CN114390495A - Mobile terminal network communication substitution system and method - Google Patents
Mobile terminal network communication substitution system and method Download PDFInfo
- Publication number
- CN114390495A CN114390495A CN202111548774.4A CN202111548774A CN114390495A CN 114390495 A CN114390495 A CN 114390495A CN 202111548774 A CN202111548774 A CN 202111548774A CN 114390495 A CN114390495 A CN 114390495A
- Authority
- CN
- China
- Prior art keywords
- data
- mobile terminal
- agent application
- http request
- application system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A mobile terminal network communication substitution system and method, the system includes: the system comprises a mobile terminal, a network agent application system and a background service system, wherein the mobile terminal and the network agent application system are connected through near field communication; the mobile terminal is used for sending a corresponding http request to the network agent application system through near field communication when the http request needs to be carried out in the process of downloading the code number through the LPA, receiving data returned by the network agent application system, and completing the http agent request; the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request, and returning data returned by the background service system to the mobile terminal through near field communication; and after receiving the http request, the background service system returns corresponding result data based on the http request. The mobile terminal does not need to preset a code number, so that the cost of the terminal equipment can be greatly saved.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a mobile terminal network communication substitution system and a mobile terminal network communication substitution method.
Background
In recent years, with the rapid development of the internet of things, more and more terminal devices need to access the internet of things. However, many terminal devices do not have networking capability when leaving the factory, and an ESIM is usually preset, and a code number needs to be downloaded through an LPA and then activated to perform networking. In a common practice, a code number capable of accessing the internet needs to be written on a preset ESIM for networking, and then another code number is downloaded through an LPA and activated for accessing the internet, which greatly increases the cost of the terminal equipment.
Disclosure of Invention
In view of the technical defects and technical drawbacks in the prior art, embodiments of the present invention provide a mobile terminal network communication replacement system and method that overcome the above problems or at least partially solve the above problems, and the specific solution is as follows:
as a first aspect of the present invention, there is provided a mobile terminal network communication substitution system, the system comprising: the system comprises a mobile terminal, a network agent application system and a background service system, wherein the mobile terminal and the network agent application system are communicated through a near field;
the mobile terminal is used for sending a corresponding http request to the network agent application system through near field communication when the http request needs to be carried out in the process of downloading the code number through the LPA, receiving data returned by the network agent application system, and completing the http agent request;
the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request, and returning data returned by the background service system to the mobile terminal through near field communication;
and after receiving the http request, the background service system returns corresponding result data based on the http request.
Further, the mobile terminal is specifically configured to:
in the process of downloading the code number through the LPA, when an http request needs to be carried out, corresponding http request data are spliced into json character strings and are converted into byte arrays, then the data are encrypted by using a fixed secret key which is negotiated with a network agent application system in advance, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, the total length of the data and the current packet number of the data are added in front of each group of data, and then the data are packetized and sent to the network agent application system and wait for the returned data of the network agent application system.
Further, the network broker application system is specifically configured to:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a key negotiated with the mobile terminal in advance, converting the decrypted data into json character strings, assembling the json character strings into http requests, sending the http requests to a background service system, and acquiring return data of the background service system;
data returned by a background service system are spliced into json character strings and converted into byte arrays, then the data are encrypted by using a pre-negotiated fixed secret key, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, a total data length and a current data packet number are added to the front of each group of data, and then the data are packetized and sent to a mobile terminal.
Further, the mobile terminal is further configured to:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a pre-negotiated key, converting the data into a json character string, and completing a proxy request of http.
Further, the near field communication includes bluetooth communication, zigbee communication, or infrared communication.
As a second aspect of the present invention, there is provided a mobile terminal network communication alternative method, the method comprising:
step 1, in the process of downloading a code number by a mobile terminal through an LPA (low power access), when an http request needs to be carried out, sending a corresponding http request to a network agent application system through near field communication;
step 2, the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request;
step 3, after receiving the http request, the background service system returns corresponding result data based on the http request;
step 4, the network agent application returns the data returned by the background service system to the mobile terminal through the near field communication,
and 5, the mobile terminal receives data returned by the network agent application system and completes an http agent request.
Further, step 1 specifically includes:
in the process of downloading the code number through the LPA, when an http request needs to be carried out, corresponding http request data are spliced into json character strings and are converted into byte arrays, then the data are encrypted by using a fixed key which is negotiated with a network agent application system in advance, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, the total length of the data and the current packet number of the data are added in front of each group of data, and then the data are packetized and sent to the network agent application system and wait for the returned data of the network agent application system.
Further, step 2 specifically includes:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the sub-packaged data, the network agent application system calculates whether CRC is correct, then decrypts the data through a key negotiated with the mobile terminal in advance, converts the decrypted data into json character strings, assembles the json character strings into an http request, sends the http request to the background service system, and waits for the return data of the background service system.
Further, step 4 specifically includes:
the network agent application system assembles data returned by the background service system into json character strings and converts the json character strings into byte arrays, then encrypts the data by using a pre-negotiated fixed secret key, adds CRC (cyclic redundancy check) to the encrypted data, then splits the data, adds a fixed head identifier, the total length of the data and the current packet number of the data in front of each group of data, and then packetizes and sends the data to the mobile terminal.
Further, step 5 specifically includes:
when receiving data, the mobile terminal firstly judges whether the data is a fixed head identifier, if not, the data is discarded, if so, the data is received and the total length of the data is judged, the data is the number of packets currently, and the data is assembled based on the number of the packets of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a pre-negotiated key, converting the data into a json character string, and completing a proxy request of http.
The invention has the following beneficial effects:
in the process of downloading the code number by the LPA, the mobile terminal sends http request data to the network agent application system through the Bluetooth, the network agent application system sends the request to the background service system through the network capacity of the mobile terminal after receiving the request, and then returns the returned data to the mobile terminal through the Bluetooth.
Drawings
Fig. 1 is a block diagram of a mobile terminal network communication alternative system according to an embodiment of the present invention;
fig. 2 is a flowchart of an alternative method for mobile terminal network communication according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As a first embodiment of the present invention, there is provided a mobile terminal network communication substitution system including: the system comprises a mobile terminal, a network agent application system and a background service system, wherein the mobile terminal and the network agent application system are communicated through a near field;
the mobile terminal is used for sending a corresponding http request to a network agent application system through near field communication when the http request is required in the process of downloading the code number through the LPA, wherein the http request comprises an http request address and parameters, receiving result data returned by the network agent application system, and completing the proxy request of http, and the http request comprises relevant information of the code number to be downloaded;
the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request, and returning data returned by the background service system to the mobile terminal through near field communication;
after receiving the http request, the background service system returns corresponding result data based on the http request and returns the result data to the network agent application system,
after the mobile terminal receives the result data, the LPA processes the returned result and writes the code number to the card.
The invention has the advantages that when the mobile terminal needs to carry out http request in the process of downloading the code number through the LPA, the http request data is sent to the network agent application system through the Bluetooth, the network agent application system sends the request to the background service system through the network capacity of the mobile terminal after receiving the request, and then the returned data is returned to the mobile terminal through the Bluetooth, and the mobile terminal does not need to preset the code number, so that the cost of the terminal equipment can be greatly saved.
Wherein the mobile terminal is specifically configured to:
in the process of downloading the code number through the LPA, when an http request needs to be carried out, corresponding http request data are spliced into json character strings and are converted into byte arrays, then the data are encrypted by using a fixed secret key which is negotiated with a network agent application system in advance, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, the total length of the data and the current packet number of the data are added in front of each group of data, and then the data are packetized and sent to the network agent application system and wait for the returned data of the network agent application system.
Wherein the network proxy application system is specifically configured to:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a key negotiated with the mobile terminal in advance, converting the decrypted data into json character strings, assembling the json character strings into http requests, sending the http requests to a background service system, and acquiring return data of the background service system;
data returned by a background service system are spliced into json character strings and converted into byte arrays, then the data are encrypted by using a pre-negotiated fixed secret key, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, a total data length and a current data packet number are added to the front of each group of data, and then the data are packetized and sent to a mobile terminal.
Wherein the mobile terminal is further configured to:
when receiving data, firstly judging whether the data is a fixed head mark, if so, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a pre-negotiated key, converting the data into a json character string, and completing a proxy request of http.
As a second embodiment of the present invention, there is provided a mobile terminal network communication substitution method including:
step 1, in the process of downloading a code number through an LPA (low power access), when an http request needs to be carried out, a mobile terminal sends a corresponding http request to a network agent application system through near field communication;
step 2, the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request;
step 3, after receiving the http request, the background service system returns a code number for activating the internet access function of the corresponding mobile terminal to the network agent application system;
step 4, the network agent application returns the data returned by the background service system to the mobile terminal through the near field communication,
and 5, the mobile terminal receives data returned by the network agent application system and completes an http agent request.
Fig. 2 is a flowchart of a bluetooth proxy network according to the present invention, as shown in fig. 2, when a mobile terminal needs to perform a network request in a process of downloading a code number through an LPA, data is assembled and encrypted and then sent to a network proxy application system, after receiving the data, the network proxy performs data assembly and decryption, and then sends the data to a background service system, and after receiving data returned by the background service system, the data is assembled and encrypted and then sent to the mobile terminal.
The detailed steps are shown in FIG. 2, and the specific process is as follows:
step a, a mobile terminal downloads a code number through an LPA (Low-power-architecture), assembles data into json and converts the json into a byte array when a network request is needed, encrypts the json by using a previously negotiated fixed key, adds CRC (Cyclic redundancy check), splits the data, adds a fixed head identifier before each group of data, and sends the sub-packets to a network agent application system after the total length of the data is the current data is a few packets, and waits for return.
Step b, after the network agent application system receives the data, firstly judging whether the data is the correct fixed head identification, if not, discarding the data, if so, judging the total length of the data, and the data is the number of packets currently to assemble the data
And c, after receiving a group of complete data, the network agent application system calculates whether the CRC is correct or not, and then decrypts the data through the previously negotiated secret key.
And d, converting the decrypted data into json by the network agent application system, assembling an http request, sending the http request to the background service system, and acquiring the return of the server.
And e, the network agent application system assembles the returned data into json and converts the json into byte arrays, adds CRC (cyclic redundancy check) after encrypting by using the previously negotiated fixed key, splits the data, adds a fixed head identifier and a total length of the data before each group of data, and then packages and sends the data to the mobile terminal.
And f, after receiving the data, the mobile terminal firstly judges whether the data is the fixed head identification, if not, the data is discarded, if so, the total length of the data is judged, and the data is the packet number currently to assemble the data.
And step g, after receiving a group of complete data, the mobile terminal calculates whether the CRC is correct, then decrypts the data through the previously negotiated secret key, converts the data into json, and receives the proxy request for completing http.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (10)
1. A mobile terminal network communication substitution system, the system comprising: the system comprises a mobile terminal, a network agent application system and a background service system, wherein the mobile terminal and the network agent application system are connected through near field communication;
the mobile terminal is used for sending a corresponding http request to the network agent application system through near field communication when the http request needs to be carried out in the process of downloading the code number through the LPA, receiving data returned by the network agent application system, and completing the http agent request;
the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request, and returning data returned by the background service system to the mobile terminal through near field communication;
and after receiving the http request, the background service system returns corresponding result data based on the http request.
2. The system according to claim 1, wherein the mobile terminal is specifically configured to:
in the process of downloading the code number through the LPA, when an http request needs to be carried out, corresponding http request data are spliced into json character strings and are converted into byte arrays, then the data are encrypted by using a fixed secret key which is negotiated with a network agent application system in advance, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, the total length of the data and the current packet number of the data are added in front of each group of data, and then the data are packetized and sent to the network agent application system and wait for the returned data of the network agent application system.
3. The mobile terminal network communication substitution system of claim 2, wherein the network proxy application system is specifically configured to:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a key negotiated with the mobile terminal in advance, converting the decrypted data into json character strings, assembling the json character strings into http requests, sending the http requests to a background service system, and acquiring return data of the background service system;
data returned by a background service system are spliced into json character strings and converted into byte arrays, then the data are encrypted by using a pre-negotiated fixed secret key, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, a total data length and a current data packet number are added to the front of each group of data, and then the data are packetized and sent to a mobile terminal.
4. The mobile terminal network communication substitution system of claim 3, wherein the mobile terminal is further configured to:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a pre-negotiated key, converting the data into a json character string, and completing a proxy request of http.
5. The mobile terminal network communication substitution system according to claim 3, wherein said near field communication includes Bluetooth communication, zigbee communication, or infrared communication.
6. A mobile terminal network communication substitution method, characterized in that the method comprises:
step 1, in the process of downloading a code number through an LPA (low power access), when an http request needs to be carried out, a mobile terminal sends a corresponding http request to a network agent application system through near field communication;
step 2, the network agent application system is used for sending the http request to the background service system through self network communication after receiving the http request;
step 3, after receiving the http request, the background service system returns corresponding result data to the network agent application system based on the http request;
step 4, the network agent application returns the data returned by the background service system to the mobile terminal through the near field communication,
and 5, the mobile terminal receives data returned by the network agent application system and completes an http agent request.
7. The mobile terminal network communication substitution method according to claim 5, wherein step 1 specifically comprises:
when the mobile terminal needs to carry out an http request in the process of downloading the code number through the LPA, corresponding http request data are spliced into json character strings and are converted into byte arrays, then the data are encrypted by using a fixed key which is negotiated with a network agent application system in advance, CRC (cyclic redundancy check) is added to the encrypted data, then the data are split, a fixed head identifier, the total length of the data and the current packet number of the data are added in front of each group of data, and then the data are packetized and sent to the network agent application system and wait for the returned data of the network agent application system.
8. The mobile terminal network communication substitution method according to claim 7, wherein the step 2 specifically comprises:
when receiving data, firstly judging whether the data is a fixed head mark, if not, discarding the data, if so, receiving the data and judging the total length of the data, wherein the data is the packet number currently, and assembling the data based on the packet number of the data;
after receiving all the sub-packaged data, the network agent application system calculates whether CRC is correct, then decrypts the data through a key negotiated with the mobile terminal in advance, converts the decrypted data into json character strings, assembles the json character strings into an http request, sends the http request to the background service system, and waits for the return data of the background service system.
9. The mobile terminal network communication substitution method according to claim 7, wherein step 4 specifically comprises:
the network agent application system assembles data returned by the background service system into json character strings and converts the json character strings into byte arrays, then encrypts the data by using a pre-negotiated fixed secret key, adds CRC (cyclic redundancy check) to the encrypted data, then splits the data, adds a fixed head identifier, the total length of the data and the current packet number of the data in front of each group of data, and then packetizes and sends the data to the mobile terminal.
10. The mobile terminal network communication substitution method according to claim 8, wherein step 5 specifically comprises:
when receiving data, the mobile terminal firstly judges whether the data is a fixed head identifier, if not, the data is discarded, if so, the data is received and the total length of the data is judged, the data is the number of packets currently, and the data is assembled based on the number of the packets of the data;
after receiving all the data of the sub-packets, calculating whether the CRC is correct, then decrypting the data through a pre-negotiated key, converting the data into a json character string, and completing a proxy request of http.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111548774.4A CN114390495A (en) | 2021-12-17 | 2021-12-17 | Mobile terminal network communication substitution system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111548774.4A CN114390495A (en) | 2021-12-17 | 2021-12-17 | Mobile terminal network communication substitution system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114390495A true CN114390495A (en) | 2022-04-22 |
Family
ID=81198750
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111548774.4A Pending CN114390495A (en) | 2021-12-17 | 2021-12-17 | Mobile terminal network communication substitution system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114390495A (en) |
-
2021
- 2021-12-17 CN CN202111548774.4A patent/CN114390495A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10785020B2 (en) | Hardware offload for QUIC connections | |
US9167420B2 (en) | Mobile terminal system | |
CN106209726B (en) | Mobile application single sign-on method and device | |
CN105430640B (en) | A kind of SMS encryption authentication method, terminal and system | |
CN107104929B (en) | Method, device and system for defending network attack | |
CN111083161A (en) | Data transmission processing method and device and Internet of things equipment | |
CN110771116B (en) | Method, device, storage medium and system for identifying encrypted data stream | |
CN110620762A (en) | RDMA (remote direct memory Access) -based data transmission method, network card, server and medium | |
WO2008035183A2 (en) | Method, server and mobile station for transfering data from the server to the mobile station. | |
CN107294913A (en) | Safety communicating method, service end and client based on HTTP | |
US10419212B2 (en) | Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols | |
CN107154917B (en) | Data transmission method and server | |
CN114157649A (en) | Reliable data transmission method and device, computer equipment and storage medium | |
CN112954048A (en) | Internet of things system based on internet of things encryption gateway | |
CN113613227B (en) | Data transmission method and device of Bluetooth equipment, storage medium and electronic device | |
US20200092268A1 (en) | Decoding method and apparatus | |
EP3328014A1 (en) | Data packet transmission method, apparatus, node device, and system | |
CN113179229A (en) | Verification method, verification device, storage medium and electronic equipment | |
CN114390495A (en) | Mobile terminal network communication substitution system and method | |
TW200807988A (en) | Configuring a host device by way of MMP | |
CN113596742B (en) | Data transmission method and device | |
CN107343001B (en) | Data processing method and device | |
CN111262837B (en) | Data encryption method, data decryption method, system, equipment and medium | |
Schmitt | Secure data transmission in wireless sensor networks | |
CN112637069B (en) | Data message transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |