CN117354800A - Communication method, terminal equipment and computer readable storage medium - Google Patents
Communication method, terminal equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN117354800A CN117354800A CN202311242990.5A CN202311242990A CN117354800A CN 117354800 A CN117354800 A CN 117354800A CN 202311242990 A CN202311242990 A CN 202311242990A CN 117354800 A CN117354800 A CN 117354800A
- Authority
- CN
- China
- Prior art keywords
- client
- communication
- base station
- server
- communication module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 273
- 230000006854 communication Effects 0.000 title claims abstract description 273
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000013475 authorization Methods 0.000 claims abstract description 97
- 238000012545 processing Methods 0.000 claims description 77
- 238000012795 verification Methods 0.000 claims description 36
- 238000004590 computer program Methods 0.000 claims description 19
- 238000012790 confirmation Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 13
- 230000008569 process Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 238000011161 development Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application is applicable to the technical field of communication, and provides a communication method, terminal equipment and a computer readable storage medium, wherein the method comprises the following steps: the communication method is applied to a communication system, the communication system comprises a first client, a second client and a service end, the first client is respectively connected with the user end and the second client, and the communication method comprises the following steps: the first client acquires authorization information from the server, wherein the authorization information is used for authorizing communication between the second client and the base station of the server, the first client and the second client establish communication connection in a near field communication mode, after the first client and the second client establish communication connection, the first client sends the authorization information to the second client, and the second client establishes communication connection with the base station corresponding to the server according to the authorization information. By the method, the working efficiency can be improved, and the risk of data leakage can be reduced.
Description
Technical Field
The present application belongs to the field of communication technologies, and in particular, relates to a communication method, a device, a terminal device, and a computer readable storage medium.
Background
With the rapid development of the Internet of things era, such as an embedded chip, the development of various fields of the Internet of things is greatly promoted due to the unique advantages of supporting large-scale equipment management, adapting to more Internet of things terminals and the like, and the embedded chip plays an increasingly important role in the Internet of things era.
However, in the prior art, after the pairing is successful, the authorization data is input into the embedded chip for authorization, and the bluetooth pairing takes a certain time, so that the working efficiency is low, and the risk of revealing data by radio waves is relatively high due to the longer transmissible distance of the bluetooth.
Disclosure of Invention
The embodiment of the application provides a communication method, terminal equipment and a computer readable storage medium, which can improve the working efficiency and reduce the risk of data leakage.
In a first aspect, an embodiment of the present application provides a communication method, including:
the first client acquires authorization information from the server, wherein the authorization information is used for authorizing communication between the second client and a server base station;
the first client and the second client establish communication connection in a near field communication mode;
After the first client establishes communication connection with the second client, the first client sends the authorization information to the second client;
and the second client establishes communication connection with the base station corresponding to the server according to the authorization information.
In this embodiment of the present application, the first client may obtain authorization information from a corresponding server, after the first client and the second client establish communication connection through near field communication, the first client may send the authorization information obtained from the server to the second client, and the second client may activate the second client through the authorization information, so that the second client may establish communication connection with a base station of the server, and the server may operate the second client. In other words, the first client which has normally operated acquires the authorization information through the server, then sends the authorization information to the second client which establishes communication connection with the first client through the near field communication, and finally the second client can establish communication with the base station of the server through the authorization information. By the method, the working efficiency of authorizing the second client can be improved, and the risk of data leakage can be reduced.
In a possible implementation manner of the first aspect, the obtaining, by the first client, authorization information from the server includes:
the server side obtains the identity information of the first client side;
the server verifies according to the identity information of the first client and preset identity information stored in the server;
and if the identity information of the first client is successfully verified with the preset identity information stored in the server, the first client acquires authorization information from the service.
In the embodiment of the application, the server side verifies the identity information of the first client side, verifies the validity of the identity information of the first client side, and can send the authorization information to the first client side after verification. By the method, the illegal molecule can be prevented from acquiring the authorization information so as to influence the security of the authorization information.
In a possible implementation manner of the first aspect, the first client further includes a first communication module and a first signal processing module, where the first signal processing module is connected to the first communication module;
the second client comprises a second communication module and a second signal processing module, and the second signal processing module is connected with the second communication module;
The communication connection is established between the first client and the second client in a communication mode of near field communication, and the communication connection comprises the following steps:
the first signal processing module sends a first instruction to the first communication module;
after the first communication module receives the first instruction, a second instruction is sent to a second communication module in the second client;
and after the second communication module of the second client receives the second instruction, communication connection is established with the first communication module of the first client according to the second instruction.
In the embodiment of the application, the two clients establish communication connection by adopting a near field communication mode so as to transmit data, and the communication distance of the near field communication is short and the communication establishment speed is high. By the mode, the risk of data leakage of radio waves can be reduced, and communication efficiency can be improved.
In a possible implementation manner of the first aspect, the establishing a communication connection with a first communication module of the first client according to the second instruction includes:
the second communication module detects a second instruction sent by the first communication module within a preset distance;
and if the second communication module detects a second instruction sent by the first communication module within a preset distance, the second communication module replies a confirmation command to the first communication module, and communication connection is established with the first communication module of the first client.
In a possible implementation manner of the first aspect, the second client includes a first chip, the second client further includes a second signal processing module, and the second client establishes a communication connection with a base station corresponding to the server according to the authorization information, including:
the second communication module sends the authorization information to the second signal processing module;
the second signal processing module writes the authorization information into the first chip;
and the second client establishes communication connection with the base station corresponding to the server according to the authorization information written in the first chip.
In the embodiment of the application, the authorization information can be written into the esim chip through the NFC communication module and the processing module, and compared with the prior method of writing data into the esim chip through Bluetooth, the method of the application is simpler and more reliable.
In a possible implementation manner of the first aspect, the communication system further includes a base station corresponding to the server; the client also comprises a third communication module; the second client establishes communication connection with the base station corresponding to the server according to the authorization information written in the first chip, and the method comprises the following steps:
The second signal processing module establishes communication connection with a base station corresponding to the server through the third communication module;
after the second signal processing module establishes communication connection with the base station corresponding to the service end through the third communication module, the second signal processing module sends the identity information of the second client to the base station through the third communication module;
the base station verifies the identity information of the second client and sends the verification information to the second client;
and the second client establishes communication connection with the service end base station according to the verification information.
In a possible implementation manner of the first aspect, the establishing, by the second client, a communication connection with the serving base station according to the authentication information includes:
if the identity information of the second client is the same as the identity information of the first client, the verification information is verification passing;
the base station sends the verification information passing the verification to the second client;
and the second client establishes communication connection with the base station after receiving the verification information which is transmitted by the base station and passes the verification.
In the embodiment of the application, the server performs authentication of the identity information again for the second client to be in communication connection with, and after the authentication is passed, the second client can be allowed to establish communication with the server. By the method, the security of the authorization data is further improved.
In a possible implementation manner of the first aspect, after the second client establishes a communication connection with the base station after receiving the verification information that passes the verification sent by the base station, the method further includes:
and the base station adds the second client into an operation list so that the service end carries out operation processing on the second client.
In a second aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the communication method according to any one of the first aspects when executing the computer program.
In a third aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program which, when executed by a processor, implements a communication method as in any one of the first aspects above.
In a fifth aspect, embodiments of the present application provide a computer program product, which, when run on a terminal device, causes the terminal device to perform the communication method according to any one of the first aspects.
It will be appreciated that the advantages of the second to fifth aspects may be found in the relevant description of the first aspect, and are not described here again.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required for the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a system block diagram of a communication system provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of a communication method provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of establishing near field communication according to an embodiment of the present application;
fig. 4 is a schematic flow chart of client authorization provided in an embodiment of the present application;
FIG. 5 is a block diagram of a client communication system provided by an embodiment of the present application;
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system configurations, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
In addition, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used merely to distinguish between descriptions and are not to be construed as indicating or implying relative importance.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise.
With the rapid development of the internet of things era, the embedded chip (embedded subscriber identity module, esim) has greatly promoted the development of various fields of the internet of things because of the unique advantages of supporting large-scale equipment management and adapting to more internet of things terminals and the like, and plays an increasingly important role in the internet of things era.
For the prior art, if a user needs to use a mobile communication service provided by an operator, an authorized SIM card (subscriber identity module, SIM) provided by the operator or esim already integrated on a mobile phone motherboard is required to be used to write authorization information of the operator, when the user holds other electronic devices which also need to use the mobile network of the operator, if the electronic device only has a physical SIM card slot, the user needs to apply a SIM sub-card to the operator and then assemble the electronic device to a SIM card slot of a device which needs to use the mobile network, if the electronic device supports the esim function, then operation data writing is performed on an esim chip inside the electronic device after matching is successful by using bluetooth on the mobile phone and bluetooth of the device by using APP provided by the operator on the mobile phone, so that the electronic device can normally connect to the network of the operator.
For the first mode of applying for the entity sub-card, obviously, the mode is most troublesome, the user needs to go to the corresponding operator business hall to handle, and after the user successfully handles the entity sub-card, the user needs to insert the entity sub-card into the sim card slot of the electronic equipment, so that the user can normally connect to the operator network, and if the operator network needs to be replaced, the user needs to go to other operator business halls again to handle the sim card, so that the time and effort are wasted, and the original sim card is waste after the operator is changed, so that the earth environment is influenced. In the second way, although the introduced esim chip form which can be recycled replaces the original sim card, bluetooth needs to be supported by the corresponding electronic equipment, and the data writing of the esim chip can be completed only by the operation of the related complex mobile phone end, so that bluetooth pairing can take a certain time, bluetooth is a wireless communication protocol working on a 2.4G frequency band, the transmission distance can reach 100 meters at maximum, and the relatively large-area radio wave is easy to monitor signals, thereby bringing convenience to lawbreakers to monitor signals and crack information.
In order to solve the problems in the prior art, the present application provides a communication method, in the present application, a first client obtains authorization information through a server, then sends the authorization information to a second client that establishes communication connection with the first client through NFC, and finally the second client can establish communication with a base station of the server through the authorization information. By the method, the work efficiency of the esim authorization can be improved, and the risk of data leakage can be reduced.
Referring to fig. 1, a system block diagram of a communication system according to an embodiment of the present application is provided. In the communication system, the first client 11 and the second client 12 can establish communication connection in an NFC mode, and the first client 11 sends authorization information acquired by the server 12 to the second client 12 to authorize the second client 12.
Referring to fig. 2, which is a schematic flow chart of a communication method according to an embodiment of the present application, by way of example and not limitation, the method may include the following steps:
s101, the first client side obtains authorization information from the server side, wherein the authorization information is used for carrying out communication authorization on the second client side and a server side base station.
In this embodiment of the present application, the first client may be a personal mobile phone, and the service end refers to a network communication service platform provided by an operator or a carrier, which is responsible for processing authorization requests and communication management of the client. While the second client may refer to an electronic device such as a sports watch or the like that contains esim. An application on a personal handset (i.e., a first client) obtains from the server authorization information obtained for authorizing another client (a second client) to communicate with the server base station. Specifically, the personal mobile app obtains an authorization credential from the server, and the authorization credential allows other devices (such as a sports watch, etc. as a second client) to obtain the right to communicate with the server base station by verifying the authorization credential.
In one embodiment, step S101 includes:
the server acquires the identity information of the first client, the server verifies the identity information of the first client with the preset identity information stored in the server according to the identity information of the first client, and if the identity information of the first client is successfully verified with the preset identity information stored in the server, the first client acquires authorization information from the service.
In this embodiment of the present application, after a connection is established between a first client and a server, the server may acquire identity information of the client, the server may verify and compare the acquired identity information of the client with the identity information stored in advance in the server, and if the identity information of the client and the preset identity information stored in the server are matched and verified, the server may provide authorization information to the client. The server side firstly needs to verify whether the identity of the client side is legal or not, the server side verifies whether the identity information reported by the client side is consistent with the internal prestored record or not by comparing, and only if the identity information passes the identity verification, the server side can provide the client side with authorization information required by network authorization, so that an identity verification mechanism can ensure that only the legal client side passing the authentication can obtain the network authorization to carry out subsequent operation.
In the method, the server side verifies the identity information of the first client side, verifies the validity of the identity information of the first client side, and can send the authorization information to the first client side after the verification is passed. By the method, the illegal molecule can be prevented from acquiring the authorization information so as to influence the security of the authorization information.
S102, the first client and the second client establish communication connection in a near field communication mode.
In an embodiment of the present application, near field communication (Near Field Communication, NFC) is a short range wireless communication technology. NFC transmission distance is very short, generally is within 4 cm, so that the NFC transmission device is very suitable for quick data exchange between mobile devices, supports contactless communication between different devices, can realize close-range data transmission between a mobile phone and a POS machine and between the mobile phone and the mobile phone, is high in data transmission speed, supports transmission of various types of files such as texts, pictures and webpages, is high in safety, needs a very short distance of the devices to establish connection, and reduces the risk of data leakage.
In the traditional method, the first client and the second client are in communication connection by adopting Bluetooth, the communication connection between the Bluetooth needs about 6s, the Bluetooth is based on 2.4G frequency band communication, the transmission distance can reach 100 meters at maximum, the long-distance wireless data transmission is the risk of information leakage because of the transmission of radio waves, the maximum communication distance is about 10cm in NFC communication, the risk of data leakage of the radio waves at the distance is relatively low, and the NFC function is more convenient and reliable than the conventional Bluetooth technology based on the technical comparison of the two aspects. Therefore, in the application, the first client and the second client communicate by adopting an NFC communication mode.
In an embodiment, the first client further includes a first communication module and a first signal processing module, where the first signal processing module is connected to the first communication module, the second client includes a second communication module and a second signal processing module, and the second signal processing module is connected to the second communication module, and referring to fig. 3, this is a schematic flow diagram of establishing near field communication provided in this embodiment of the present application, and step S102 includes:
s1021, the first signal processing module sends a first instruction to the first communication module.
In this embodiment of the present application, the first signal processing module may be a mobile phone baseband signal processing module in this application, where the baseband signal processing module (first signal processing module) is an important component in a mobile communication device, and is mainly responsible for converting between a digital signal and an analog signal, and completing basic signal modulation, demodulation, and processing functions, which are key for interaction between a digital part and a wireless part of a communication device, and the first communication module may be a mobile phone NFC communication module in this application, where the mobile phone NFC communication module (first communication module) implements touchless data exchange between a mobile phone and an NFC tag/other device through a radio frequency technology, and is a hardware base of an NFC function of the mobile phone. The mobile phone embedded type power supply device is good in performance, low in power consumption and easy to realize embedded type design of the mobile phone.
When the first signal processing module needs to communicate with the outside, the first signal processing module sends a first instruction to the first communication module, wherein the first instruction may be a network searching instruction and is used for instructing the first communication module to start searching a network, or may be a call establishment instruction and instructing the first communication module to establish a call connection with an opposite terminal, or a data transmission instruction, so that the first communication module starts transmission of uplink and downlink data, and after receiving the instruction, the first communication module executes corresponding communication operation according to the instruction content, so that the first signal processing module controls and schedules the first communication module to complete various functions of the outside communication in a mode of sending the instruction. Ensure the good cooperation of the signal processing and communication module.
And S1022, after the first communication module receives the first instruction, sending a second instruction to a second communication module in the second client.
In this embodiment of the present application, the second communication module in the second client may also be an NFC communication module, and the function of the second communication module may be referred to as the first communication module. The first command may be a request to establish a connection with the second client, and the first communication module needs to find the second client after receiving the command, establish the connection, so that it may act as a master device, uninterruptedly scan NFC devices available for connection in the vicinity, and prepare for authorization information, ready to send data out through the NFC function. The first communication module sends a second instruction, such as a paging instruction, to a second communication module in the second client, where the second instruction is for the second communication module to respond and establish a connection.
S1023, if the second communication module detects the second instruction sent by the first communication module within the preset distance, the second communication module replies a confirmation command to the first communication module, and communication connection is established with the first communication module of the first client.
In the embodiment of the present application, since the furthest communication distance of NFC communication is generally about 10cm, and 10cm is the maximum effective communication distance specified by the NFC communication standard, beyond this distance, the signal quality may be drastically reduced, and it is difficult to realize reliable communication. Therefore, the preset distance can be set to be 10cm, the transmission range of the second instruction has a preset distance, the second communication module needs to judge whether the second instruction is received within the preset distance, the second communication module can reply a confirmation command only within the preset distance, the confirmation command is used for responding to and confirming the second instruction, and the first communication module establishes actual communication connection with the second communication module according to the confirmation command.
In the embodiment of the application, the two clients establish communication connection by adopting a near field communication mode so as to transmit data, and the communication distance of the near field communication is short and the communication establishment speed is high. By the mode, the risk of data leakage of radio waves can be reduced, and communication efficiency can be improved.
S103, after the first client establishes communication connection with the second client, the first client sends the authorization information to the second client.
In this embodiment of the present application, the first client (for example, mobile App) and the second client (smart watch) establish a communication connection through NFC, and since the smart watch needs to write operator data (authorization information) to use the mobile network function, these operator data, such as IMSI number, ki key, etc., are stored in the mobile phone, the mobile phone now transmits these operator data through the NFC connection with the smart watch, specifically, the mobile phone sends the data to the NFC module (second communication module) in the smart watch through the NFC interface (first communication module).
In an embodiment, referring to fig. 4, a schematic flow chart of authorization of a client provided in the embodiment of the present application, where the second client includes a first chip, the second client further includes a second signal processing module, and the second client establishes a communication connection with a base station corresponding to the server according to the authorization information, where the method includes:
s201, the second communication module sends the authorization information to the second signal processing module.
In this embodiment of the present application, the second signal processing module has the same function as the first signal processing module described above. The specific manner in which the NFC module (second communication module) transmits the authorization information to the baseband signal processing module (second signal processing module) is generally through short-range wireless communication. NFC uses radio waves to transmit data over a short range of non-contact distances, and when authorization information needs to be sent, an NFC connection is established between the NFC module and the baseband signal processing module. This is typically achieved by bringing the NFC antennas between the devices close to each other. Once the NFC connection is established, authorization information is transmitted between the NFC modules over radio waves and is passed to the baseband signal processing module. Specifically, the NFC module encodes the authorization information and transmits the authorization information to the baseband signal processing module through modulation and demodulation of radio waves. The baseband signal processing module receives and decodes the authorization information, converting it into a data format that can be processed and stored. The baseband signal processing module may then further process the data, such as writing authorization information to a corresponding chip or processing related operations.
S202, the second signal processing module writes the authorization information into the first chip.
In the embodiment of the present application, the first chip may be an esim chip in the above embodiment. The baseband signal processing module (second signal processing module) establishes a connection through a communication interface with the esim chip. Typically, such an interface may be I2C (Inter-Integrated Circuit), SPI (Serial Peripheral Interface) or UART (Universal Asynchronous Receiver Transmitter), etc., and the baseband signal processing module informs the esim chip of selecting an application for storing the authorization information by sending a corresponding instruction, and the baseband signal processing module sends the authorization information to the esim chip through a specified command and data format. These commands may include an operation code for writing data and the data content, and the esim chip, upon receiving the authorization information, will verify to ensure correctness and legitimacy. If the verification passes, the esim chip will store the authorization information in an internal memory.
S203, the second client establishes communication connection with the base station corresponding to the server according to the authorization information written in the first chip.
By the method, the second client can be subjected to authorization processing, so that the second client establishes communication connection with the service end base station.
In this embodiment of the present application, the second client reads the authorization information stored in the first chip through an appropriate interface (such as NFC, SIM card, etc.), and the second client establishes wireless connection with the base station corresponding to the server using a communication protocol (such as 4GLTE, 5G, etc.) required based on the authorization information. This typically involves a process of identity authentication, key exchange and negotiation with the base station, where the second client sends an authorization authentication request to the server, which contains authorization information read from the first chip, and the server receives the authorization authentication request and then verifies the requested authorization information. This may include checking the validity of the authorization information, verifying a digital signature or performing a peer-to-peer operation with the authorization information stored on the server, which if successful, will give the second client authorization and allow a communication connection to be established with the base station. At this time, the second client may perform bidirectional communication with the server, exchange data, and perform desired operations.
In the method, the server side performs authentication of the identity information again on the second client side to be in communication connection with, and after the authentication is passed, the second client side can be allowed to establish communication with the second client side. By the method, the security of the authorization data is further improved.
In one embodiment, the communication system further includes a base station corresponding to the server, the client further includes a third communication module, and step S203 includes:
the second signal processing module establishes communication connection with a base station corresponding to the server through the third communication module; after the second signal processing module establishes communication connection with the base station corresponding to the service end through the third communication module, the second signal processing module sends the identity information of the second client to the base station through the third communication module; the base station verifies the identity information of the second client and sends the verification information to the second client; and the second client establishes communication connection with the service end base station according to the verification information.
In this embodiment of the present application, the third communication module may be a mobile wireless communication module, where the principle of the mobile wireless communication module is to send or receive electromagnetic wave signals and convert the electromagnetic wave signals into information understood by us, and the function of the wireless communication module is to link between objects, so that various terminal devices of the internet of things achieve information transmission capability, and also various intelligent devices have an information interface of the internet of things.
The second signal processing module establishes communication connection with a base station corresponding to the server through the mobile wireless communication module. This involves the process of identity authentication, key exchange, negotiation of a communication protocol, etc. with the base station, and the second signal processing module sends the identity information of the second client to the base station through the third communication module. This identity information may include an identifier of the client, a security key, etc., and the base station performs authentication after receiving the identity information of the second client. Authentication may involve checking the validity of the identity information, performing a peer-to-peer operation with registered client information stored on the base station, the base station transmitting the authentication result as authentication information to the second client. And the second client establishes communication connection with the base station of the server according to the received verification information.
In one embodiment, the second client establishes a communication connection with the service-side base station according to the authentication information, including:
if the identity information of the second client is the same as the identity information of the first client, the verification information is verification passing; the base station sends the verification information passing the verification to the second client; and the second client establishes communication connection with the base station after receiving the verification information which is transmitted by the base station and passes the verification.
In this embodiment of the present application, the authentication information may be a message that the authentication is successful or failed, or authorization information that includes further operations, and the second client establishes a communication connection with the base station of the server according to the received authentication information. If the verification is successful, the second client side allows the data exchange and the operation execution with the base station, and the second client side establishes communication connection with the base station corresponding to the server side.
In one embodiment, after the second client establishes a communication connection with the base station after receiving the authentication information transmitted by the base station and passing the authentication, the method further includes:
and the base station adds the second client into an operation list so that the service end carries out operation processing on the second client.
In the embodiment of the application, after receiving the verification information of the second client, the base station adds the verification information to the operation list. This means that the base station will add the identity information, the device information, etc. of the second client to the operation list in the server, so as to track, manage and control the second client, and the server performs operation processing according to the operation list information of the second client. This may involve allocating corresponding resources for the second client, configuring network parameters, activating services, etc. The server may determine how to process according to the subscription plan of the second client, the user requirement, and other factors, and the second client performs configuration and operation according to the operation processing information of the server. At this point, the second client will be able to use the corresponding services and functions to meet its needs. This may include voice call, text messaging, data transfer, etc.
Referring to fig. 5, a system block diagram of a communication method provided in an embodiment of the present application is shown in fig. 5, where a first client 11 includes a first communication module 111 and a first signal processing module 112, and a second client includes a second communication module 121, a second signal processing module 122, and a third communication module 123. The first communication module 111 is connected to the first signal processing module, and the second signal processing module 122 is connected to the second communication module 121 and the third communication module 123, respectively.
The first signal processing module 112 in the first client 11 sends a first instruction to the first communication module 111, the first instruction being for causing the first communication module 111 to establish a near field communication connection as a master device with the second communication module 121 in the second client 12. After the first communication module 111 establishes near field communication with the second communication module 121 by sending out the second instruction application, the authorization information is sent to the second communication module 121 through the first communication module 111, after that, the second communication module 121 sends the authorization information to the second signal processing module 122, and the second signal processing module 122 writes the authorization data into the esim chip in the second client. Finally, the second signal processing 122 module invokes the third communication module 123 to establish communication connection with the server base station 14, and the server base station 14 verifies the identity information of the second client, and after the verification is successful, the second client is brought into the operator network, so that the second client can normally use the operator network. By the method, the authorization efficiency of the client can be improved, the working efficiency is improved, and the risk of data leakage can be reduced.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic of each process, and should not limit the implementation process of the embodiment of the present application in any way.
It should be noted that, because the content of information interaction and execution process between the above devices/units is based on the same concept as the method embodiment of the present application, specific functions and technical effects thereof may be referred to in the method embodiment section, and will not be described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Fig. 6 is a schematic structural diagram of a terminal device provided in an embodiment of the present application. As shown in fig. 6, the terminal device 6 of this embodiment includes: at least one processor 60 (only one shown in fig. 6), a memory 61 and a computer program 62 stored in the memory 61 and executable on the at least one processor 60, the processor 60 implementing the steps in any of the various communication method embodiments described above when executing the computer program 62.
The terminal equipment can be computing equipment such as a desktop computer, a notebook computer, a palm computer, a cloud server and the like. The terminal device may include, but is not limited to, a processor, a memory. It will be appreciated by those skilled in the art that fig. 6 is merely an example of the terminal device 6 and is not meant to be limiting as to the terminal device 6, and may include more or fewer components than shown, or may combine certain components, or different components, such as may also include input-output devices, network access devices, etc.
The processor 60 may be a central processing unit (Central Processing Unit, CPU), the processor 60 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may in some embodiments be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6. The memory 61 may in other embodiments also be an external storage device of the terminal device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal device 6. Further, the memory 61 may also include both an internal storage unit and an external storage device of the terminal device 6. The memory 61 is used for storing an operating system, an application program, a Boot Loader (Boot Loader), data, other programs, etc., such as program codes of the computer program. The memory 61 may also be used for temporarily storing data that has been output or is to be output.
Embodiments of the present application also provide a computer readable storage medium storing a computer program, which when executed by a processor, may implement the steps in the above-described method embodiments.
The present embodiments provide a computer program product which, when run on a terminal device, causes the terminal device to perform steps that enable the respective method embodiments described above to be implemented.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application implements all or part of the flow of the method of the above embodiments, and may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, where the computer program, when executed by a processor, may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to an apparatus/terminal device, recording medium, computer Memory, read-Only Memory (ROM), random access Memory (RAM, random Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. Such as a U-disk, removable hard disk, magnetic or optical disk, etc. In some jurisdictions, computer readable media may not be electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other manners. For example, the apparatus/terminal device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.
Claims (10)
1. A method of communication, comprising: the communication method is applied to a communication system, the communication system comprises a first client, a second client and a server, the first client is respectively connected with the user and the second client, and the communication method comprises the following steps:
The first client acquires authorization information from the server, wherein the authorization information is used for authorizing communication between the second client and a server base station;
the first client and the second client establish communication connection in a near field communication mode;
after the first client establishes communication connection with the second client, the first client sends the authorization information to the second client;
and the second client establishes communication connection with the base station corresponding to the server according to the authorization information.
2. The communication method as claimed in claim 1, wherein the first client obtains authorization information from the server, comprising:
the server side obtains the identity information of the first client side;
the server verifies according to the identity information of the first client and preset identity information stored in the server;
and if the identity information of the first client is successfully verified with the preset identity information stored in the server, the first client acquires authorization information from the service.
3. The communication method of claim 1, the first client further comprising a first communication module and a first signal processing module, the first signal processing module being connected to the first communication module;
The second client comprises a second communication module and a second signal processing module, and the second signal processing module is connected with the second communication module;
the communication connection is established between the first client and the second client in a communication mode of near field communication, and the communication connection comprises the following steps:
the first signal processing module sends a first instruction to the first communication module;
after the first communication module receives the first instruction, a second instruction is sent to a second communication module in the second client;
and after the second communication module of the second client receives the second instruction, communication connection is established with the first communication module of the first client according to the second instruction.
4. A communication method according to claim 3, said establishing a communication connection with a first communication module of the first client according to the second instruction comprising:
the second communication module detects a second instruction sent by the first communication module within a preset distance;
and if the second communication module detects a second instruction sent by the first communication module within a preset distance, the second communication module replies a confirmation command to the first communication module, and communication connection is established with the first communication module of the first client.
