CN113114623B - Data connection method, device, terminal equipment and computer readable storage medium - Google Patents

Data connection method, device, terminal equipment and computer readable storage medium Download PDF

Info

Publication number
CN113114623B
CN113114623B CN202110268033.4A CN202110268033A CN113114623B CN 113114623 B CN113114623 B CN 113114623B CN 202110268033 A CN202110268033 A CN 202110268033A CN 113114623 B CN113114623 B CN 113114623B
Authority
CN
China
Prior art keywords
data connection
identity information
identified
user identity
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110268033.4A
Other languages
Chinese (zh)
Other versions
CN113114623A (en
Inventor
陈郭香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202110268033.4A priority Critical patent/CN113114623B/en
Publication of CN113114623A publication Critical patent/CN113114623A/en
Application granted granted Critical
Publication of CN113114623B publication Critical patent/CN113114623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a data connection method, a data connection device, a terminal device and a computer readable storage medium. The method comprises the following steps: sending a data connection request to an operator server; the data connection request carries identity information of a user to be identified; receiving and identifying a data connection result sent by the operator server based on the data connection request; and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server. By adopting the method, the problems that the data connection request is rejected and the internet cannot be accessed due to unrecoverable problems caused by the wrong input of the user identity information can be avoided.

Description

Data connection method, device, terminal equipment and computer readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data connection method, an apparatus, a terminal device, and a computer-readable storage medium.
Background
With the freezing of the 5G standard, the 5G network and the terminals thereof are also spreading in a large scale, and more users choose to use the 5G terminal to access the 5G network for data service of internet surfing.
After the terminal completes the registration of the user and the password to the operator server, the user can initiate a Protocol Data Unit (PDU) session establishment flow to the operator server by using the registered user name and password so as to send a data connection request to the operator server for data service.
However, in the conventional technology, if the data connection request is rejected by the operator server, the user cannot surf the internet, and the problem cannot be recovered.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a data connection method, apparatus, terminal device and computer readable storage medium.
A data connection method, comprising:
sending a data connection request to an operator server; the data connection request carries the identity information of the user to be identified;
receiving and identifying a data connection result sent by the operator server based on the data connection request;
and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to the prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server.
In one embodiment, the method for determining the identity information of the user to be identified includes the following steps that:
and if the data connection result is that the user name to be identified and/or the password to be identified are/is illegal, determining that the pre-stored user identity information is legal user identity information.
In one embodiment, the method for determining the identity information of the user to be identified includes the following steps that:
and if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, determining that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determining that the new user name to be identified and the password to be identified are legal user identity information.
In one embodiment, the method for determining the identity information of the user to be identified includes the following steps that:
and if the data connection result is that the user name to be identified is legal and the password to be identified is illegal, determining that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determining that the user name to be identified and the new password to be identified are legal user identity information.
In one embodiment, before sending the data connection request to the operator server, the method includes:
sending a user registration request to an operator server; the user registration request carries a user name to be registered and a password to be registered;
receiving a registration result sent by an operator server;
and if the registration result is that the registration is successful, determining the user name to be registered and the password to be registered as the pre-stored user identity information.
In one embodiment, the receiving and identifying of the data connection result sent by the operator server based on the data connection request comprises:
receiving a result identifier which is sent by the operator server based on the data connection request and used for representing the data connection result;
and determining a data connection result corresponding to the result identification according to the corresponding relation between the preset result identification and the data connection result.
In one embodiment, the data connection request is a PDU session connection request.
A data connection apparatus comprising:
the first request sending module is used for sending a data connection request to an operator server; the data connection request carries identity information of a user to be identified;
the result receiving and identifying module is used for receiving and identifying a data connection result sent by the operator server based on the data connection request;
and the second request sending module is used for determining the legal user identity information according to the prestored user identity information under the condition that the data connection result is that the user identity information to be identified is illegal, and carrying the legal user identity information in a new data connection request to send the new data connection request to the operator server.
A terminal device comprising a memory storing a computer program and a processor implementing the following steps when executing the computer program:
sending a data connection request to an operator server; the data connection request carries the identity information of the user to be identified;
receiving and identifying a data connection result sent by the operator server based on the data connection request;
and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to the prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
sending a data connection request to an operator server; the data connection request carries the identity information of the user to be identified;
receiving and identifying a data connection result sent by the operator server based on the data connection request;
and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to the prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server.
According to the data connection method, the data connection device, the terminal equipment and the computer readable storage medium, the data connection request carrying the identity information of the user to be identified is sent to the operator server, the data connection result sent by the operator server based on the data connection request is received and identified, and under the condition that the data connection result is that the identity information of the user to be identified is illegal, the terminal equipment determines the legal user identity information according to the prestored user identity information, carries the legal user identity information in the new data connection request and sends the new data connection request to the operator server, so that data connection is carried out again by adopting the legal user identity information, the internet surfing is successful, and the problems that the data connection request is refused due to the input error of the user identity information and the internet surfing cannot be recovered are avoided.
Drawings
FIG. 1 is a diagram of an application environment of a data connection method in one embodiment;
FIG. 2 is a flow diagram illustrating a data connection method in one embodiment;
FIG. 3 is a flow diagram illustrating an embodiment of registering legitimate user identity information;
FIG. 4 is a flow diagram illustrating the identification of data connection results in one embodiment;
FIG. 5 is a block diagram of a data connection device in one embodiment;
fig. 6 is an internal configuration diagram of a terminal device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The data connection method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal device 102 communicates with the operator server 104 over a network. The terminal device 102 sends a data connection request carrying the identity information of the user to be identified to the operator server 104, receives and identifies a data connection result sent by the operator server 104 based on the data connection request, if the data connection result is that the identity information of the user to be identified is illegal, the terminal device 102 determines the identity information of the legal user according to the prestored user identity information, and carries the identity information of the legal user in a new data connection request to send to the operator server 104. The terminal device 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the operator server 104 may be implemented by an independent server or a server cluster formed by multiple servers.
In an embodiment, as shown in fig. 2, a data connection method is provided, which is described by taking the method as an example applied to the terminal device in fig. 1, and includes the following steps:
s210, sending a data connection request to an operator server.
The data connection request carries the identity information of the user to be identified. The identity information of the user to be identified is used for representing the identity information of the SIM card used by the terminal equipment, and the user manually inputs the identity information into the terminal equipment. Alternatively, the user identity information to be identified may be information such as a SIM card type, a user name (ID), a password, and the like.
In an optional embodiment, the terminal device sends a data connection request carrying the identity information of the user to be identified, such as a SIM card type, to the operator server, so that the operator server determines whether the identity information of the user to be identified sent by the terminal device is legal.
And S220, receiving and identifying a data connection result sent by the operator server based on the data connection request.
Optionally, the operator server receives the data connection request sent by the terminal device, determines whether the user identity information to be identified carried by the data connection request is legal, determines a data connection result according to the determination result, and feeds the data connection result back to the terminal device. For example, the operator server determines whether the type of the SIM card carried in the received data connection request is a pre-stored SIM card type, and if so, determines that the user identity information (SIM card type) to be identified carried in the data connection request sent by the terminal device is legal, determines that the data connection result is a successful connection, and sends the data connection result to the terminal device. If not, determining that the user identity information (SIM card type) to be identified carried in the data connection request sent by the terminal equipment is illegal, determining that the data connection fails, and sending the illegal user identity information to be identified as a data connection result to the terminal equipment. The terminal device receives and identifies a data connection result transmitted by the operator server based on the data connection request.
And S230, if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to the prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server.
The pre-stored user identity information is legal user identity information.
Optionally, if the data connection result is that the user identity information to be identified, that is, the SIM card type, is illegal, the terminal device obtains the pre-stored user identity information, that is, the legal SIM card type, and carries the legal SIM card type as the legal user identity information in a new data connection request, and sends the legal SIM card type to the operator server. If the data connection result is that the user identity information to be identified is legal, namely the SIM card type is legal, the terminal equipment can successfully surf the internet and perform data service.
In the embodiment, the terminal device sends a data connection request carrying user identity information to be identified to the operator server, receives and identifies a data connection result sent by the operator server based on the data connection request, and determines legal user identity information according to prestored user identity information under the condition that the data connection result is that the user identity information to be identified is illegal, and carries the legal user identity information in a new data connection request to be sent to the operator server, so that data connection is carried out again by adopting the legal user identity information, and the problem that the data connection request is rejected and the problem cannot be recovered to surf the internet due to the input error of the user identity information is avoided.
In an embodiment, the to-be-identified user identity information includes a to-be-identified user name and a to-be-identified password, and if the data connection result is that the to-be-identified user identity information is illegal in the above S230, determining the legal user identity information according to the pre-stored user identity information includes:
and if the data connection result is that the user name to be identified and/or the password to be identified are/is illegal, determining that the pre-stored user identity information is legal user identity information.
The pre-stored user identity information is legal user identity information registered by the terminal equipment in the operator server, the user identity information to be identified comprises a user name to be identified and a password to be identified, and correspondingly, the pre-stored user identity information is the legal user name registered by the terminal equipment in the operator server and the corresponding legal password.
Specifically, when the data connection result is that the user name to be identified is illegal, or the password to be identified is illegal, or both the user name to be identified and the password to be identified are illegal, the terminal device directly determines that the prestored user name and password are legal user identity information. For example, the user name to be identified is 111, the corresponding password to be identified is AAA, the pre-stored user name is 100, the corresponding pre-stored password is AAA, the data connection result obtained by the terminal device is that the user name to be identified 111 is illegal, and the terminal device determines the pre-stored user name 100 and the corresponding pre-stored password AAA as the legal user identity information.
In the embodiment, the user identity information to be identified comprises a user name to be identified and a password to be identified, no matter the data connection result is that the user to be identified is illegal, the password to be identified is illegal, or the user name to be identified and the password to be identified are both illegal, the terminal equipment directly determines the pre-stored user name and the corresponding pre-stored password as legal user identity information to send a new data connection request to the operator server by carrying the legal user identity information, thereby avoiding the connection permanent refusal caused by the terminal equipment repeatedly sending the data connection request by adopting the illegal user identity information, ensuring the legality of the user identity information because the pre-stored user identity information is the legal user name and the corresponding legal password registered by the terminal equipment in the operator server, enabling the terminal equipment to carry out data service, and recovering the problem that the terminal equipment cannot surf the internet because of the illegal user name and the password, and (5) successfully accessing the Internet.
In an embodiment, the determining, by the data connection result in S230, the valid user identity information according to the pre-stored user identity information includes:
and if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, determining that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determining that the new user name to be identified and the password to be identified are legal user identity information.
And if the data connection result is that the user name to be identified is legal and the password to be identified is illegal, determining that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determining that the user name to be identified and the new password to be identified are legal user identity information.
As mentioned above, the pre-stored user identity information is legal user identity information registered by the terminal device in the operator server, the user identity information to be identified includes a user name to be identified and a password to be identified, and accordingly, the pre-stored user identity information is the legal user name and the corresponding legal password registered by the terminal device in the operator server.
In an optional embodiment, if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, the terminal device selects a preset user name corresponding to a preset password which is the same as the password to be identified from the prestored user names as a new user to be identified, and uses the user name and the password to be identified as the legal user identity information. For example, the user name to be identified is 222, the corresponding password to be identified is BBB, the pre-stored user name is 200, the corresponding pre-stored password is BBB, the data connection result obtained by the terminal device is that the user name to be identified 222 is illegal, the password to be identified is legal, and the terminal device determines that the password to be identified BBB and the preset user name 200 corresponding to the preset password BBB that is the same as the password to be identified are legal user identity information.
In an optional embodiment, if the data connection result is that the user name to be identified is legal and the password to be identified is illegal, the terminal device selects a preset password corresponding to a preset user name that is the same as the user name to be identified from the pre-stored passwords as a new password to be identified, and uses the new password and the user name to be identified as the legal user identity information. For example, the user name to be identified is 300, the corresponding password to be identified is ABC, the pre-stored user name is 300, the corresponding pre-stored password is CCC, the data connection result obtained by the terminal device is that the user name 300 to be identified is legal, the password ABC to be identified is illegal, and the terminal device determines that the user name 300 to be identified and the preset password CCC corresponding to the preset user name 300 which is the same as the user name 300 to be identified are legal user identity information.
In this embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and when the data connection result is that the user to be identified is illegal and the password to be identified is legal, the terminal device determines that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determines that the new user name to be identified and the password to be identified are legal user identity information; and under the condition that the data connection result is that the user to be identified is legal and the password to be identified is illegal, the terminal equipment determines that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determines that the user name to be identified and the new password to be identified are legal user identity information. The pre-stored user identity information is a legal user name and a corresponding legal password which are registered by the terminal equipment in the operator server, the legality of the user identity information is ensured, a new data connection request is sent to the operator server by carrying the legal user identity information, and the permanent connection refusal caused by the fact that the terminal equipment repeatedly sends the data connection request by adopting illegal user identity information is avoided, so that the problem that the terminal equipment cannot surf the internet due to illegal passwords is recovered, and the internet is successfully surfed.
In an embodiment, the pre-stored user identity information is legal user identity information that the terminal device has registered in the operator server in advance, before S210, as shown in fig. 3, the method further includes:
s310, sending a user registration request to an operator server.
The user registration request carries a user name to be registered and a password to be registered.
Optionally, before the terminal device sends the data connection request to the operator server, the terminal device needs to perform legal registration of the user name and the password on the operator server in advance, and specifically, the terminal device sends a user registration request carrying the user name and the password to be registered to the operator server, so as to perform legal registration of the user name and the password on the operator server.
Optionally, the user registration request and the data connection request sent by the terminal device to the operator server are both PDU session connection requests.
And S320, receiving a registration result sent by the operator server.
Optionally, after receiving the user name to be registered and the corresponding password to be registered sent by the terminal device, the operator server performs a check and re-check on the user name to be registered to ensure the uniqueness of the user name to be registered in the operator server, performs a format check on the password to be registered to ensure the security of the password to be registered, determines a registration result according to the check and re-check result, and feeds the registration result back to the terminal device. If the user name to be registered passes the duplication checking and verification and the password to be registered passes the format checking and verification, the operator server determines that the registration result is successful; and if the user name to be registered does not pass the check and re-check and/or the password to be registered does not pass the format check, the operator server determines that the registration result is the registration failure. And the terminal equipment correspondingly receives a registration result obtained after the operator server performs the above-mentioned duplication checking and format checking on the user name to be registered and the corresponding password to be registered.
S330, if the registration result is that the registration is successful, determining the user name to be registered and the password to be registered as the pre-stored user identity information.
Specifically, if the registration result received by the terminal device is that the registration is successful, it is characterized that the user name to be registered carried in the user registration request sent by the terminal device to the operator server is different from the user name registered in the operator server, and the password to be registered reaches a preset security level, that is, the user name to be registered and the password to be registered carried in the user registration request are both legal user name and password, and the terminal device determines the user name to be registered and the password to be registered as pre-stored user identity information and stores the user name to be registered and the password to be registered in the terminal device.
In the embodiment, before sending the data connection request to the operator server, the terminal device sends a user registration request carrying a user name to be registered and a password to be registered to the operator server in advance, so as to carry out legal registration of the user name and the password on the operator server and receive the registration result returned by the operator server, determining the user name and password to be registered as the pre-stored user identity information when the registration result is that the registration is successful, to ensure the validity of the pre-stored user identity information, so that when the terminal equipment subsequently performs the data connection request and is rejected because the user identity information is illegal, carrying the legal user identity information to initiate a data connection request to the operator server again, and further, the terminal equipment is prevented from repeatedly sending data connection requests by adopting illegal user identity information to cause permanent connection refusal.
In an embodiment, to improve the efficiency of identifying the data connection result, as shown in fig. 4, the step S220 includes:
and S410, receiving a result identifier which is sent by the operator server based on the data connection request and used for representing the data connection result.
Wherein the result identifier is used for uniquely characterizing the data connection result, and optionally, the result identifier may be a number, a letter, and a combination of the number and the letter.
Optionally, the operator server determines, based on the data connection request, a data connection result indicating whether the user name to be identified and the password to be identified carried by the data connection request are legal, and determines a result identifier corresponding to the data connection result according to a correspondence between a pre-stored result identifier and the data connection result. For example, the correspondence between the pre-stored result identifier and the data connection result includes: the result identifier #29 indicates that the data connection result is a user authentication failure, i.e., the user name or password is illegal. And the operator server returns a result identifier #29 to the terminal equipment under the condition that the user name to be identified and/or the password to be identified are determined to be illegal. The terminal device receives a result identifier #29 sent by the operator server based on the data connection request and used for representing that the data connection result is the user authentication failure.
And S420, determining a data connection result corresponding to the result identification according to the corresponding relation between the preset result identification and the data connection result.
Optionally, the terminal device determines the data connection result corresponding to the received result identifier according to the same preset correspondence between the result identifier and the data connection result in the operator server. For example, the terminal device receives the result identifier #29, and determines the data connection result corresponding to the result identifier #29 as a user authentication failure according to the preset correspondence between the result identifier and the data connection result, that is, the user name or the password is illegal.
In this embodiment, the terminal device determines the data connection result corresponding to the result identifier according to the corresponding relationship between the preset result identifier and the data connection result by receiving the result identifier, which is sent by the operator server based on the data connection request and used for representing the data connection result, that is, the data connection result is determined by using the identification result identifier.
It should be understood that although the various steps in the flow diagrams of fig. 2-4 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not limited to being performed in the exact order illustrated and, unless explicitly stated herein, may be performed in other orders. Moreover, at least some of the steps in fig. 2-4 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 5, there is provided a data connection apparatus including: a first request sending module 501, a result receiving and identifying module 502 and a second request sending module 503, wherein:
the first request sending module 501 is configured to send a data connection request to an operator server; the data connection request carries identity information of a user to be identified;
the result receiving and identifying module 502 is used for receiving and identifying a data connection result sent by the operator server based on the data connection request;
the second request sending module 503 is configured to, when the data connection result is that the user identity information to be identified is illegal, determine legal user identity information according to the pre-stored user identity information, and send the legal user identity information to the operator server by carrying the legal user identity information in a new data connection request.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the second request sending module 503 is specifically configured to:
and if the data connection result is that the user name to be identified and/or the password to be identified are/is illegal, determining that the pre-stored user identity information is legal user identity information.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the second request sending module 503 is specifically configured to:
and if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, determining that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determining that the new user name to be identified and the password to be identified are legal user identity information.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the second request sending module 503 is specifically configured to:
and if the data connection result is that the user name to be identified is legal and the password to be identified is illegal, determining that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determining that the user name to be identified and the new password to be identified are legal user identity information.
In one embodiment, the first request sending module 501 is further configured to:
sending a user registration request to an operator server; the user registration request carries a user name to be registered and a password to be registered; receiving a registration result sent by an operator server; and if the registration result is that the registration is successful, determining the user name to be registered and the password to be registered as the pre-stored user identity information.
In one embodiment, the result receiving and identifying module 502 is specifically configured to:
receiving a result identifier which is sent by the operator server based on the data connection request and used for representing the data connection result; and determining a data connection result corresponding to the result identification according to the corresponding relation between the preset result identification and the data connection result.
In one embodiment, the data connection request is a PDU session connection request.
For specific definition of the data connection device, reference may be made to the definition of the data connection method above, and details are not described here. The various modules in the data connection apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a terminal device is provided, an internal structure of which may be as shown in fig. 6. The terminal equipment comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the terminal device is configured to provide computing and control capabilities. The memory of the terminal equipment comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The communication interface of the terminal device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a data connection method. The display screen of the terminal equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the terminal equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the terminal equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structure shown in fig. 6 is a block diagram of only a portion of the structure associated with the present application, and does not constitute a limitation on the terminal device to which the present application applies, and that a particular terminal device may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a terminal device comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program implementing the steps of:
sending a data connection request to an operator server; the data connection request carries the identity information of the user to be identified; receiving and identifying a data connection result sent by the operator server based on the data connection request; and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to the prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the processor executes the computer program to further implement the following steps:
and if the data connection result is that the user name to be identified and/or the password to be identified are/is illegal, determining that the pre-stored user identity information is legal user identity information.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the processor executes the computer program to further implement the following steps:
and if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, determining that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determining that the new user name to be identified and the password to be identified are legal user identity information.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the processor, when executing the computer program, further implements the following steps:
and if the data connection result is that the user name to be identified is legal and the password to be identified is illegal, determining that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determining that the user name to be identified and the new password to be identified are legal user identity information.
In one embodiment, the processor when executing the computer program further performs the steps of:
sending a user registration request to an operator server; the user registration request carries a user name to be registered and a password to be registered; receiving a registration result sent by an operator server; and if the registration result is that the registration is successful, determining the user name to be registered and the password to be registered as the pre-stored user identity information.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a result identifier which is sent by the operator server based on the data connection request and used for representing the data connection result; and determining a data connection result corresponding to the result identification according to the corresponding relation between the preset result identification and the data connection result.
In one embodiment, the data connection request is a PDU session connection request.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, performs the steps of:
sending a data connection request to an operator server; the data connection request carries the identity information of the user to be identified; receiving and identifying a data connection result sent by the operator server based on the data connection request; and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to the prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the computer program when executed by the processor further implements the following steps:
and if the data connection result is that the user name to be identified and/or the password to be identified are/is illegal, determining that the pre-stored user identity information is legal user identity information.
In one embodiment, the identity information of the user to be identified includes a user name to be identified and a password to be identified, and the computer program when executed by the processor further implements the following steps:
and if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, determining that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determining that the new user name to be identified and the password to be identified are legal user identity information.
In one embodiment, the identity information of the user to be identified includes a user name and a password to be identified, and the computer program when executed by the processor further implements the steps of:
and if the data connection result is that the user name to be identified is legal and the password to be identified is illegal, determining that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determining that the user name to be identified and the new password to be identified are legal user identity information.
In one embodiment, the computer program when executed by the processor further performs the steps of:
sending a user registration request to an operator server; the user registration request carries a user name to be registered and a password to be registered; receiving a registration result sent by an operator server; and if the registration result is that the registration is successful, determining the user name to be registered and the password to be registered as the pre-stored user identity information.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a result identifier which is sent by the operator server based on the data connection request and used for representing the data connection result; and determining a data connection result corresponding to the result identification according to the corresponding relation between the preset result identification and the data connection result.
In one embodiment, the data connection request is a PDU session connection request.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), for example.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for data connectivity, the method comprising:
sending a data connection request to an operator server; the data connection request carries identity information of a user to be identified;
receiving and identifying a data connection result sent by the operator server based on the data connection request;
and if the data connection result is that the user identity information to be identified is illegal, determining legal user identity information according to prestored user identity information, carrying the legal user identity information in a new data connection request, and sending the new data connection request to the operator server, wherein the prestored user identity information is legal user identity information.
2. The method according to claim 1, wherein the user identity information to be recognized includes a user name to be recognized and a password to be recognized, and if the data connection result indicates that the user identity information to be recognized is illegal, determining legal user identity information according to prestored user identity information includes:
and if the data connection result is that the user name to be identified and/or the password to be identified are/is illegal, determining that the pre-stored user identity information is the legal user identity information.
3. The method according to claim 1, wherein the user identity information to be recognized includes a user name to be recognized and a password to be recognized, and if the data connection result indicates that the user identity information to be recognized is illegal, determining legal user identity information according to prestored user identity information includes:
and if the data connection result is that the user name to be identified is illegal and the password to be identified is legal, determining that the preset user name corresponding to the preset password which is the same as the password to be identified is a new user name to be identified, and determining that the new user name to be identified and the password to be identified are the legal user identity information.
4. The method according to claim 1, wherein the user identity information to be recognized includes a user name to be recognized and a password to be recognized, and if the data connection result indicates that the user identity information to be recognized is illegal, determining legal user identity information according to prestored user identity information includes:
and if the data connection result indicates that the user name to be identified is legal and the password to be identified is illegal, determining that the preset password corresponding to the preset user name which is the same as the user name to be identified is a new password to be identified, and determining that the user name to be identified and the new password to be identified are the legal user identity information.
5. The method of claim 1, wherein prior to sending the data connection request to the operator server, comprising:
sending a user registration request to the operator server; the user registration request carries a user name to be registered and a password to be registered;
receiving a registration result sent by the operator server;
and if the registration result is that the registration is successful, determining the user name to be registered and the password to be registered as the pre-stored user identity information.
6. The method of any of claims 1-5, wherein the receiving and identifying the data connection result sent by the operator server based on the data connection request comprises:
receiving a result identifier which is sent by the operator server based on the data connection request and used for representing a data connection result;
and determining the data connection result corresponding to the result identification according to the corresponding relation between the preset result identification and the data connection result.
7. The method according to any of claims 1-5, wherein the data connection request is a PDU session connection request.
8. A data connection apparatus, characterized in that the apparatus comprises:
the first request sending module is used for sending a data connection request to an operator server; the data connection request carries identity information of a user to be identified;
a result receiving and identifying module for receiving and identifying a data connection result sent by the operator server based on the data connection request;
and the second request sending module is used for determining legal user identity information according to prestored user identity information under the condition that the data connection result is that the user identity information to be identified is illegal, carrying the legal user identity information in a new data connection request and sending the new data connection request to the operator server, wherein the prestored user identity information is legal user identity information.
9. A terminal device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method according to any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202110268033.4A 2021-03-12 2021-03-12 Data connection method, device, terminal equipment and computer readable storage medium Active CN113114623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110268033.4A CN113114623B (en) 2021-03-12 2021-03-12 Data connection method, device, terminal equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110268033.4A CN113114623B (en) 2021-03-12 2021-03-12 Data connection method, device, terminal equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN113114623A CN113114623A (en) 2021-07-13
CN113114623B true CN113114623B (en) 2022-09-06

Family

ID=76711158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110268033.4A Active CN113114623B (en) 2021-03-12 2021-03-12 Data connection method, device, terminal equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113114623B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113840275B (en) * 2021-09-18 2023-07-07 中国联合网络通信集团有限公司 Terminal session connection confirmation method, USIM, terminal, equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106535157A (en) * 2016-09-22 2017-03-22 维沃移动通信有限公司 Communication method based on virtual user identity card and mobile terminal
CN111918289A (en) * 2020-09-02 2020-11-10 中国联合网络通信集团有限公司 Terminal access method, device and server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468460A (en) * 2013-09-12 2015-03-25 方正宽带网络服务股份有限公司 Automatic authentication apparatus for network access and automatic authentication method for network access
CN106211127B (en) * 2016-06-29 2019-10-29 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN109286932B (en) * 2017-07-20 2021-10-19 阿里巴巴集团控股有限公司 Network access authentication method, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106535157A (en) * 2016-09-22 2017-03-22 维沃移动通信有限公司 Communication method based on virtual user identity card and mobile terminal
CN111918289A (en) * 2020-09-02 2020-11-10 中国联合网络通信集团有限公司 Terminal access method, device and server

Also Published As

Publication number Publication date
CN113114623A (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN111092899B (en) Information acquisition method, device, equipment and medium
CN110691085B (en) Login method, login device, password management system and computer readable medium
US10509893B2 (en) Method for authenticating a user and corresponding user devices, server and system
KR102535312B1 (en) Information processing method, information processing device, program and information processing terminal
CN109286933B (en) Authentication method, device, system, computer equipment and storage medium
CN114257440B (en) Network function service discovery method, system and storage medium
CN111291345A (en) Voiceprint data processing method and device, computer equipment and storage medium
CN108737398B (en) Processing method and device of trust system, computer equipment and storage medium
CN114339755A (en) Registration verification method and device, electronic equipment and computer readable storage medium
CN113114623B (en) Data connection method, device, terminal equipment and computer readable storage medium
CN112272093B (en) Token management method, electronic equipment and readable storage medium
CN111371755B (en) Voiceprint data processing method and device, computer equipment and storage medium
CN116915493A (en) Secure login method, device, system, computer equipment and storage medium
CN111898110A (en) Method, device, server and storage medium for acquiring user identity information
CN111400684A (en) Electronic certificate information acquisition method, system, device, equipment and storage medium
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN116233847A (en) Login method, login device, computer equipment and storage medium
KR101221728B1 (en) The certification process server and the method for graphic OTP certification
CN112543194B (en) Mobile terminal login method and device, computer equipment and storage medium
EP3926992B1 (en) Electronic device, and authentication method in electronic device
CN106533685B (en) Identity authentication method, device and system
CN113873450A (en) Short message configuration method and device, computer equipment and storage medium
CN112260997A (en) Data access method and device, computer equipment and storage medium
CN112688943B (en) Dynamic password generation method, server, terminal device and storage medium
JP4671686B2 (en) Network file system and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant