving security of the user and the enterprise and country to which the user belongs.
Exemplary System
Fig. 1 is a schematic diagram illustrating an exemplary system provided by an embodiment of the present application. The system comprises: a fixed device 110, a mobile terminal 120, and a communication manager 130.
The fixed device 110 may be a mobile phone, a computer including a wireless communication module, or other electronic devices including a wireless communication module, a processor, and a memory. Meanwhile, the fixing apparatus 110 should have a function capable of mounting a USIM card and be capable of accessing a mobile communication network and communicating with a base station through the USIM card. It should be noted that the user does not need to carry the fixed device 110 with him or her when using the fixed device 110.
The mobile terminal 120 may be a mobile device such as a mobile phone, a tablet computer, and a vehicle-mounted computer; or a personal computer such as a notebook computer or the like; but may also be other electronic terminals capable of establishing a connection to the internet and comprising a processor and a memory. Those skilled in the art will appreciate that the number of the mobile terminals 120 may be more than one. The embodiment of the present application does not impose any limitation on the type and number of the mobile terminals 120. It should be noted that the user can carry the mobile terminal 120 with him when using the mobile terminal 120.
The communication manager 130 is a server, or is composed of a plurality of servers, or is a virtualization platform, or is a cloud computing service center. The communication manager 130 may be disposed in a local area network, a metropolitan area network, or the internet, and is configured to receive a communication request sent by the fixed device 110 and/or the mobile terminal 120 and establish a communication connection therewith. Optionally, the communication manager 130 may also authenticate the fixed device 110 and/or the mobile terminal 120 to ensure the validity of the communication connection. Optionally, the communication manager 130 may also be used for data forwarding and other operations between the fixed device 110 and the mobile terminal 120.
The fixed device 110 may establish a communication connection with the communication manager 130 through a local area network, a metropolitan area network, or the internet, etc.; the mobile terminal 120 may establish a communication connection with the communication manager 130 through the internet. Alternatively, the local area network, the metropolitan area network, the internet, or the like may be accessed by wired or wireless means. Alternatively, the internet may be accessed directly or through a mobile communication network.
It should be understood that the fixed device referred to in the embodiments of the present application need not be a stationary device, but a device that is fixed with respect to the mobile device terminal, and the term fixed is merely used to distinguish it from the mobile terminal by name, and other named devices that can perform similar functions are also within the scope of the present application. Fixed devices may also be implemented as mobile devices, which may be relatively stationarily disposed within the coverage area of a base station only when the mobile terminal is roaming around locations.
Based on the system, the mobile communication method provided by the embodiment of the application can be used for preventing the position of the user from being monitored on the basis of providing the normal mobile communication service for the user, so that the privacy of the user is protected.
Exemplary method
Fig. 2 is a flowchart illustrating a mobile communication method according to an exemplary embodiment of the present application. The method may be used in the exemplary system described above in fig. 1, and is performed by the fixed equipment 110 of fig. 1.
As shown in fig. 2, the method may include the steps of:
s210: the fixed equipment is accessed into the mobile communication network through a USIM card, wherein the USIM card is arranged on the fixed equipment.
Specifically, by installing the USIM card, a fixed device located in the coverage area of a base station of the mobile communication network can access the mobile communication network at the location to realize communication with the base station.
A Universal Subscriber Identity Module (USIM) is a chip with a microprocessor, also called an upgraded SIM card, and is used to implement connection and information exchange between a mobile terminal and a mobile communication network, and a user can enjoy various services provided by a mobile communication network operator after installing the USIM card on the mobile terminal. A conventional SIM card (Subscriber Identity Module) uses a one-way authentication mechanism, and when a mobile terminal communicates with a base station through the SIM card, the SIM card can be used by the base station to identify a Subscriber Identity. Compared with the prior art, the USIM card adopts a bidirectional authentication mechanism, namely, the USIM card can not only provide the identity information of the user for the base station, but also perform identity authentication on the base station, thereby further ensuring the communication security.
S220: the fixed device sends a first link establishment request to the communication manager so as to establish a first link with the communication manager, wherein the communication manager establishes a second link with the mobile terminal by receiving a second link establishment request sent by the mobile terminal.
Specifically, the fixed device may send the first link establishment request to the communication manager through a local area network, a metropolitan area network, or the internet, or the like. Those skilled in the art can understand that the network environment where the fixed device and the communication manager are located may be set according to actual requirements, and the embodiment of the present application is not limited thereto.
Preferably, step S220 specifically includes: the fixed device sends a first link establishment request to the communication manager through the internet so as to establish a first link with the communication manager, wherein the communication manager establishes a second link with the mobile terminal by receiving a second link establishment request sent by the mobile terminal.
Specifically, the fixed device may access the internet through a mobile communication network so as to implement communication with a communication manager provided in the internet, and in other embodiments, the fixed device may further be connected to the internet through technologies such as wired, wifi (wireless fidelity), and the like. The embodiment of the application does not limit the way in which the fixed device accesses the internet.
Based on the mobile communication method provided by the embodiment of the application, when the user accesses the mobile communication network, a mobile communication operator can only master the position of the fixed equipment through the base station, but cannot master the real position of the user, so that the position information of the user is prevented from being leaked, and the privacy of the user is protected.
In an embodiment, the first link establishment request and the second link establishment request may be VPN encrypted tunnel establishment requests, and the first link and the second link may be VPN encrypted tunnels.
VPN (Virtual Private Network) encrypted tunnels are a technology implemented based on a Virtual tunneling protocol that can be used to implement encrypted data communication between Private networks or Private devices over the infrastructure of a public Network. Here, the content of the communication may be a packet of any communication protocol. The virtual tunneling protocol re-encapsulates these packets so that the new header carries routing information, thereby enabling the re-encapsulated packets to be delivered over the public network. That is, the logical path through which the re-encapsulated packet is passed is the VPN encryption tunnel.
Those skilled in the art will understand that the establishment of the VPN encrypted tunnel may be implemented by various means, such as a server, hardware, software, and the like, and the embodiment of the present application is not limited thereto.
Based on the mobile communication method provided by the embodiment of the application, the fixed equipment and the mobile terminal are separated so that a mobile communication operator cannot master the real position of the user, and links between the fixed equipment, the mobile terminal and the communication manager can be encrypted on the basis. That is to say, even if someone tries to monitor the communication data in the link, the protection of the VPN encryption tunnel on the link cannot be easily broken through, so that the communication security of the user is further improved.
Fig. 3 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application. The method may be used in the exemplary system described above in fig. 1, and is performed by the fixed equipment 110 of fig. 1.
On the basis of the embodiment shown in fig. 2, after step S220, the method shown in fig. 3 further includes the following steps:
s330: and after the communication manager verifies the first link establishment request and successfully verifies the first link establishment request, the fixed equipment establishes a first link with the communication manager, wherein the communication manager records the identity information of the fixed equipment in advance.
In an embodiment, the communication manager authenticating the first link establishment request comprises: the communication manager verifies the identity information of the fixed equipment included in the first link establishment request; if the identity information is legal identity information, the verification is successful; if the identity information is not legitimate identity information, the authentication fails.
In an embodiment, the communication manager may record at least one kind of identity information of the legal fixed device in advance to form a legal identity information base before receiving the first link establishment request, so as to register the fixed device corresponding to the legal identity information base as the legal fixed device.
Specifically, the identity information of the fixed Device may include at least one type of information capable of uniquely determining the identity of the fixed Device, such as a Serial Number (SN), an International Mobile Equipment Identity (IMEI), a Device ID (Device ID), and the like. Those skilled in the art can understand that, in practical applications, the identity information of the fixed device may be set according to specific requirements, which is not limited in the embodiments of the present application.
In one embodiment, the verifying the identity information of the fixed device included in the first link establishment request by the communication manager includes: extracting the identity information of the fixed equipment contained in the request; searching the identity information in the legal identity information base; if the identity information exists in the legal identity information base, the identity information is legal, and the fixed equipment which sends the first link establishment request is judged to be legal fixed equipment; and if the identity information does not exist in the legal identity information base, the identity information is illegal, and the fixed equipment which sends the first link establishment request is judged not to be legal fixed equipment.
In an embodiment, the verifying the first link establishment request by the communication manager may further include: if the identity information is illegal, the verification fails; the communication manager refuses to establish the first link with the fixed equipment corresponding to the identity information.
Based on the mobile communication method provided by the embodiment of the application, before the communication manager establishes the link with the fixed equipment, the legality of the fixed equipment is verified, so that only the legal fixed equipment can communicate with the mobile terminal, the safety of the link is further improved, and the position and privacy information of a user can be better protected.
Fig. 4 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application. The method may be used in the exemplary system described above in fig. 1, and is performed by the fixed equipment 110 of fig. 1.
On the basis of the above-mentioned embodiment shown in fig. 2 or fig. 3, the method shown in fig. 4 further includes the following steps:
s430: the fixed equipment receives a first signal sent by the base station and converts the first signal into a first IP data packet.
In an embodiment, when a transmitting terminal initiates a communication request (for example, dialing a call, sending a short message, etc.) to a user of a fixed device, a base station at the location of the fixed device establishes a communication connection with the fixed device based on an IMSI number of a USIM card installed on the fixed device, and sends a first signal to the fixed device. For example, when other mobile terminal users dial the phone number corresponding to the IMSI number, the base station where the dialer is located sends a corresponding mobile communication signal to the base station where the fixed device is located; after receiving the mobile communication signal, the base station at the location of the fixed equipment establishes communication connection with the fixed equipment based on the IMSI number of the USIM card installed on the fixed equipment, and then sends the mobile communication signal to the fixed equipment so that the fixed equipment can receive the mobile communication signal.
In particular, the first signal may include a first mobile communication signaling and a first user signal.
The mobile communication signaling is a signal for controlling a mobile communication process, and generally needs to be transmitted between different links (e.g., user equipment, a base station, a mobile control switching center, etc.) of a communication network to perform a series of operations and controls. In a mobile communication system, in addition to transmitting user signals, mobile communication signaling is also used to maintain the working order of a mobile communication network, thereby ensuring that user signals are transmitted efficiently and reliably.
Those skilled in the art can understand that the mobile communication signaling may adopt a common-path signaling or a channel associated signaling; it may be digital signaling or audio signaling. The embodiment of the present application does not limit the type of mobile communication signaling.
Unlike mobile communication signaling, user signal refers to a signal into which user communication data is converted, and user communication data refers to actual application information that a user is exposed to during communication, such as: voice to make a call, data packets to surf the internet, etc. During communication, user signals are transmitted by the sender and directly transmitted to the receiver through the mobile communication network.
In an embodiment, after receiving the first signal sent by the base station, the fixed device further converts the first signal into a first IP packet.
It will be understood by those skilled in the art that when the link is a VPN encrypted tunnel, the format of the first IP data packet should meet the requirement of transmission in the VPN encrypted tunnel, so that the fixed device can transmit the first IP data packet to the mobile terminal through the VPN encrypted tunnel in the subsequent step.
S440: the fixed equipment sends the first IP data packet to the communication manager so that the communication manager forwards the first IP data packet to the mobile terminal.
Specifically, the fixed equipment sends a first IP data packet to the communication manager through a first link established between the fixed equipment and the communication manager; after receiving the first IP data packet, the communication manager forwards the first IP data packet to the mobile terminal through a second link established with the mobile terminal.
Based on the mobile communication method provided by the embodiment of the application, the fixed equipment and the mobile terminal are separated so that a mobile communication operator cannot master the real position of the user, and meanwhile, the user can still normally carry out communication operations such as call receiving and short message receiving on the premise of not changing the number, the use habit of the user does not need to be changed, and therefore great convenience is brought to the user.
In an embodiment, after converting the first signal into the first IP data packet, the fixed device may further perform encryption processing on the first IP data packet. Those skilled in the art can understand that the manner of encrypting the first IP packet may be selected according to specific needs in practical application, and the embodiment of the present application does not limit this.
Based on the mobile communication method provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
In one embodiment, the communication manager may verify the validity of the mobile terminal before forwarding the first IP data packet to the mobile terminal. If the mobile terminal is a legal mobile terminal, the verification is successful, and the first IP data packet is forwarded to the mobile terminal; if the mobile terminal is not a legal mobile terminal, the authentication fails and the forwarding is terminated.
Based on the mobile communication method provided by the embodiment of the application, before the IP data packet is sent to the mobile terminal, the validity of the mobile terminal is verified through the communication manager, so that only a legal mobile terminal (namely, the mobile terminal really carried by a user) can communicate with the fixed equipment, the communication safety is further improved, and the communication content of the user can be better protected from being maliciously intercepted.
Alternatively, the steps S430 and S440 shown in fig. 4 may be implemented before or after the step S330 shown in fig. 3, which is not limited in this application.
Fig. 5 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application. The method may be used in the exemplary system described above in fig. 1, and is performed by the fixed equipment 110 of fig. 1.
On the basis of the above-mentioned embodiment shown in fig. 2 or fig. 3, the method shown in fig. 5 further includes the following steps:
s530: and the fixed equipment receives a second IP data packet forwarded by the communication manager, wherein the second IP data packet is sent to the communication manager by the mobile terminal.
Specifically, the mobile terminal sends a second IP data packet to the communication manager through a second link established between the mobile terminal and the communication manager; after receiving the second IP data packet, the communication manager forwards the second IP data packet to the fixed device through the first link established with the fixed device.
In one embodiment, when the user wishes to initiate communication (e.g., make a call, send a short message, etc.) through the mobile terminal, the mobile terminal may encapsulate the user communication data sent by the user into a second IP data packet after receiving the user communication data.
It will be understood by those skilled in the art that when the aforementioned link is a VPN encrypted tunnel, the format of the second IP data packet should meet the requirement of transmission in the VPN encrypted tunnel, so that the fixed device can transmit the second IP data packet to the aforementioned mobile terminal through the VPN encrypted tunnel in the subsequent step.
S540: and the fixed equipment converts the second IP data packet into a second signal and sends the second signal to the base station.
Specifically, after receiving the second IP data packet, the fixed device may convert the format of the second IP data packet, generate a second signal that can be received by the base station, and send the second signal to the base station.
In one embodiment, the base station, after receiving the second signal, may transmit the second signal to the recipient through a conventional mobile communication method.
Based on the mobile communication method provided by the embodiment of the application, the fixed equipment and the mobile terminal are separated, so that a mobile communication operator cannot master the real position of the user, and meanwhile, the user can still normally carry out communication operations such as making a call, sending short messages and the like on the premise of not changing the number, the use habit of the user does not need to be changed, and great convenience is brought to the user.
In an embodiment, the second IP data packet may be an IP data packet encrypted by the mobile terminal. When the second IP data packet is an encrypted IP data packet, before the fixed device converts the second IP data packet into the second signal, the method provided in the embodiment of the present application further includes: and the fixed equipment decrypts the second IP data packet.
Those skilled in the art can understand that, in the embodiment of the present application, a manner in which the fixed device performs decryption processing on the second IP data packet corresponds to a specific encryption manner, and the embodiment of the present application does not limit this.
Based on the mobile communication method provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
In an embodiment, the communication manager may verify the validity of the mobile terminal after receiving the second IP packet sent by the mobile terminal. If the mobile terminal is a legal mobile terminal, the verification is successful, and the second IP data packet is forwarded to the fixed equipment; if the mobile terminal is not a legal mobile terminal, the authentication fails and the forwarding is terminated.
Based on the mobile communication method provided by the embodiment of the application, before the IP data packet is received, the validity of the mobile terminal is verified through the communication manager, so that only a legal mobile terminal (namely, the mobile terminal really carried by a user) can communicate with the fixed equipment, the communication safety is further improved, and the communication content of the user can be better protected from being maliciously intercepted and intercepted.
Alternatively, the steps S530 and S540 shown in fig. 5 may be implemented before or after the step S330 shown in fig. 3, and may also be implemented before or after the steps S430 and S440 shown in fig. 4, which is not limited in this application.
Fig. 6 is a flowchart illustrating a mobile communication method according to an exemplary embodiment of the present application. The method may be used in the exemplary system shown in fig. 1 described above, and performed by the mobile terminal 120 of fig. 1. It should be noted that the method of fig. 6 corresponds to the method of fig. 2, and similar details are not repeated herein.
As shown in fig. 6, the method may include the steps of:
s610: the mobile terminal establishes connection with the internet.
Alternatively, the mobile terminal may access the internet directly or through a mobile communication network. The mode of directly accessing the mobile terminal to the internet may be via wifi (wireless fidelity); the mobile terminal can access the internet through a mobile communication network by installing a SIM card or USIM card that does not contain user identity information. The embodiment of the present application does not limit the specific manner in which the mobile terminal establishes a connection with the internet.
S620: the mobile terminal sends a second link establishment request to the communication manager through the internet so as to establish a second link with the communication manager, wherein the communication manager establishes the first link with the fixed equipment by receiving the first link establishment request sent by the fixed equipment.
Based on the mobile communication method provided by the embodiment of the application, when the user accesses the mobile communication network, a mobile communication operator can only master the position of the fixed equipment through the base station, but cannot master the real position of the user, so that the position information of the user is prevented from being leaked, and the privacy of the user is protected.
In an embodiment, the first link establishment request and the second link establishment request may be VPN encrypted tunnel establishment requests, and the first link and the second link may be VPN encrypted tunnels. As in the embodiment shown in fig. 2, those skilled in the art can understand that the establishment of the VPN encrypted tunnel may be implemented in various ways, such as a server, hardware, and software, and the embodiment of the present application is not limited thereto.
Based on the mobile communication method provided by the embodiment of the application, the fixed equipment and the mobile terminal are separated so that a mobile communication operator cannot master the real position of the user, and links between the fixed equipment, the mobile terminal and the communication manager are encrypted on the basis. That is to say, even if someone tries to monitor the communication data in the link, the protection of the VPN encryption tunnel on the link cannot be easily broken through, so that the communication security of the user is further improved.
Fig. 7 is a flowchart illustrating a mobile communication method according to an exemplary embodiment of the present application. The method may be used in the exemplary system shown in fig. 1 described above, and performed by the mobile terminal 120 of fig. 1.
On the basis of the embodiment shown in fig. 6, after step S620, the method shown in fig. 7 further includes the following steps:
s730: and after the communication manager verifies the second link establishment request and successfully verifies the second link establishment request, the mobile terminal establishes a second link with the communication manager, wherein the communication manager records the identity information of the mobile terminal in advance.
In an embodiment, the communication manager authenticating the second link establishment request comprises: the communication manager verifies the identity information of the mobile terminal included in the second link establishment request; if the identity information is legal identity information, the verification is successful; if the identity information is not legitimate identity information, the authentication fails.
In one embodiment, the communication manager may pre-record at least one kind of identity information of a legitimate mobile terminal to form a legitimate identity information base before receiving the second link establishment request, so as to register a mobile terminal corresponding to the legitimate identity information base as a legitimate mobile terminal.
Specifically, the identity information of the mobile terminal may be similar to the fixed device in the embodiment shown in fig. 3, and include at least one kind of information capable of uniquely determining the identity of the mobile terminal. Those skilled in the art can understand that, in practical applications, the identity information of the mobile terminal may be set according to specific requirements, which is not limited in the embodiments of the present application.
In one embodiment, the verifying the identity information of the mobile terminal included in the second link establishment request by the communication manager includes: extracting the identity information of the mobile terminal contained in the request; searching the identity information in the legal identity information base; if the identity information exists in the legal identity information base, the identity information is legal, and the mobile terminal sending the second link establishment request is judged to be a legal mobile terminal; and if the identity information does not exist in the legal identity information base, the identity information is illegal, and the mobile terminal sending the second link establishment request is judged not to be a legal mobile terminal.
In an embodiment, the verifying the second link establishment request by the communication manager may further include: if the identity information is illegal, the verification fails; and the communication manager refuses to establish a second link with the mobile terminal corresponding to the identity information.
Based on the mobile communication method provided by the embodiment of the application, before the communication manager establishes the link with the mobile terminal, the legality of the mobile terminal is verified, so that only the legal mobile terminal can communicate with the fixed equipment, the safety of the link is further improved, and the position and privacy information of a user can be better protected.
Fig. 8 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application. The method may be used in the exemplary system shown in fig. 1 described above, and performed by the mobile terminal 120 of fig. 1.
On the basis of the above-mentioned embodiment shown in fig. 6 or fig. 7, the method shown in fig. 8 further includes the following steps:
s830: and the mobile terminal receives second user communication data input by the user and encapsulates the second user communication data into a second IP data packet.
Specifically, when the user wishes to initiate communication (call, send a short message, etc.) outward through the mobile terminal, second user communication data may be input at the mobile terminal; the mobile terminal may encapsulate the second user communication data into a second IP data packet after receiving the second user communication data input by the user.
S840: and the mobile terminal sends the second IP data packet to the communication manager so that the communication manager forwards the second IP data packet to the fixed equipment.
Specifically, the mobile terminal sends a second IP data packet to the communication manager through a second link established between the mobile terminal and the communication manager; after receiving the second IP data packet, the communication manager forwards the second IP data packet to the fixed device through the first link established with the fixed device.
Based on the mobile communication method provided by the embodiment of the application, the fixed equipment and the mobile terminal are separated, so that a mobile communication operator cannot master the real position of the user, and meanwhile, the user can still normally carry out communication operations such as making a call, sending short messages and the like on the premise of not changing the number, the use habit of the user does not need to be changed, and great convenience is brought to the user.
In an embodiment, after encapsulating the second user communication data into a second IP data packet, the mobile terminal may further perform encryption processing on the second IP data packet. Those skilled in the art can understand that the manner of encrypting the second IP data packet may be selected according to specific needs in practical application, and the embodiment of the present application does not limit this.
Based on the mobile communication method provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
In one embodiment, the communication manager may verify the legitimacy of the fixed device before forwarding the second IP packet to the fixed device. If the fixed equipment is legal, the verification is successful, and the second IP data packet is forwarded to the fixed equipment; if the fixed equipment is not legal, the verification fails and the forwarding is stopped.
Based on the mobile communication method provided by the embodiment of the application, before the IP data packet is sent to the fixed equipment, the legality of the fixed equipment is verified through the communication manager, so that only legal fixed equipment (namely the fixed equipment actually used by a user) can be communicated with the mobile terminal, the communication safety is further improved, and the communication content of the user can be better protected from being maliciously intercepted.
Alternatively, the steps S830 and S840 shown in fig. 8 may be implemented before or after the step S730 shown in fig. 7, which is not limited in this application.
Fig. 9 is a flowchart illustrating a mobile communication method according to another exemplary embodiment of the present application. The method may be used in the exemplary system shown in fig. 1 described above, and performed by the mobile terminal 120 of fig. 1.
On the basis of the above-mentioned embodiment shown in fig. 6 or fig. 7, the method shown in fig. 9 further includes the following steps:
s930: the mobile terminal receives a first IP data packet forwarded by the communication manager, wherein the first IP data packet is sent to the communication manager by the fixed equipment.
Specifically, the fixed equipment sends a first IP data packet to the communication manager through a first link established between the fixed equipment and the communication manager; after receiving the first IP data packet, the communication manager forwards the first IP data packet to the mobile terminal through a second link established with the mobile terminal.
In an embodiment, after receiving the first signal sent by the base station, the fixed device further converts the first signal into a first IP packet.
Specifically, the content of the first signal and the format of the first IP data packet may refer to the embodiment shown in fig. 4, and are not described herein again.
S940: and the mobile terminal acquires the first user communication data from the first IP data packet and provides the first user communication data for the user.
Specifically, after receiving the first IP data packet, the mobile terminal may decode and convert the first IP data packet into first user communication data that can be identified by the user, for example: sound, text, pictures, video, etc., and provide the first user communication data to the user through the interactive interface.
Based on the mobile communication method provided by the embodiment of the application, the fixed equipment and the mobile terminal are separated so that a mobile communication operator cannot master the real position of the user, and meanwhile, the user can still normally carry out communication operations such as call receiving and short message receiving on the premise of not changing the number, the use habit of the user does not need to be changed, and therefore great convenience is brought to the user.
In an embodiment, the first IP packet may be an IP packet encrypted by the fixed device. When the first IP data packet is an encrypted IP data packet, before the mobile terminal converts the first IP data packet into the first user data, the method provided in the embodiment of the present application further includes: and the mobile terminal decrypts the first IP data packet.
Those skilled in the art can understand that, in the embodiment of the present application, a manner in which the mobile terminal decrypts the first IP data packet corresponds to a specific encryption manner, and the embodiment of the present application does not limit this manner.
Based on the mobile communication method provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
In an embodiment, the communication manager may verify the validity of the fixed device after receiving the first IP packet sent by the fixed device. If the fixed equipment is legal, the verification is successful, and the first IP data packet is forwarded to the mobile terminal; if the fixed equipment is not legal, the verification fails and the forwarding is stopped.
Based on the mobile communication method provided by the embodiment of the application, before the IP data packet is received, the legality of the fixed equipment is verified through the communication manager, so that only legal fixed equipment (namely the fixed equipment actually used by a user) can be communicated with the mobile terminal, the communication safety is further improved, and the communication content of the user can be better protected from being maliciously intercepted.
Alternatively, the steps S930 and S940 shown in fig. 9 may be implemented before or after the step S730 shown in fig. 7, or may be implemented before or after the steps S830 and S840 shown in fig. 8, which is not limited in this application.
Method of operation of an exemplary System
Fig. 10a is a flowchart illustrating a method for a user to receive a communication through the exemplary system provided in the embodiment of the present application, where the method is implemented by the fixed device 110, the mobile terminal 120, and the communication manager 130, and includes:
s1010: the USIM card is arranged on the fixed equipment, and after the fixed equipment is started, the fixed equipment is accessed to a mobile communication network and is accessed to the Internet through the mobile communication network or WIFI; the mobile terminal has a WIFI function or is provided with a USIM card, and after the mobile terminal is started, the mobile terminal is directly or indirectly connected with the Internet.
S1020: the fixed equipment sends a first link establishment request to the communication manager through the Internet and establishes a first link with the communication manager; the mobile terminal sends a second link establishment request to the communication manager through the internet, and establishes a second link with the communication manager.
Specifically, the action of sending the first link establishment request to the communication manager by the fixed device through the internet may be automatically triggered after the fixed device is connected to the internet when the device is powered on, or triggered when the user sends an instruction; the action of the mobile terminal sending the second link establishment request to the communication manager through the internet may be automatically triggered after the mobile terminal is connected to the internet when the mobile terminal is powered on, or triggered when the user sends an instruction.
S1041: the fixed equipment receives a first signal sent by the base station and converts the first signal into a first IP data packet.
S1042: the fixed equipment sends a first IP data packet to the communication manager; the communication manager forwards the first IP data packet to the mobile terminal.
S1043: the mobile terminal receives the first IP data packet.
S1044: and the mobile terminal acquires the first user communication data from the first IP data packet and provides the first user communication data for the user.
In one embodiment, after the fixed device sends the first link establishment request to the communication manager through the internet, the method further includes:
s1031: the communication manager verifies a first link establishment request sent by the fixed equipment, establishes a first link with the fixed equipment after the verification is successful, and records identity information of the fixed equipment in advance on the communication manager.
S1032: and the communication manager verifies the second link establishment request sent by the mobile terminal and establishes a second link with the mobile terminal after the verification succeeds, wherein the communication manager records the identity information of the mobile terminal in advance.
Based on the embodiment shown in fig. 10a, fig. 10b is a flowchart illustrating a method for a user to initiate communication through the exemplary system provided in the embodiment of the present application. Compared to FIG. 10a, the embodiment shown in FIG. 10b does not include S1041-1044, instead the embodiment shown in FIG. 10b includes:
s1051: and the mobile terminal receives second user communication data input by the user and encapsulates the second user communication data into a second IP data packet.
S1052: the mobile terminal sends a second IP data packet to the communication manager; the communication manager forwards the second IP data packet to the fixed device.
S1053: and the fixed equipment receives the second IP data packet forwarded by the communication manager.
S1054: and the fixed equipment converts the second IP data packet into a second signal and sends the second signal to the base station.
In one embodiment, the first link establishment request and the second link establishment request are VPN encrypted tunnel establishment requests; the first link and the second link are VPN encrypted tunnels.
In summary, the mobile communication method provided by the embodiment of the present application at least includes the following effects:
by separating the fixed equipment from the mobile terminal, a mobile communication operator cannot master the real position of the user, and the position information of the user is protected; meanwhile, the user can still normally carry out communication operations such as call receiving and making, short message receiving and sending and the like on the premise of not changing the number, and the use habit of the user does not need to be changed, so that great convenience is brought to the user.
Exemplary devices
Fig. 11 is a schematic structural diagram of a mobile communication device according to an exemplary embodiment of the present application. The apparatus is used to implement the steps of the method described above with reference to fig. 2 to 5. As shown in fig. 11, the apparatus includes: a communication module 1110 for accessing a mobile communication network through a USIM card, which is mounted on the device; a link establishing module 1120, configured to send a first link establishing request to the communication manager so as to establish a first link with the communication manager, wherein the communication manager establishes a second link with the mobile terminal by receiving a second link establishing request sent by the mobile terminal.
Preferably, the link establishing module 1120 is further configured to send a first link establishment request to the communication manager via the internet to establish the first link with the communication manager.
Based on the mobile communication device provided by the embodiment of the application, when a user accesses a mobile communication network, a mobile communication operator can only master the position of the device through a base station and cannot master the real position of the user, so that the position information of the user is prevented from being leaked, and the privacy of the user is protected.
In one embodiment, the link establishing module 1120 is configured to send a first VPN encrypted tunnel establishment request to the communication manager to establish the first VPN encrypted tunnel with the communication manager, wherein the communication manager establishes a second VPN encrypted tunnel with the mobile terminal by receiving a second VPN encrypted tunnel establishment request sent by the mobile terminal.
Based on the mobile communication device provided by the embodiment of the application, the device and the mobile terminal are separated so that a mobile communication operator cannot know the real position of the user, and links among the device, the mobile terminal and the communication manager can be encrypted on the basis. That is to say, even if someone tries to monitor the communication data in the link, the protection of the VPN encryption tunnel on the link cannot be easily broken through, so that the communication security of the user is further improved.
In an embodiment, the link establishing module 1120 is further configured to establish the first link with the communication manager after the communication manager verifies the first link establishing request and the verification is successful, where the communication manager has the identity information of the device recorded in advance.
Based on the mobile communication device provided by the embodiment of the application, before the communication manager establishes the link with the device, the legality of the device is verified, so that only the legal device can communicate with the mobile terminal, the link safety is further improved, and the position and privacy information of a user can be better protected.
In an embodiment, the mobile communication device provided in the embodiment of the present application further includes: a communication conversion module 1130, configured to receive a first signal sent by a base station, and convert the first signal into a first IP data packet; the transceiving module 1140 is configured to send the first IP data packet to the communication manager, so that the communication manager forwards the first IP data packet to the mobile terminal.
Based on the mobile communication device provided by the embodiment of the application, the device and the mobile terminal are separated so that a mobile communication operator can not master the real position of the user, and meanwhile, the user can still normally carry out communication operations such as call receiving and short message receiving on the premise of not changing the number, the use habit of the user does not need to be changed, and therefore great convenience is brought to the user.
In an embodiment, the communication conversion module 1130 is further configured to perform encryption processing on the first IP data packet.
Based on the mobile communication device provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
In an embodiment, the transceiving module 1140 is further configured to receive a second IP data packet forwarded by the communication manager, where the second IP data packet is sent by the mobile terminal to the communication manager; the communication converting module 1130 is further configured to convert the second IP data packet into a second signal and send the second signal to the base station.
Based on the mobile communication device provided by the embodiment of the application, the device and the mobile terminal are separated, so that a mobile communication operator cannot master the real position of a user, and meanwhile, the user can still normally carry out communication operations such as making a call and sending short messages on the premise of not changing the number, the use habit of the user does not need to be changed, and great convenience is brought to the user.
Fig. 12 is a schematic structural diagram of a mobile communication device according to another exemplary embodiment of the present application. The apparatus is used to implement the steps of the method described above with reference to fig. 6-9. As shown in fig. 12, the apparatus includes: an internet connection module 1210 for establishing connection with the internet; a link establishing module 1220, configured to send a second link establishing request to the communication manager through the internet so as to establish a second link with the communication manager, where the communication manager establishes the first link with the fixed device by receiving the first link establishing request sent by the fixed device.
Based on the mobile communication device provided by the embodiment of the application, when the user accesses the mobile communication network, a mobile communication operator can only master the position of the fixed equipment through the base station and cannot master the real position of the user, so that the position information of the user is prevented from being leaked, and the privacy of the user is protected.
In an embodiment, the link establishing module 1220 is configured to send a second VPN encrypted tunnel establishment request to the communication manager via the internet to establish a second VPN encrypted tunnel with the communication manager, where the communication manager establishes the first VPN encrypted tunnel with the fixed device by receiving the first VPN encrypted tunnel establishment request sent by the fixed device.
Based on the mobile communication device provided by the embodiment of the application, not only the fixed equipment and the device are separated so that a mobile communication operator cannot master the real position of the user, but also the fixed equipment, the device and a link between the communication manager are encrypted on the basis. That is to say, even if someone tries to monitor the communication data in the link, the protection of the VPN encryption tunnel on the link cannot be easily broken through, so that the communication security of the user is further improved.
In an embodiment, the link establishing module 1220 is further configured to establish the second link with the communication manager after the communication manager verifies the second link establishment request and the verification is successful, where the communication manager has the identity information of the device recorded thereon in advance.
Based on the mobile communication device provided by the embodiment of the application, before the communication manager establishes the link with the device, the legality of the device is verified, so that only the legal device can communicate with the fixed equipment, the security of the link is further improved, and the position and privacy information of a user can be better protected.
In an embodiment, the mobile communication device provided in the embodiment of the present application further includes: the encapsulating module 1230 is configured to receive second user communication data input by a user, and encapsulate the second user communication data into a second IP data packet; the transceiver module 1240 sends the second IP data packet to the communication manager, so that the communication manager forwards the second IP data packet to the fixed device.
Based on the mobile communication device provided by the embodiment of the application, not only the fixed equipment is separated from the device so that a mobile communication operator can not master the real position of the user, but also the user can still normally make a call, send short messages and other communication operations on the premise of not changing the number, the use habit of the user does not need to be changed, and therefore great convenience is brought to the user.
In an embodiment, the encapsulating module 1230 is further configured to perform encryption processing on the second IP data packet.
Based on the mobile communication device provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
In an embodiment, the transceiver module 1240 is further configured to receive a first IP data packet forwarded by the communication manager, where the first IP data packet is sent by the fixed device to the communication manager; the encapsulating module 1230 is further configured to obtain the first user communication data from the first IP data packet and provide the first user communication data to the user.
Based on the mobile communication device provided by the embodiment of the application, the IP data packet is encrypted on the basis of ensuring the normal communication operation of the user, so that even if someone maliciously intercepts the IP data packet, the communication content of the user cannot be easily known, and the risk of leakage of the communication content is further avoided.
Fig. 13 is a schematic structural diagram of a mobile communication device according to an exemplary embodiment of the present application. The device includes: the connection management module 1310 is configured to receive a first link establishment request sent by the fixed device and/or a second link establishment request sent by the mobile terminal, and establish a first link and/or a second link with the fixed device and/or the mobile terminal.
In one embodiment, the apparatus further includes a registration module 1320 for recording identity information of the fixed device and/or the mobile terminal; the connection management module 1310 is further configured to verify the first link establishment request and/or the second link establishment request according to the identity information recorded by the registration module 1320, where the identity information is recorded in the fixed device and/or the mobile terminal, and when the verification is successful, establish the first link and/or the second link with the fixed device and/or the mobile terminal.
In an embodiment, after receiving the first link establishment request sent by the fixed device and/or the second link establishment request sent by the mobile terminal and verifying the first link establishment request and/or the second link establishment request, the connection management module 1310 is further configured to reject to establish the first link and/or the second link with the fixed device and/or the mobile terminal when the verification fails.
In one embodiment, the apparatus further comprises: the forwarding module 1330 is configured to forward the first IP data packet sent by the fixed device to the mobile terminal, and/or forward the second IP data packet sent by the mobile terminal to the fixed device.
Based on the mobile communication device provided by the embodiment of the application, the fixed equipment and the mobile terminal can be separated, so that a mobile communication operator can not master the real position of a user; the identity of the fixed equipment and the identity of the mobile terminal are respectively verified, so that a device for establishing a link is ensured to be legal, and the communication safety between the fixed equipment and the mobile terminal is ensured; meanwhile, the user can still normally carry out communication operations such as making a call, sending short messages and the like on the premise of not changing the number, and the use habit of the user does not need to be changed, so that great convenience is brought to the user.
Exemplary electronic device
Fig. 14 is a schematic structural diagram of an electronic device according to another exemplary embodiment of the present application. As shown in fig. 14, the electronic apparatus includes: one or more processors 1410; a memory 1420 to store one or more computer programs; the mobile communication method according to any of the above embodiments is implemented when one or more computer programs are executed by one or more processors 1410.
Exemplary computer readable storage Medium
Further embodiments of the present application also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a mobile communication method as described in any of the above embodiments. It is understood that the computer storage medium can be any tangible medium, such as: floppy disks, CD-ROMs, DVDs, hard drives, network media, or the like.
The block diagrams of apparatuses, devices, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that they must be connected, arranged, or configured in the manner shown in the block diagrams. Those skilled in the art will appreciate that the devices, apparatus, systems, etc. may be connected, arranged, or configured in any manner. Words such as "comprising," "including," "having," and the like are open-ended words to "including, but not limited to," and may be used interchangeably therewith unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the modules or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the above aspects but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The above description is intended to be illustrative and descriptive of the present technology. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed above. While a number of exemplary aspects and embodiments have been discussed above, other variations, modifications, changes, additions, and sub-combinations will readily occur to those skilled in the art based upon the foregoing.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, etc. that is made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A mobile communication method, comprising:
the method comprises the following steps that a fixed device is connected into a mobile communication network through a USIM card, wherein the USIM card is installed on the fixed device;
the fixed equipment sends a first link establishment request to a communication manager so as to establish a first link with the communication manager, wherein the communication manager establishes a second link with a mobile terminal by receiving a second link establishment request sent by the mobile terminal.
2. The method of claim 1, wherein the fixed device sending the first link establishment request to the communication manager comprises: the fixed equipment sends the first link establishment request to the pipe connector through the Internet;
after the fixed device sends the first link establishment request to the communication manager over the internet, the method further comprises:
and after the communication manager verifies the first link establishment request and successfully verifies the first link establishment request, the fixed equipment establishes the first link with the communication manager, wherein the communication manager records the identity information of the fixed equipment in advance.
3. The method of claim 1, further comprising:
the fixed equipment receives a first signal sent by a base station and converts the first signal into a first IP data packet;
and the fixed equipment sends the first IP data packet to the communication manager so that the communication manager forwards the first IP data packet to the mobile terminal.
4. The method of claim 1, further comprising:
the fixed equipment receives a second IP data packet forwarded by the communication manager, wherein the second IP data packet is sent to the communication manager by the mobile terminal;
and the fixed equipment converts the second IP data packet into a second signal and sends the second signal to the base station.
5. The method according to any of claims 1 to 4, wherein said first link establishment request and said second link establishment request are VPN encrypted tunnel establishment requests; the first link and the second link are VPN encryption tunnels.
6. A mobile communication method, comprising:
the mobile terminal establishes connection with the Internet;
the mobile terminal sends a second link establishment request to a communication manager through the internet so as to establish a second link with the communication manager, wherein the communication manager establishes a first link with a fixed device by receiving a first link establishment request sent by the fixed device.
7. The method of claim 6, wherein after the mobile terminal sends a second link establishment request to the communication manager over the internet, the method further comprises:
and after the communication manager verifies the second link establishment request and successfully verifies the second link establishment request, the mobile terminal establishes the second link with the communication manager, wherein the communication manager records the identity information of the mobile terminal in advance.
8. The method of claim 6 or 7, further comprising:
the mobile terminal receives second user communication data input by a user and encapsulates the second user communication data into a second IP data packet;
and the mobile terminal sends the second IP data packet to the communication manager so that the communication manager forwards the second IP data packet to the fixed equipment.
9. The method of claim 6 or 7, further comprising:
the mobile terminal receives a first IP data packet forwarded by the communication manager, wherein the first IP data packet is sent to the communication manager by the fixed equipment;
and the mobile terminal acquires first user communication data from the first IP data packet and provides the first user communication data for the user.
10. An electronic device, comprising:
a processor;
a memory, wherein the memory is to store instructions executable by the processor;
when the processor executes the instructions, the mobile communication method of any of the above claims 1-5, 6-9 is implemented.
CN201911318515.5A 2019-12-19 2019-12-19 Mobile communication method and electronic equipment Pending CN111010694A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911318515.5A CN111010694A (en) 2019-12-19 2019-12-19 Mobile communication method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911318515.5A CN111010694A (en) 2019-12-19 2019-12-19 Mobile communication method and electronic equipment

Publications (1)

Publication Number Publication Date
CN111010694A true CN111010694A (en) 2020-04-14

Family

ID=70116680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911318515.5A Pending CN111010694A (en) 2019-12-19 2019-12-19 Mobile communication method and electronic equipment

Country Status (1)

Country Link
CN (1) CN111010694A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113316103A (en) * 2021-05-10 2021-08-27 维沃移动通信有限公司 Communication method, communication device, electronic equipment and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552988A (en) * 2009-04-28 2009-10-07 中兴通讯股份有限公司 Terminal protecting methdo and system
CN101569216A (en) * 2007-01-02 2009-10-28 法国电信公司 Mobile telecommunications system and method
CN104184857A (en) * 2014-09-09 2014-12-03 王家城 Intelligent separated SIM card clamping base device and communication method
CN104869554A (en) * 2015-04-08 2015-08-26 北京旅信顺捷软件科技有限公司 System for realizing mobile communication through co-location of SIM card and corresponding method
WO2016000398A1 (en) * 2014-06-30 2016-01-07 天津泰岳小漫科技有限公司 Communication method and device, mobile terminal and cloud server
CN208805691U (en) * 2018-11-02 2019-04-30 无锡职业技术学院 A kind of wearable house control system
CN110557379A (en) * 2019-08-05 2019-12-10 澳克多普有限公司 call method and system based on cloud SIM server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101569216A (en) * 2007-01-02 2009-10-28 法国电信公司 Mobile telecommunications system and method
CN101552988A (en) * 2009-04-28 2009-10-07 中兴通讯股份有限公司 Terminal protecting methdo and system
WO2016000398A1 (en) * 2014-06-30 2016-01-07 天津泰岳小漫科技有限公司 Communication method and device, mobile terminal and cloud server
CN104184857A (en) * 2014-09-09 2014-12-03 王家城 Intelligent separated SIM card clamping base device and communication method
CN104869554A (en) * 2015-04-08 2015-08-26 北京旅信顺捷软件科技有限公司 System for realizing mobile communication through co-location of SIM card and corresponding method
CN208805691U (en) * 2018-11-02 2019-04-30 无锡职业技术学院 A kind of wearable house control system
CN110557379A (en) * 2019-08-05 2019-12-10 澳克多普有限公司 call method and system based on cloud SIM server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113316103A (en) * 2021-05-10 2021-08-27 维沃移动通信有限公司 Communication method, communication device, electronic equipment and readable storage medium
CN113316103B (en) * 2021-05-10 2023-06-13 维沃移动通信有限公司 Communication method, communication device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110798833B (en) Method and device for verifying user equipment identification in authentication process
JP5200595B2 (en) Wireless terminal device
US20180294949A1 (en) EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENT
US20160127902A1 (en) Mobile device authentication in heterogeneous communication networks scenario
WO2019017840A1 (en) Network verification method, and relevant device and system
WO2020207156A1 (en) Verification method, apparatus, and device
JP2003531539A (en) Secure dynamic link allocation system for mobile data communications
CN112492580A (en) Information processing method and device, communication equipment and storage medium
CN114697945B (en) Method and device for generating discovery response message and method for processing discovery message
US20190327612A1 (en) Network assisted validation of secure connection to cellular infrastructure
US8769615B2 (en) Key storage and retrieval in a breakout component at the edge of a mobile data network
WO2018233726A1 (en) Network slice authentication method, corresponding apparatus and system, and medium
CN111132305A (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN110493222A (en) A kind of power automation terminal remote management method and system
CN111010694A (en) Mobile communication method and electronic equipment
US20230403563A1 (en) SECURE eSIM SUBSCRIPTION TRANSFER
CN115442807B (en) User security improving method and device for 5G system
WO2023216531A1 (en) Communication authentication processing method and apparatus, device and computer readable storage medium
CN114301967B (en) Control method, device and equipment for narrowband Internet of things
CN104185160A (en) Mobile service application migration system and agent terminal thereof
CN110636501B (en) Mobile position information hiding method and system
KR101434750B1 (en) Geography-based pre-authentication for wlan data offloading in umts-wlan networks
JP6892846B2 (en) User authentication method for core network system including authentication device and service device
CN110582085B (en) Communication method, device and system
WO2024207998A1 (en) Communication method and communication apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200414

WD01 Invention patent application deemed withdrawn after publication