5. The communication method as claimed in claim 1, wherein the second client includes a first chip, the second client further includes a second signal processing module, and the second client establishes a communication connection with a base station corresponding to the server according to the authorization information, including:
the second communication module sends the authorization information to a second signal processing module;
the second signal processing module writes the authorization information into the first chip;
and the second client establishes communication connection with the base station corresponding to the server according to the authorization information written in the first chip.
6. The communication method according to claim 5, wherein the communication system further comprises a base station corresponding to the server; the client also comprises a third communication module; the second client establishes communication connection with the base station corresponding to the server according to the authorization information written in the first chip, and the method comprises the following steps:
the second signal processing module establishes communication connection with a base station corresponding to the server through the third communication module;
after the second signal processing module establishes communication connection with the base station corresponding to the service end through the third communication module, the second signal processing module sends the identity information of the second client to the base station through the third communication module;
The base station verifies the identity information of the second client and sends the verification information to the second client;
and the second client establishes communication connection with the service end base station according to the verification information.
7. The communication method according to claim 6, wherein the second client establishes a communication connection with the serving base station according to the authentication information, comprising:
if the identity information of the second client is the same as the identity information of the first client, the verification information is verification passing;
the base station sends the verification information passing the verification to the second client;
and the second client establishes communication connection with the base station after receiving the verification information which is transmitted by the base station and passes the verification.
8. The communication method of claim 7, after the second client establishes the communication connection with the base station, the method further comprising:
and the base station adds the second client into an operation list so that the service end carries out operation processing on the second client.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 8 when executing the computer program.
10. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311242990.5A CN117354800A (en) | 2023-09-25 | 2023-09-25 | Communication method, terminal equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311242990.5A CN117354800A (en) | 2023-09-25 | 2023-09-25 | Communication method, terminal equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117354800A true CN117354800A (en) | 2024-01-05 |
Family
ID=89358601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311242990.5A Pending CN117354800A (en) | 2023-09-25 | 2023-09-25 | Communication method, terminal equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117354800A (en) |
-
2023
- 2023-09-25 CN CN202311242990.5A patent/CN117354800A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105992306B (en) | Binding method of terminal and home gateway | |
CN108259164B (en) | Identity authentication method and equipment of Internet of things equipment | |
US20100211685A1 (en) | Pairing exchange | |
KR20150114765A (en) | Image forming apparatus supporting function of NFC(near field communication) and method for setting NFC operation mode thereof | |
CN102802156B (en) | A kind of method for authenticating and relevant device | |
CN106060762B (en) | Information pushing method, information pushing device and information pushing system | |
CN1996836B (en) | There is provided and obtain the method and apparatus of the session key for WUSB safety | |
CN111918274B (en) | Code number configuration and management method and device, electronic equipment and readable storage medium | |
CN115065703B (en) | Internet of things system, authentication and communication method thereof and related equipment | |
CN102833074A (en) | Authentication method and related equipment | |
CN109583154A (en) | A kind of system and method based on Web middleware access intelligent code key | |
US9137103B2 (en) | Configuring devices in a secured network | |
CN115915492A (en) | Communication method and system among distributed devices and related devices | |
EP3090376B1 (en) | Method for accessing a service and a corresponding server | |
CN114916038B (en) | Automatic network access and automatic connection method, system, equipment and medium | |
CN101778117B (en) | Network storing and processing method, device and wireless terminal | |
CN111654846A (en) | Method and device for acquiring code resource configuration file | |
CN107454557B (en) | Router connection method and system | |
CN117354800A (en) | Communication method, terminal equipment and computer readable storage medium | |
CN107277935B (en) | Bluetooth communication method, device and application system and equipment thereof | |
CN113709849A (en) | Network access method and device of equipment to be accessed to network, storage medium and electronic device | |
CN114007214A (en) | Client terminal equipment, network switching method thereof and server | |
CN109429200B (en) | Data communication method and device and mobile equipment | |
CN113055884A (en) | Network access method, network access device and terminal | |
CN105142098A (en) | Data sharing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |