TW201933904A - Trusted service management method and apparatus capable of supporting wireless network switching - Google Patents

Trusted service management method and apparatus capable of supporting wireless network switching Download PDF

Info

Publication number
TW201933904A
TW201933904A TW107138773A TW107138773A TW201933904A TW 201933904 A TW201933904 A TW 201933904A TW 107138773 A TW107138773 A TW 107138773A TW 107138773 A TW107138773 A TW 107138773A TW 201933904 A TW201933904 A TW 201933904A
Authority
TW
Taiwan
Prior art keywords
access point
wireless access
wireless
terminal device
switching
Prior art date
Application number
TW107138773A
Other languages
Chinese (zh)
Other versions
TWI776982B (en
Inventor
石飛
宋益楠
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201933904A publication Critical patent/TW201933904A/en
Application granted granted Critical
Publication of TWI776982B publication Critical patent/TWI776982B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Hardware Redundancy (AREA)

Abstract

Disclosed in the present application is a trusted service management method capable of supporting wireless network switching, comprising: after detecting that a terminal device switches from a first wireless access point to a second wireless access point, notifying the first wireless access point to cache a data packet returned by a trusted service manager for a service request; initiating an authentication operation to the trusted service manager on the basis of the second wireless access point; and performing the following switching operations at least once in the process of performing the authentication operation: switching the terminal device from the second wireless access point back to the first wireless access point; receiving, by the terminal device, the data packet cached by the first wireless access point; and switching the terminal device from the first wireless access point to the second wireless access point. The method avoids an error or a failure caused by data packet loss during wireless network switching, and reduces delay produced during wireless network switching.

Description

支援無線網路切換的可靠伺服管理方法以及裝置Reliable servo management method and device supporting wireless network switching

本案關於可靠伺服管理領域,具體關於一種支援無線網路切換的可靠伺服管理方法。本案同時關於一種支援無線網路切換的可靠伺服管理裝置,另一種支援無線網路切換的可靠伺服管理方法以及裝置,以及兩種電子設備。This case relates to the field of reliable servo management, and specifically relates to a reliable servo management method that supports wireless network switching. This case also concerns a reliable servo management device that supports wireless network switching, another reliable servo management method and device that supports wireless network switching, and two types of electronic equipment.

TSM(Trusted Service Manager,可靠伺服管理平臺)是實現對具備安全儲存、運算、防攻擊等能力的安全載體進行空間管理、應用管理和空中發卡的系統平臺,為線下通過NFC等技術進行行動支付、門禁等伺服提供了實施基礎。TSM能夠實現可靠的資料傳輸與伺服應用的空中接入,比如根據用戶的選擇,通過手機中設置的安全晶片空中加載某一個城市的交通卡,並進行交通卡的充值等操作。同時,在NFC生態中,TSM還扮演著發行商與伺服提供商、用戶、其他參與者之間的中間人角色,使得伺服應用的開展更加快速和安全。
目前的可靠伺服管理平臺中,由TSM伺服器通過無線存取點將資料報文傳遞給物聯網(Internet of Things,IoT)設備中的安全晶片,終端設備再通過無線存取點,將安全晶片對資料報文的執行結果傳遞給TSM伺服器,如此重複多次在TSM伺服器與終端設備中的安全晶片之間進行資料報文傳輸,直到所有的資料報文全部傳輸完畢,即:TSM伺服器對終端設備中安全晶片的操作執行完成,比如,TSM伺服器在終端設備的安全晶片中完成空中發卡。
然而,實際應用中的終端設備隨用戶所處位置的變化同樣會發生位移,如果終端設備在多次資料報文的傳輸過程中發生位移行為,比如從一無線存取點的無線網路覆蓋範圍移動至另一無線存取點的無線網路覆蓋範圍內,即發生漫遊。在漫遊期間,終端設備會失去舊的無線存取點的連接,同時會嘗試與新的無線存取點建立連接,受到設備性能、無線存取點性能、網路情況等諸多因素的影響,並且因為認證的原因,從舊的無線存取點切換到新的無線存取點,不僅會存在1至5秒的延遲,此外還可能導致TSM伺服器與終端設備之間的連接處於中斷狀態,甚至資料報文的丟失,最終導致空中發卡的失敗。
TSM (Trusted Service Manager) is a system platform that implements space management, application management, and aerial card issuance on a secure carrier with secure storage, computing, and anti-attack capabilities. It provides offline mobile payment through NFC and other technologies. , Access control and other servos provide the basis for implementation. TSM can achieve reliable data transmission and air access for servo applications. For example, according to the user's choice, the traffic card of a certain city is loaded in the air through the security chip set in the mobile phone, and the traffic card is recharged. At the same time, in the NFC ecosystem, TSM also plays a middleman role between publishers and servo providers, users, and other participants, making the development of servo applications faster and more secure.
In the current reliable servo management platform, the TSM server transmits the data message to the security chip in the Internet of Things (IoT) device through the wireless access point, and the terminal device then passes the wireless chip to the security chip. The execution result of the data message is passed to the TSM server, so the data message transmission between the TSM server and the security chip in the terminal device is repeated multiple times until all the data messages have been transmitted, that is, the TSM server The operation of the security chip in the terminal device is completed, for example, the TSM server completes the card issuance in the air in the security chip of the terminal device.
However, the terminal device in actual application will also shift with the change of the user's location. If the terminal device shifts during the transmission of multiple data messages, such as the wireless network coverage from a wireless access point Roaming occurs when you move to the wireless network coverage of another wireless access point. During roaming, the terminal device will lose the connection of the old wireless access point, and will try to establish a connection with the new wireless access point, which is affected by many factors such as device performance, wireless access point performance, network conditions, and Due to authentication, switching from the old wireless access point to the new wireless access point will not only have a delay of 1 to 5 seconds, but may also cause the connection between the TSM server and the terminal device to be interrupted, or even The loss of data messages eventually led to the failure of card issuance in the air.

本案提供一種支援無線網路切換的可靠伺服管理方法,以解決現有技術存在的缺陷。本案同時關於一種支援無線網路切換的可靠伺服管理裝置,另一種支援無線網路切換的可靠伺服管理方法以及裝置,以及兩種電子設備。
本案提供一種支援無線網路切換的可靠伺服管理方法,包括:
檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;
基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;
以及,在所述認證操作執行過程中至少一次執行如下切換操作:
將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;
基於所述終端設備接收所述第一無線存取點快取的所述資料報文;
將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
可選的,所述終端設備處於所述第一無線存取點和所述第二無線存取點二者無線網路覆蓋範圍的重疊區域內。
可選的,所述認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行所述切換操作。
可選的,所述認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段;
以及,在所述第一認證階段、所述第二認證階段和/或所述第三認證階段執行後,分別執行所述切換操作,並按照所述第一認證階段、所述切換操作、所述第二認證階段、所述切換操作、所述第三認證階段至所述切換操作的順序執行。
可選的,所述第一認證階段,採用如下方式實現:
建立所述終端設備與所述第二無線存取點之間的第二無線鏈路;
基於所述第二無線鏈路向所述第二無線存取點發送認證請求;
接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求;
針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊。
可選的,所述第二認證階段,採用如下方式實現:
接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息。
可選的,所述第三認證階段,採用如下方式實現:
接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點;
接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知;
接收所述第二無線存取點發送的輪詢報文;
針對所述輪詢報文向所述第二無線存取點發送相應的輪詢應答報文。
可選的,所述第三認證階段執行後,在執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點步驟前,執行如下操作:
判斷所述伺服請求是否執行完畢,若是,執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點步驟;若否,執行所述基於所述終端設備接收所述第一無線存取點快取的所述資料報文步驟。
可選的,所述基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作,採用如下方式實現:
建立所述終端設備與所述第二無線存取點之間的第二無線鏈路;
基於所述第二無線鏈路向所述第二無線存取點發送認證請求;
接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求;
針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊;
接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息;
接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點;
接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知。
可選的,所述第一無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式,且所述第二無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式;
其中,若所述第一無線存取點和/或所述第二無線存取點針對所述終端設備的模式為休眠模式,所述第一無線存取點和/或所述第二無線存取點將向所述終端設備發送的資料報文快取。
可選的,所述將所述終端設備從所述第二無線存取點切換回所述第一無線存取點,通過將所述第二無線存取點對於所述終端設備設置為所述休眠模式,並將所述第一無線存取點對於所述終端設備設置為所述工作模式實現。
可選的,所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點,通過將所述第一無線存取點對於所述終端設備設置為所述休眠模式,並將所述第二無線存取點對於所述終端設備設置為所述工作模式實現。
可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作:
基於所述終端設備與所述第一無線存取點之間建立的第一無線鏈路,向所述可靠伺服管理平臺發起所述伺服請求;
基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。
可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作:
判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
可選的,所述終端設備包括:物聯網設備。
可選的,所述伺服請求包括:空中發卡請求。
本案還提供一種支援無線網路切換的可靠伺服管理裝置,包括:
資料報文快取單元,用於檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;
認證操作發起單元,用於基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;
以及,在所述認證操作發起單元運行過程中至少一次運行第一切換單元、資料報文接收單元和第二切換單元;
其中,所述第一切換單元,用於將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;
所述資料報文接收單元,用於基於所述終端設備接收所述第一無線存取點快取的所述資料報文;
所述第二切換單元,用於將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
本案另外提供一種支援無線網路切換的可靠伺服管理方法,包括:
從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知;
以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作:
從所述第二無線存取點切換到所述第一無線存取點;
接收所述第一無線存取點發送的其快取的所述資料報文;
從所述第一無線存取點切換到所述第二無線存取點;
其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。
可選的,所述支援無線網路切換的可靠伺服管理方法,包括:
建立與所述第一無線存取點的第一無線鏈路;
基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。
可選的,所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知步驟執行前,執行如下步驟:
判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,執行所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知步驟。
可選的,所述伺服請求包括:空中發卡請求。
本案另外提供一種支援無線網路切換的可靠伺服管理裝置,包括:
切換通知單元,用於從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知;
以及,在從所述切換通知單元運行後,至少一次運行無線存取點切換單元、快取資料報文接收單元以及無線存取點二次切換單元;
所述無線存取點切換單元,用於從所述第二無線存取點切換到所述第一無線存取點;
所述快取資料報文接收單元,用於接收所述第一無線存取點發送的其快取的所述資料報文;
所述無線存取點二次切換單元,用於從所述第一無線存取點切換到所述第二無線存取點;
其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。
本案還提供一種電子設備,包括:
記憶體和處理器;
所述記憶體用於儲存計算機可執行指令,所述處理器用於執行所述計算機可執行指令:
檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;
基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;
以及,在所述認證操作執行過程中至少一次執行如下切換操作:
將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;
基於所述終端設備接收所述第一無線存取點快取的所述資料報文;
將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
本案另外提供一種電子設備,包括:
記憶體和處理器;
所述記憶體用於儲存計算機可執行指令,所述處理器用於執行所述計算機可執行指令:
從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知;
以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作:
從所述第二無線存取點切換到所述第一無線存取點;
接收所述第一無線存取點發送的其快取的所述資料報文;
從所述第一無線存取點切換到所述第二無線存取點;
其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。
本案提供的所述支援無線網路切換的可靠伺服管理方法,包括:檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;以及,在所述認證操作執行過程中至少一次執行如下切換操作:將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;基於所述終端設備接收所述第一無線存取點快取的所述資料報文;將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
所述支援無線網路切換的可靠伺服管理方法,在將所述終端設備從所述第一無線存取點切換到所述第二無線存取點的過程中,一方面基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作,以便建立所述終端設備與所述可靠伺服管理平臺的連接,同時在所述認證操作的執行過程中,通過將所述終端設備在所述第二無線存取點和所述第一無線存取點之間進行來回切換,避免無線網路切換過程中資料報文丟失導致出錯或者失敗,同時也確保所述終端設備在切換到所述第二無線存取點後也能正常存取所述可靠伺服管理平臺,降低了無線網路切換過程產生的延遲。
This case provides a reliable servo management method that supports wireless network switching to solve the defects of the existing technology. This case also concerns a reliable servo management device that supports wireless network switching, another reliable servo management method and device that supports wireless network switching, and two types of electronic equipment.
This case provides a reliable servo management method that supports wireless network switching, including:
After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notifying the first wireless access point to cache the data message returned by the reliable servo management platform for the servo request;
Initiate an authentication operation to the reliable servo management platform based on the second wireless access point;
And, the following switching operation is performed at least once during the execution of the authentication operation:
Switching the terminal device from the second wireless access point back to the first wireless access point;
Receiving the data message cached by the first wireless access point based on the terminal device;
Switching the terminal device from the first wireless access point to the second wireless access point.
Optionally, the terminal device is located in an overlapping area of wireless network coverage of both the first wireless access point and the second wireless access point.
Optionally, the authentication operation is performed by being decomposed into multiple authentication phases, and the switching operation is performed at least once before, during, or after each authentication phase.
Optionally, the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase;
And after the first authentication phase, the second authentication phase, and / or the third authentication phase are performed, the switching operation is performed respectively, and the switching operation is performed according to The second authentication phase, the switching operation, and the third authentication phase to the switching operation are performed in order.
Optionally, the first authentication phase is implemented in the following manner:
Establishing a second wireless link between the terminal device and the second wireless access point;
Sending an authentication request to the second wireless access point based on the second wireless link;
Receiving an identification information acquisition request returned by the second wireless access point for the authentication request;
Sending a response frame to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device.
Optionally, the second authentication phase is implemented in the following manner:
Receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information;
Encrypting password information corresponding to the identification information by using the key;
Sending a response message including the encrypted password information to the reliable servo management platform based on the second wireless link.
Optionally, the third authentication phase is implemented in the following manner:
Receiving an authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second by the reliable servo management platform after the password information included in the response message is verified Wireless access point
Receiving a notification that its port sends authorized access to the terminal device sent by the second wireless access point;
Receiving a polling message sent by the second wireless access point;
Sending a corresponding polling response message to the second wireless access point for the polling message.
Optionally, after the third authentication phase is performed, before performing the step of switching the terminal device from the first wireless access point to the second wireless access point, perform the following operations:
Determine whether the servo request is completed, and if so, perform the step of switching the terminal device from the first wireless access point to the second wireless access point; if not, perform the terminal-based The device receives the data message cached by the first wireless access point.
Optionally, the initiating an authentication operation to the reliable servo management platform based on the second wireless access point is implemented in the following manner:
Establishing a second wireless link between the terminal device and the second wireless access point;
Sending an authentication request to the second wireless access point based on the second wireless link;
Receiving an identification information acquisition request returned by the second wireless access point for the authentication request;
Sending a response frame to the second wireless access point for the identification information acquisition request; the response frame includes identification information corresponding to the terminal device;
Receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information;
Encrypting password information corresponding to the identification information by using the key;
Sending a response message including the encrypted password information to the reliable servo management platform based on the second wireless link;
Receiving an authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second by the reliable servo management platform after the password information included in the response message is verified Wireless access point
Receiving a notification that its port is authorized to access the terminal device sent by the second wireless access point.
Optionally, the mode of the first wireless access point for the terminal device includes an operating mode and / or a sleep mode, and the mode of the second wireless access point for the terminal device includes an operating mode and / or Sleep mode
Wherein, if a mode of the first wireless access point and / or the second wireless access point for the terminal device is a sleep mode, the first wireless access point and / or the second wireless storage point The fetch point caches the data message sent to the terminal device.
Optionally, the switching the terminal device from the second wireless access point back to the first wireless access point, by setting the second wireless access point to the terminal device as the The sleep mode is implemented by setting the first wireless access point to the terminal device in the working mode.
Optionally, the switching the terminal device from the first wireless access point to the second wireless access point, by setting the first wireless access point to the terminal device as the The sleep mode is implemented by setting the second wireless access point to the terminal device in the working mode.
Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, the first wireless access point is notified to cache the reliable message from the servo management platform in response to the servo request. Before the steps are performed, perform the following operations:
Initiating the servo request to the reliable servo management platform based on a first wireless link established between the terminal device and the first wireless access point;
Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link.
Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, the first wireless access point is notified to cache the reliable message from the servo management platform in response to the servo request. Before the steps are performed, perform the following operations:
Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, switch the terminal device from the first wireless access point to The second wireless access point.
Optionally, the terminal device includes: an Internet of Things device.
Optionally, the servo request includes: a card issuing request in the air.
This case also provides a reliable servo management device that supports wireless network switching, including:
The data message cache unit is configured to notify the first wireless access point to cache the reliable server management platform for a servo request after detecting that the terminal device switches from the first wireless access point to the second wireless access point. Data message
An authentication operation initiating unit, configured to initiate an authentication operation to the reliable servo management platform based on the second wireless access point;
And, the first switching unit, the data message receiving unit, and the second switching unit are run at least once during the operation of the authentication operation initiation unit;
The first switching unit is configured to switch the terminal device from the second wireless access point back to the first wireless access point;
The data message receiving unit is configured to receive the data message cached by the first wireless access point based on the terminal device;
The second switching unit is configured to switch the terminal device from the first wireless access point to the second wireless access point.
This case also provides a reliable servo management method that supports wireless network switching, including:
Switching from a first wireless access point to a second wireless access point, and sending a notification of a cached data message to the first wireless access point;
And, after switching from the first wireless access point to the second wireless access point, performing at least one of the following switching operations:
Switching from the second wireless access point to the first wireless access point;
Receiving the cached data message sent by the first wireless access point;
Switching from the first wireless access point to the second wireless access point;
The data message is returned by a reliable servo management platform in response to a servo request.
Optionally, the reliable servo management method supporting wireless network switching includes:
Establishing a first wireless link with the first wireless access point;
Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link.
Optionally, before performing the notification step of switching from the first wireless access point to the second wireless access point and sending a cached data message to the first wireless access point, perform the following steps:
Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, perform the switching from the first wireless access point to the second wireless storage point And a notification step of sending a cached data message to the first wireless access point.
Optionally, the servo request includes: a card issuing request in the air.
This case also provides a reliable servo management device that supports wireless network switching, including:
A switching notification unit, configured to switch from a first wireless access point to a second wireless access point, and send a notification of a cached data message to the first wireless access point;
And after running from the switching notification unit, the wireless access point switching unit, the cached data message receiving unit, and the wireless access point secondary switching unit are run at least once;
The wireless access point switching unit is configured to switch from the second wireless access point to the first wireless access point;
The cached data message receiving unit is configured to receive the cached data message sent by the first wireless access point;
The wireless access point secondary switching unit is configured to switch from the first wireless access point to the second wireless access point;
The data message is returned by a reliable servo management platform in response to a servo request.
The case also provides an electronic device, including:
Memory and processor;
The memory is configured to store computer-executable instructions, and the processor is configured to execute the computer-executable instructions:
After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notifying the first wireless access point to cache the data message returned by the reliable servo management platform for the servo request;
Initiate an authentication operation to the reliable servo management platform based on the second wireless access point;
And, the following switching operation is performed at least once during the execution of the authentication operation:
Switching the terminal device from the second wireless access point back to the first wireless access point;
Receiving the data message cached by the first wireless access point based on the terminal device;
Switching the terminal device from the first wireless access point to the second wireless access point.
This case also provides an electronic device, including:
Memory and processor;
The memory is configured to store computer-executable instructions, and the processor is configured to execute the computer-executable instructions:
Switching from a first wireless access point to a second wireless access point, and sending a notification of a cached data message to the first wireless access point;
And, after switching from the first wireless access point to the second wireless access point, performing at least one of the following switching operations:
Switching from the second wireless access point to the first wireless access point;
Receiving the cached data message sent by the first wireless access point;
Switching from the first wireless access point to the second wireless access point;
The data message is returned by a reliable servo management platform in response to a servo request.
The reliable servo management method for supporting wireless network switching provided in this case includes: after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notifying the first wireless access point cache The reliable servo management platform responds to the data message returned by the servo request; initiates an authentication operation to the reliable servo management platform based on the second wireless access point; and performs the following switching operation at least once during the execution of the authentication operation: Switch the terminal device from the second wireless access point back to the first wireless access point; based on the terminal device receiving the data message cached by the first wireless access point; The terminal device switches from the first wireless access point to the second wireless access point.
The reliable servo management method for supporting wireless network switching is based on the second wireless access point in the process of switching the terminal device from the first wireless access point to the second wireless access point. The access point initiates an authentication operation to the reliable servo management platform, so as to establish a connection between the terminal device and the reliable servo management platform, and during the execution of the authentication operation, Switch back and forth between the second wireless access point and the first wireless access point to avoid errors or failures caused by data packet loss during the wireless network switching process, and also ensure that the terminal device is switched to the first wireless access point. The two wireless access points can also access the reliable servo management platform normally, reducing the delay caused by the wireless network switching process.

在下面的描述中闡述了很多具體細節以便於充分理解本案。但是本案能夠以很多不同於在此描述的其他方式來實施,本領域技術人員可以在不違背本案內涵的情況下做類似推廣,因此本案不受下面揭示的具體實施的限制。
本案提供一種支援無線網路切換的可靠伺服管理方法,本案還提供一種支援無線網路切換的可靠伺服管理裝置,另一種支援無線網路切換的可靠伺服管理方法以及裝置,以及兩種電子設備。以下分別結合本案提供的實施例的附圖逐一進行詳細說明,並且對方法的各個步驟進行說明。
本案提供的一種支援無線網路切換的可靠伺服管理方法實施例如下:
參照附圖1,其示出了本案提供的一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖,參照附圖2,其示出了本案提供的一種無線網路切換場景的示意圖,參照附圖3,其示出了本案提供的一種支援無線網路切換的可靠伺服管理裝過程的示意圖。
步驟S101,檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文。
如圖2所示,TSM伺服器(即可靠伺服管理平臺)通過無線存取點1(第一無線存取點,比如Wi-Fi熱點)與終端設備進行資料報文(APDU報文)傳輸的過程中,資料報文往往需要逐條或者分批發送給終端設備的安全晶片(SE)進行執行,在執行過程中,終端設備由於位置的變化可能引起連接的無線存取點發生變化,比如終端設備從無線存取點1的無線網路覆蓋範圍漫遊至無線存取點2(第二無線存取點)的無線網路覆蓋範圍。在這一漫遊過程中,當終端設備移動到無線存取點1和無線存取點2二者無線網路覆蓋範圍的重疊區域內時,會發生漫遊前的無線網路切換行為,即終端設備從無線存取點1切換到無線存取點2,取決於實際應用場景中設備性能、無線存取點性能、網路情況等諸多因素,這一無線網路切換行為需要耗時1至5秒。在無線網路切換期間,終端設備會失去與無線存取點1的連接,並嘗試與無線存取點2建立無線連接,並且因為認證的原因,從無線存取點1切換到無線存取點2,不僅存在延遲,還可能導致TSM伺服器與終端設備之間的連接處於中斷狀態,甚至資料報文的丟失,最終導致可靠伺服管理過程的失敗。本案提供的所述支援無線網路切換的可靠伺服管理方法,為了確保無線網路切換過程中資料報文不會丟失,同時降低無線網路切換過程產生的延遲,通過將終端設備在無線存取點1和無線存取點2之間進行來回切換,既保證終端設備通過無線存取點1與TSM伺服器之間的連接,避免資料報文丟失,保障可靠伺服管理過程正常進行;同時也確保終端設備與無線存取點2之間的連接保持正常,降低無線網路切換過程產生的延遲。
本案實施例以可靠伺服管理過程中的應用空中下載或者在SE中創建安全域(即空中發卡)為例進行說明,如附圖3所示,在無線網路切換之前,可基於終端設備與無線存取點1之間建立的第一無線鏈路,向TSM伺服器發起伺服請求並基於該第一無線鏈路接收TSM伺服器針對伺服請求返回的資料報文。較佳的,所述伺服請求是指空中發卡請求,所述終端設備是指空中發卡這一場景中的物聯網設備。即:物聯網設備從無線存取點1切換到無線存取點2之前,物聯網設備通過無線存取點1與TSM伺服器進行通訊,具體是指物聯網設備通過TSM SDK發起OTA(Over The Air)請求,即空中發卡請求,比如用於在SE中創建安全域、在SE中空中安裝應用等請求,無線存取點1將該OTA請求轉發給TSM伺服器。TSM伺服器收到OTA請求後,對OTA請求進行處理後產生對應的APDU指令腳本,並將產生的APDU指令腳本以APDU報文的形式逐條或者分批發送給無線存取點1,再由無線存取點1轉發到物聯網設備端的TSM SDK,最終APDU報文被寫入SE中進行執行。
需要說明的是,本案實施例在將物聯網設備從無線存取點1切換到無線存取點2的過程中,物聯網設備需處於無線存取點1和無線存取點2二者無線網路覆蓋範圍的重疊區域內。較佳的,物聯網設備在從無線存取點1切換到無線存取點2之前,還可以通過如下判斷操作,來判斷無線存取點2無線網路的訊號強度是否大於無線存取點1無線網路的訊號強度,若大於,則將物聯網設備從無線存取點1切換到無線存取點2;若無線存取點2無線網路的訊號強度小於或者等於無線存取點1無線網路的訊號強度,可在延時特定時間間隔後重新檢測、對比無線存取點1與無線存取點2二者的訊號強度,並根據比較結果確定是否進行切換。
本實施例可利用IEEE802.11標準支援多頻道通訊的特性與無線存取點1進行通訊,並在無線存取點2執行認證過程,以便通過無線存取點2建立物聯網設備與TSM伺服器的連接。本案實施例提供的一種較佳實施方式中,利用無線存取點對於物聯網設備的兩種模式(工作模式和休眠模式)在無線存取點1和無線存取點2之間進行切換。其一,如果無線存取點1或者無線存取點2對於物聯網設備處於休眠模式下,則無線存取點1或者無線存取點2接收到TSM伺服器下發的APDU報文後,APDU報文被停止向物聯網設備轉發,而是由無線存取點1或者無線存取點2在本地快取APDU報文,這就要求無線存取點1和無線存取點2具備快取APDU報文的功能。其二,如果無線存取點1或者無線存取點2對於物聯網設備處於工作模式下,則無線存取點1或者無線存取點2接收到TSM伺服器下發的APDU報文後,將APDU報文向物聯網設備正常轉發即可。
比如,當物聯網設備從無線存取點1切換到無線存取點2的過程中,物聯網設備與無線存取點2進行認證以建立連接,此時,將無線存取點1對於物聯網設備的模式設置為休眠模式,則無線存取點1收到從TSM伺服器下發的APDU報文後會在本地快取APDU報文。當物聯網設備從無線存取點2被切換回無線存取點1的過程中,將無線存取點1對於物聯網設備的模式從休眠模式切回到工作模式,在此基礎上,無線存取點1會將之前快取的APDU報文轉發給物聯網設備。
本步驟中,檢測到物聯網設備從無線存取點1切換到無線存取點2後,通知無線存取點1快取TSM伺服器針對OTA請求返回的資料報文。比如將無線存取點1對於物聯網設備的模式從工作模式切換為休眠模式,並且將無線存取點2對於物聯網設備的模式從休眠模式切換為工作模式,在進行模式切換之後,TSM伺服器向物聯網設備下發的APDU報文被快取在無線存取點1處,待無線存取點1對於物聯網設備的模式恢復工作模式後向物聯網設備下發。
步驟S102,基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作。
如上所述,上述步驟S101將無線存取點2對於物聯網設備的模式切換為工作模式,本步驟在此基礎上通過無線存取點2向TSM伺服器發起認證操作,以便通過無線存取點2建立物聯網設備與TSM伺服器之間的連接,確保物聯網設備最終切換到無線存取點2之後,能夠通過無線存取點2保持與TSM伺服器之間的資料報文傳輸。較佳的,可通過將所述認證操作分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行將物聯網設備從無線存取點2切換回無線存取點1的切換操作。
本案實施例提供的一種較佳實施方式中,所述認證操作分解後的認證階段包括第一認證階段、第二認證階段和第三認證階段,並且在所述第一認證階段、所述第二認證階段和所述第三認證階段執行後,分別執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體執行順序如下:所述第一認證階段->將物聯網設備從無線存取點2切換回無線存取點1的切換操作->所述第二認證階段->將物聯網設備從無線存取點2切換回無線存取點1的切換操作->所述第三認證階段->將物聯網設備從無線存取點2切換回無線存取點1的切換操作。
(1)所述第一認證階段,較佳採用如下方式實現:
建立物聯網設備與無線存取點2之間的第二無線鏈路;
基於所述第二無線鏈路向無線存取點2發送認證請求;
接收無線存取點2針對所述認證請求返回的標識資訊獲取請求;
針對所述標識資訊獲取請求向無線存取點2發送響應幀;所述響應幀中包含所述物聯網設備對應的標識資訊。
例如,如附圖3所示,在第一認證階段,無線存取點1對於物聯網設備進入睡眠模式,因此無線存取點1在接收到TSM伺服器下發的APDU報文後,無線存取點1在本地快取TSM伺服器下發的APDU報文。同時,無線存取點2對於物聯網設備進入工作模式,則由物聯網設備向無線存取點2發起連接請求,從而建立物聯網設備與無線存取點2之間的無線連接,因為最初的狀態是未認證狀態,所以此時無線存取點2與物聯網設備之間除了IEEE 802.1x協議包外不能接收和發送任何資料包。
建立物聯網設備與無線存取點2之間的無線連接後,物聯網設備通過該無線連接向無線存取點2發出認證請求(EAPOL-Start),啟動認證過程。無線存取點2在收到物聯網設備的認證請求後,向物聯網設備發出一個Identity(標識)類型的EAP請求(EAP-Request/Identity),要求物聯網設備將其標識發送給無線存取點2。物聯網設備端在收到無線存取點2的EAP請求(EAP-Request/Identity)後,將標識資訊通過Identity類型的EAP響應幀(EAP-Response/Identity)發送給無線存取點2,響應無線存取點2發出的EAP請求(EAP-Request/Identity),此後,由無線存取點2將該EAP響應幀(EAP-Response/Identity)發送給TSM伺服器進行處理。
如附圖3所示,上述第一認證階段執行完成後,執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體參見下述步驟S103至S105對所述切換操作的詳細說明。
(2)所述第二認證階段,較佳採用如下方式實現:
接收無線存取點2發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
基於所述第二無線鏈路向TSM伺服器發送包含加密後的所述密碼資訊的應答訊息。
例如,如附圖3所示,在第二認證階段,無線存取點1對於物聯網設備進入睡眠模式,因此無線存取點1在接收到TSM伺服器下發的APDU報文後,無線存取點1在本地快取TSM伺服器下發的APDU報文。TSM伺服器收到無線存取點2發來的請求(即EAP響應幀(EAP-Response/Identity))後,從中提取出物聯網設備對應的標識資訊後,將該標識資訊與資料庫中的標識資訊列表中對比,找到該標識資訊對應的密碼資訊,並用隨機產生的一個MD5 Challenge訊息對密碼進行加密處理,然後將此MD5 Challenge訊息通過EAPOR格式封裝以Access-Challenge報文發送給無線存取點2。無線存取點2在收到來自TSM伺服器的EAPOR格式的Access-Challenge報文後,通過解封裝,將其中的MD5 Challenge訊息轉發給物聯網設備。物聯網設備在收到由無線存取點2轉發的MD5 Challenge訊息(即質詢訊息)後,用該Challenge訊息對密碼部分進行加密處理,然後產生EAP-Response/MD5 Challenge報文,並將產生的EAP-Response/MD5 Challenge報文(即應答訊息)發送給無線存取點2。無線存取點2又將此EAP-Response/MD5 Challenge報文以EAPOR格式封裝在報文(Access-Request)中發送給TSM伺服器。
如附圖3所示,上述第二認證階段執行完成後,執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體參見下述步驟S103至S105對所述切換操作的詳細說明。
(3)所述第三認證階段,較佳採用如下方式實現:
接收無線存取點2發送的認證通過報文;所述認證通過報文由TSM伺服器對所述應答訊息中包含的所述密碼資訊驗證通過後發送至無線存取點2;
接收無線存取點2發送的其埠針對所述物聯網設備授權存取的通知;
接收無線存取點2發送的輪詢報文;
針對所述輪詢報文向無線存取點2發送相應的輪詢應答報文。
例如,如附圖3所示,在第三認證階段,無線存取點1對於物聯網設備進入睡眠模式,因此無線存取點1在接收到TSM伺服器下發的APDU報文後,無線存取點1在本地快取TSM伺服器下發的APDU報文。TSM伺服器收到由無線存取點2傳來的包含已加密的密碼資訊的Access-Request報文後,與在本地經過加密運算後的密碼資訊進行對比,如果相同則認為為合法,並向無線存取點2發送認證通過報文(Access-Accept)。無線存取點2收到Access-Accept報文後,經過EAPOR解封裝再以EAP-Success報文向物聯網設備發送,並將埠改為授權狀態,允許物聯網設備通過埠進行存取。
此外,物聯網設備與無線存取點2的連接處於在線期間,無線存取點2會通過向物聯網設備定期發送Handshake Request(輪詢報文),對物聯網設備的在線情況進行監測。物聯網設備收到Handshake Request(輪詢報文)後向無線存取點2發送Handshake Response(輪詢應答報文),表示物聯網設備與無線存取點2的連接仍然在線。
如附圖3所示,上述第一認證階段執行完成後,執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體參見下述步驟S103至S105對所述切換操作的詳細說明。
在具體實施時,除上述提供的將所述認證操作分解為3個認證階段的方式進行執行,還可以將所述認證操作分解為1個、2個、4個甚至更多認證階段的方式進行執行,具體實現方式與上述提供的將所述認證操作分解為3個認證階段的方式類似。比如,將所述認證操作分解為一個認證階段,具體包括:建立物聯網設備與無線存取點2之間的第二無線鏈路,基於所述第二無線鏈路向無線存取點2發送認證請求,接收無線存取點2針對所述認證請求返回的標識資訊獲取請求,針對所述標識資訊獲取請求向無線存取點2發送響應幀,所述響應幀中包含所述物聯網設備對應的標識資訊;接收無線存取點2發送的質詢訊息,所述質詢訊息中包含對密碼資訊進行加密的密鑰,利用所述密鑰對所述標識資訊對應的密碼資訊進行加密,基於所述第二無線鏈路向TSM伺服器發送包含加密後的所述密碼資訊的應答訊息;接收無線存取點2發送的認證通過報文,所述認證通過報文由TSM伺服器對所述應答訊息中包含的所述密碼資訊驗證通過後發送至無線存取點2,接收無線存取點2發送的其埠針對所述物聯網設備授權存取的通知。
步驟S103,將所述終端設備從所述第二無線存取點切換回所述第一無線存取點。
需要說明的是,本步驟和下述步驟S104以及下述步驟S105共同組成將物聯網設備從無線存取點2切換回無線存取點1的切換操作,本案實施例中,所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作的執行前提是分別在上述第一認證階段、第二認證階段和第三認證階段執行之後。具體的,如附圖3所示,所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作第一次被執行,是在所述第一認證階段執行後、且所述第二認證階段執行前進行。所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作第二次被執行,是在所述第二認證階段執行後、且所述第三認證階段執行前進行。所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作第三次被執行,是在所述第三認證階段執行後進行。
如上所述,無線存取點1對於物聯網設備、無線存取點2設置有休眠模式和工作模式兩種模式,基於此,本步驟將物聯網設備從無線存取點2切換回無線存取點1,較佳是通過無線存取點2對於物聯網設備的模式設置為休眠模式,並將無線存取點1對於物聯網設備的模式設置為工作模式來實現。
步驟S104,基於所述終端設備接收所述第一無線存取點快取的所述資料報文。
在上述步驟S103將物聯網設備從無線存取點2切換回無線存取點1之後,本步驟基於物聯網設備接收無線存取點1快取的資料報文,並將接收到的所述資料報文傳輸給物聯網設備設置的安全晶片進行執行,並將安全晶片針對所述資料報文的執行結果通過無線存取點1返回給TSM伺服器。
步驟S105,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
如上所述,無線存取點1對於物聯網設備、無線存取點2設置有休眠模式和工作模式兩種模式,基於此,本步驟將物聯網設備從無線存取點1切換到無線存取點2,較佳是通過無線存取點1對於物聯網設備的模式設置為休眠模式,並將無線存取點2對於物聯網設備的模式設置為工作模式來實現。
本案實施例提供的一種較佳實施方式中,在上述第三認證階段執行後,在執行本步驟將物聯網設備從無線存取點1切換到無線存取點2之前,還可以執行如下判斷操作,判斷所述空中發卡請求是否執行完畢,如果執行完畢,則執行本步驟,將物聯網設備從無線存取點1切換到無線存取點2,物聯網設備通過無線存取點2與TSM伺服器進行資料報文傳輸;如果所述空中發卡請求尚未執行完畢,則返回執行上述步驟S104,基於物聯網設備接收無線存取點1快取的TSM伺服器下發的資料報文,並由物聯網設備設置的安全晶片執行所述資料報文。
如附圖3所示,在上述認證操作的3個認證階段全部被執行後,並且由上述步驟S103至步驟S105共同組成的所述切換操作第三次被執行後,則完成將物聯網設備從無線存取點1切換到無線存取點2的切換操作,在此切換操作後,物聯網設備與TSM伺服器之間進行的資料報文傳輸通過無線存取點2來完成,從而實現物聯網設備從無線存取點1到無線存取點2的“無縫切換”,因為在上述切換操作的進行過程中,通過將物聯網設備在無線存取點1和無線存取點2之間進行來回切換,一方面避免物聯網設備與TSM伺服器之間傳輸的資料報文丟失,確保空中發卡操作的正常進行;另一方面通過無線存取點2在TSM伺服器完成物聯網設備的認證操作,從而在最終將物聯網設備切換到無線存取點2之後,物聯網設備能夠通過無線存取點2實現對TSM伺服器的正常存取,在這一切換過程中,用戶既感知不到連接中斷,甚至感知不到由於認證產生的延遲,因此是“無縫切換”。
綜上所述,所述支援無線網路切換的可靠伺服管理方法,在將物聯網設備從無線存取點1切換到無線存取點2的過程中,一方面基於無線存取點2向TSM伺服器發起認證操作,以便建立物聯網設備與TSM伺服器的連接,同時在所述認證操作的執行過程中,通過將物聯網設備在無線存取點2和無線存取點1之間進行來回切換,避免無線網路切換過程中資料報文丟失導致空中發卡失敗,同時也確保物聯網設備在切換到無線存取點2後也能正常存取TSM伺服器,降低了無線網路切換過程產生的延遲。
本案提供的一種支援無線網路切換的可靠伺服管理裝置實施例如下:
在上述的實施例中,提供了一種支援無線網路切換的可靠伺服管理方法,與之相對應的,本案還提供了一種支援無線網路切換的可靠伺服管理裝置,下面結合附圖進行說明。
參照附圖4,其示出了本案提供的一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖。
由於裝置實施例基本相似於方法實施例,所以描述得比較簡單,相關的部分請參見上述提供的方法實施例的對應說明即可。下述描述的裝置實施例僅僅是示意性的。
本案提供一種支援無線網路切換的可靠伺服管理裝置,包括:
資料報文快取單元401,用於檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;
認證操作發起單元402,用於基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;
以及,在所述認證操作發起單元運行過程中至少一次運行第一切換單元403、資料報文接收單元404和第二切換單元405;
其中,所述第一切換單元403,用於將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;
所述資料報文接收單元404,用於基於所述終端設備接收所述第一無線存取點快取的所述資料報文;
所述第二切換單元405,用於將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
可選的,所述終端設備處於所述第一無線存取點和所述第二無線存取點二者無線網路覆蓋範圍的重疊區域內。
可選的,所述認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行所述切換操作。
可選的,所述認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段;
以及,在所述第一認證階段、所述第二認證階段和/或所述第三認證階段執行後,分別執行所述切換操作,並按照所述第一認證階段、所述切換操作、所述第二認證階段、所述切換操作、所述第三認證階段至所述切換操作的順序執行。
可選的,所述第一認證階段,包括:
第二無線鏈路建立子單元,用於建立所述終端設備與所述第二無線存取點之間的第二無線鏈路;
認證請求發送子單元,用於基於所述第二無線鏈路向所述第二無線存取點發送認證請求;
標識資訊獲取請求接收子單元,用於接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求;
響應幀發送子單元,用於針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊。
可選的,所述第二認證階段,包括:
質詢訊息接收子單元,用於接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
加密子單元,用於利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
應答訊息發送子單元,用於基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息。
可選的,所述第三認證階段,包括:
認證通過報文接收子單元,用於接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點;
埠授權通知接收子單元,用於接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知;
輪詢報文接收子單元,用於接收所述第二無線存取點發送的輪詢報文;
輪詢應答報文發送子單元,用於針對所述輪詢報文向所述第二無線存取點發送相應的輪詢應答報文。
可選的,所述認證操作發起單元402,包括:
判斷子單元,用於判斷所述伺服請求是否執行完畢,若是,運行所述第二切換單元405;若否,運行所述資料報文接收單元404。
可選的,所述認證操作發起單元402,包括:
第一子單元,用於建立所述終端設備與所述第二無線存取點之間的第二無線鏈路;
第二子單元,用於基於所述第二無線鏈路向所述第二無線存取點發送認證請求;
第三子單元,用於接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求;
第四子單元,用於針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊;
第五子單元,用於接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
第六子單元,用於利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
第七子單元,用於基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息;
第八子單元,用於接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點;
第九子單元,用於接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知。
可選的,所述第一無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式,且所述第二無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式;
其中,若所述第一無線存取點和/或所述第二無線存取點針對所述終端設備的模式為休眠模式,所述第一無線存取點和/或所述第二無線存取點將向所述終端設備發送的資料報文快取。
可選的,所述第一切換單元403,通過將所述第二無線存取點對於所述終端設備設置為所述休眠模式,並將所述第一無線存取點對於所述終端設備設置為所述工作模式實現。
可選的,所述第二切換單元405,通過將所述第一無線存取點對於所述終端設備設置為所述休眠模式,並將所述第二無線存取點對於所述終端設備設置為所述工作模式實現。
可選的,所述支援無線網路切換的可靠伺服管理裝置,包括:
伺服請求發送單元,用於基於所述終端設備與所述第一無線存取點之間建立的第一無線鏈路,向所述可靠伺服管理平臺發起所述伺服請求;
資料報文接收單元,用於基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。
可選的,所述支援無線網路切換的可靠伺服管理裝置,包括:
訊號強度判斷單元,用於判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
可選的,所述終端設備包括:物聯網設備。
可選的,所述伺服請求包括:空中發卡請求。
本案提供的另一種支援無線網路切換的可靠伺服管理方法實施例如下:
在上述的實施例中,提供了一種支援無線網路切換的可靠伺服管理方法,與之配合,本案還提供了另一種支援無線網路切換的可靠伺服管理方法,基於終端設備實現,下面結合附圖進行說明。
參照附圖5,其示出了本案提供的另一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖。
由於該方法實施例與上述提供的方法實施例相互對應,所以描述得比較簡單,相關的部分請參見上述提供的方法實施例的對應說明即可。下述描述的方法實施例僅僅是示意性的。
本案提供一種支援無線網路切換的可靠伺服管理方法,包括:
步驟S501,從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知;
以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作:
步驟S502,從所述第二無線存取點切換到所述第一無線存取點;
步驟S503,接收所述第一無線存取點發送的其快取的所述資料報文;
步驟S504,從所述第一無線存取點切換到所述第二無線存取點;
其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。
可選的,所述支援無線網路切換的可靠伺服管理方法,包括:
建立與所述第一無線存取點的第一無線鏈路;
基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。
可選的,上述步驟S501執行前,執行如下步驟:
判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,執行上述步驟S501,從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知。
可選的,所述伺服請求包括:空中發卡請求。
本案提供的另一種支援無線網路切換的可靠伺服管理裝置實施例如下:
在上述的實施例中,提供了另一種支援無線網路切換的可靠伺服管理方法,與之相對應的,本案還提供了另一種支援無線網路切換的可靠伺服管理裝置,下面結合附圖進行說明。
參照附圖6,其示出了本案提供的另一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖。
由於裝置實施例基本相似於方法實施例,所以描述得比較簡單,相關的部分請參見上述提供的方法實施例的對應說明即可。下述描述的裝置實施例僅僅是示意性的。
本案提供另一種支援無線網路切換的可靠伺服管理裝置,包括:
切換通知單元601,用於從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知;
以及,在從所述切換通知單元601運行後,至少一次運行無線存取點切換單元602、快取資料報文接收單元603以及無線存取點二次切換單元604;
所述無線存取點切換單元602,用於從所述第二無線存取點切換到所述第一無線存取點;
所述快取資料報文接收單元603,用於接收所述第一無線存取點發送的其快取的所述資料報文;
所述無線存取點二次切換單元604,用於從所述第一無線存取點切換到所述第二無線存取點;
其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。
本案提供的一種電子設備實施例如下:
在上述的實施例中,提供了一種支援無線網路切換的可靠伺服管理方法,此外,本案還提供了一種用於實現所述支援無線網路切換的可靠伺服管理方法的電子設備,下面結合附圖進行說明。
參照附圖7,其示出了本實施例提供的一種電子設備的示意圖。
本案提供的所述電子設備實施例描述得比較簡單,相關的部分請參見上述提供的所述支援無線網路切換的可靠伺服管理方法實施例的對應說明即可。下述描述的實施例僅僅是示意性的。
本案提供一種電子設備,包括:
記憶體701和處理器702;
所述記憶體701用於儲存計算機可執行指令,所述處理器702用於執行如下計算機可執行指令:
檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;
基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;
以及,在所述認證操作執行過程中至少一次執行如下切換操作:
將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;
基於所述終端設備接收所述第一無線存取點快取的所述資料報文;
將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
可選的,所述終端設備處於所述第一無線存取點和所述第二無線存取點二者無線網路覆蓋範圍的重疊區域內。
可選的,所述認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行所述切換操作。
可選的,所述認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段;
以及,在所述第一認證階段、所述第二認證階段和/或所述第三認證階段執行後,分別執行所述切換操作,並按照所述第一認證階段、所述切換操作、所述第二認證階段、所述切換操作、所述第三認證階段至所述切換操作的順序執行。
可選的,所述第一認證階段,採用如下方式實現:
建立所述終端設備與所述第二無線存取點之間的第二無線鏈路;
基於所述第二無線鏈路向所述第二無線存取點發送認證請求;
接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求;
針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊。
可選的,所述第二認證階段,採用如下方式實現:
接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息。
可選的,所述第三認證階段,採用如下方式實現:
接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點;
接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知;
接收所述第二無線存取點發送的輪詢報文;
針對所述輪詢報文向所述第二無線存取點發送相應的輪詢應答報文。
可選的,所述第三認證階段執行後,在執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點指令執行前,所述處理器702還用於執行如下計算機可執行指令:
判斷所述伺服請求是否執行完畢,若是,執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點指令;若否,執行所述基於所述終端設備接收所述第一無線存取點快取的所述資料報文指令。
可選的,所述基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作,採用如下方式實現:
建立所述終端設備與所述第二無線存取點之間的第二無線鏈路;
基於所述第二無線鏈路向所述第二無線存取點發送認證請求;
接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求;
針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊;
接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰;
利用所述密鑰對所述標識資訊對應的密碼資訊進行加密;
基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息;
接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點;
接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知。
可選的,所述第一無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式,且所述第二無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式;
其中,若所述第一無線存取點和/或所述第二無線存取點針對所述終端設備的模式為休眠模式,所述第一無線存取點和/或所述第二無線存取點將向所述終端設備發送的資料報文快取。
可選的,所述將所述終端設備從所述第二無線存取點切換回所述第一無線存取點,通過將所述第二無線存取點對於所述終端設備設置為所述休眠模式,並將所述第一無線存取點對於所述終端設備設置為所述工作模式實現。
可選的,所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點,通過將所述第一無線存取點對於所述終端設備設置為所述休眠模式,並將所述第二無線存取點對於所述終端設備設置為所述工作模式實現。
可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文指令執行前,所述處理器702還用於執行如下計算機可執行指令:
基於所述終端設備與所述第一無線存取點之間建立的第一無線鏈路,向所述可靠伺服管理平臺發起所述伺服請求;
基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。
可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文指令執行前,所述處理器702還用於執行如下計算機可執行指令:
判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。
可選的,所述終端設備包括:物聯網設備。
可選的,所述伺服請求包括:空中發卡請求。
本案提供的另一種電子設備實施例如下:
在上述的實施例中,提供了另一種支援無線網路切換的可靠伺服管理方法,此外,本案還提供了一種用於實現該方法的電子設備,下面結合附圖進行說明。
參照附圖8,其示出了本實施例提供的另一種電子設備的示意圖。
本案提供的所述電子設備實施例描述得比較簡單,相關的部分請參見上述提供的另一種支援無線網路切換的可靠伺服管理方法實施例的對應說明即可。下述描述的實施例僅僅是示意性的。
本案提供另一種電子設備,包括:
記憶體801和處理器802;
所述記憶體801用於儲存計算機可執行指令,所述處理器802用於執行所述計算機可執行指令:
從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知;
以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作:
從所述第二無線存取點切換到所述第一無線存取點;
接收所述第一無線存取點發送的其快取的所述資料報文;
從所述第一無線存取點切換到所述第二無線存取點;
其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。
可選的,所述處理器802還用於執行所述計算機可執行指令:
建立與所述第一無線存取點的第一無線鏈路;
基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。
可選的,所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知指令執行前,所述處理器802還用於執行所述計算機可執行指令:
判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,執行所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知指令。
可選的,所述伺服請求包括:空中發卡請求。
本案雖然以較佳實施例揭示如上,但其並不是用來限定本案,任何本領域技術人員在不脫離本案的精神和範圍內,都可以做出可能的變動和修改,因此本案的保護範圍應當以本案權利要求所界定的範圍為準。
在一個典型的配置中,計算設備包括一個或多個處理器、輸入/輸出介面、網路介面和記憶體。
記憶體可能包括計算機可讀媒體中的非永久性記憶體,隨機存取記憶體 (RAM) 和/或非揮發性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是計算機可讀媒體的示例。
計算機可讀媒體包括永久性和非永久性、可行動和非可行動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是計算機可讀指令、資料結構、程式的模組或其他資料。計算機的儲存媒體的例子包括,但不限於相變隨機存取記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,計算機可讀媒體不包括非暫態電腦可讀媒體(transitory media),如調變的資料訊號和載波。
本領域技術人員應明白,本案的實施例可提供為方法、系統或計算機程式產品。因此,本案可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。而且,本案可採用在一個或多個其中包含有計算機可用程式代碼的計算機可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的計算機程式產品的形式。
Numerous specific details are set forth in the description below to facilitate a full understanding of the case. However, this case can be implemented in many other ways than described here, and those skilled in the art can make similar promotion without violating the content of this case, so this case is not limited by the specific implementation disclosed below.
This case provides a reliable servo management method supporting wireless network switching. This case also provides a reliable servo management device supporting wireless network switching, another reliable servo management method and device supporting wireless network switching, and two electronic devices. The following describes each of the embodiments in detail with reference to the drawings of the embodiments provided in this case, and describes each step of the method.
An example of a reliable servo management method supporting wireless network switching provided in this case is as follows:
Referring to FIG. 1, it illustrates a processing flowchart of an embodiment of a reliable servo management method for supporting wireless network switching provided in this case, and with reference to FIG. 2, it illustrates a schematic diagram of a wireless network switching scenario provided in this case. Referring to FIG. 3, it shows a schematic diagram of a reliable servo management installation process supporting wireless network switching provided in the present case.
Step S101: After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable servo management platform for the servo request.
As shown in FIG. 2, the TSM server (ie, the reliable servo management platform) transmits data messages (APDU messages) to the terminal device through the wireless access point 1 (the first wireless access point, such as a Wi-Fi hotspot). In the process, data messages often need to be sent to the security chip (SE) of the terminal device one by one or in batches for execution. During the execution process, the connected wireless access point may change due to the change of location of the terminal device, such as the terminal The device roams from the wireless network coverage of wireless access point 1 to the wireless network coverage of wireless access point 2 (second wireless access point). During this roaming process, when the terminal device moves to the overlapping area of the wireless network coverage of both wireless access point 1 and wireless access point 2, the wireless network switching behavior occurs before roaming, that is, the terminal device Switching from wireless access point 1 to wireless access point 2 depends on many factors such as device performance, wireless access point performance, and network conditions in the actual application scenario. This wireless network switching behavior takes 1 to 5 seconds . During the wireless network switching, the terminal device will lose the connection with wireless access point 1, and try to establish a wireless connection with wireless access point 2, and switch from wireless access point 1 to wireless access point due to authentication. 2. Not only is there a delay, but it may also cause the connection between the TSM server and the terminal device to be interrupted, or even the loss of data messages, which ultimately leads to the failure of the reliable servo management process. The reliable servo management method supporting wireless network switching provided in this case, in order to ensure that data messages are not lost during the wireless network switching process, and at the same time reduce the delay caused by the wireless network switching process, Switching back and forth between point 1 and wireless access point 2 not only guarantees the connection between the terminal device and the TSM server through wireless access point 1 but also avoids the loss of data messages and ensures the normal operation of the reliable servo management process. The connection between the terminal device and the wireless access point 2 remains normal, reducing the delay caused by the wireless network switching process.
The embodiment in this case uses the application of over-the-air downloading in the process of reliable servo management or the creation of a secure domain (that is, over-the-air card issuing) in the SE as an example. As shown in FIG. 3, before the wireless network switch, the terminal device and A first wireless link established between the access points 1 initiates a servo request to the TSM server and receives a data message returned by the TSM server for the servo request based on the first wireless link. Preferably, the servo request refers to a card issuing request in the air, and the terminal device refers to an Internet of Things device in the scenario of card issuing in the air. That is, before the IoT device is switched from wireless access point 1 to wireless access point 2, the IoT device communicates with the TSM server through wireless access point 1, specifically, the IoT device initiates OTA (Over The Air) through the TSM SDK. ) Request, that is, a card issuance request in the air, such as a request for creating a security domain in the SE, and installing an application in the air in the SE, and the wireless access point 1 forwards the OTA request to the TSM server. After receiving the OTA request, the TSM server processes the OTA request and generates the corresponding APDU instruction script, and sends the generated APDU instruction script to the wireless access point 1 one by one or in batches in the form of APDU messages. The wireless access point 1 forwards it to the TSM SDK on the IoT device side, and the final APDU message is written into the SE for execution.
It should be noted that in the process of switching the IoT device from the wireless access point 1 to the wireless access point 2 in the embodiment of the present case, the IoT device needs to be in the wireless network of both the wireless access point 1 and the wireless access point 2. Road coverage within the overlapping area. Preferably, before switching from the wireless access point 1 to the wireless access point 2, the IoT device can also determine whether the signal strength of the wireless network of the wireless access point 2 is greater than that of the wireless access point 1 through the following judgment operation. If the signal strength of the wireless network is greater than, the IoT device will be switched from wireless access point 1 to wireless access point 2; if the wireless signal strength of wireless access point 2 is less than or equal to wireless access point 1 wireless The signal strength of the network can be re-detected and compared after a delay of a certain time interval, and the signal strengths of both the wireless access point 1 and the wireless access point 2 can be compared, and whether to switch is determined based on the comparison result.
In this embodiment, the characteristics of the IEEE 802.11 standard supporting multi-channel communication can be used to communicate with the wireless access point 1, and perform an authentication process on the wireless access point 2, so as to establish an IoT device and a TSM server through the wireless access point 2. Connection. In a preferred implementation provided by the embodiment of the present case, the wireless access point is used to switch between the wireless access point 1 and the wireless access point 2 in two modes (working mode and sleep mode) for the IoT device. First, if the wireless access point 1 or the wireless access point 2 is in a sleep mode for the IoT device, after the wireless access point 1 or the wireless access point 2 receives the APDU message issued by the TSM server, the APDU The message is stopped being forwarded to the IoT device, but the wireless access point 1 or wireless access point 2 caches the APDU message locally. This requires wireless access point 1 and wireless access point 2 to have cached APDUs. The function of the message. Secondly, if the wireless access point 1 or wireless access point 2 is in the working mode for the IoT device, the wireless access point 1 or wireless access point 2 will receive the APDU message issued by the TSM server, and then The APDU message can be forwarded to the IoT device normally.
For example, when the IoT device is switched from the wireless access point 1 to the wireless access point 2, the IoT device authenticates with the wireless access point 2 to establish a connection. At this time, the wireless access point 1 is When the device mode is set to sleep mode, the wireless access point 1 will cache the APDU message locally after receiving the APDU message sent from the TSM server. When the IoT device is switched from the wireless access point 2 to the wireless access point 1, the mode of the wireless access point 1 for the IoT device is switched from the sleep mode to the working mode. Based on this, the wireless storage device Access point 1 will forward the previously cached APDU message to the IoT device.
In this step, after detecting that the IoT device is switched from the wireless access point 1 to the wireless access point 2, the wireless access point 1 is notified to cache the data message returned by the TSM server in response to the OTA request. For example, the mode of wireless access point 1 for IoT devices is switched from working mode to sleep mode, and the mode of wireless access point 2 for IoT devices is switched from sleep mode to working mode. After the mode switch is performed, TSM servo The APDU message sent from the device to the IoT device is cached at the wireless access point 1, and is sent to the IoT device after the wireless access point 1 resumes the working mode for the IoT device.
In step S102, an authentication operation is initiated to the reliable servo management platform based on the second wireless access point.
As described above, the above step S101 switches the mode of the wireless access point 2 for the IoT device to the working mode. Based on this step, the wireless access point 2 initiates an authentication operation to the TSM server through the wireless access point. 2 Establish a connection between the IoT device and the TSM server to ensure that after the IoT device is finally switched to the wireless access point 2, the data message transmission between the wireless access point 2 and the TSM server can be maintained. Preferably, the authentication operation may be performed by decomposing the authentication operation into multiple authentication phases, and the IoT device is removed from the wireless access point at least once before, during, or after each authentication phase. 2 Switch back to the wireless access point 1 switching operation.
In a preferred implementation manner provided by the embodiment of the present case, the authentication phase after the authentication operation is decomposed includes a first authentication phase, a second authentication phase, and a third authentication phase, and in the first authentication phase, the second authentication phase, After the authentication phase and the third authentication phase are performed, a switching operation for switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed respectively, and the specific execution sequence is as follows: the first authentication phase-> will Switching operation of IoT device switching from wireless access point 2 to wireless access point 1-> said second authentication phase-> switching operation of switching IoT device from wireless access point 2 to wireless access point 1- > The third authentication stage-> Switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1.
(1) The first authentication phase is preferably implemented in the following manner:
Establishing a second wireless link between the IoT device and the wireless access point 2;
Sending an authentication request to the wireless access point 2 based on the second wireless link;
Receiving the identification information acquisition request returned by the wireless access point 2 in response to the authentication request;
A response frame is sent to the wireless access point 2 in response to the identification information acquisition request; the response frame includes identification information corresponding to the IoT device.
For example, as shown in FIG. 3, in the first authentication phase, the wireless access point 1 enters the sleep mode for the IoT device. Therefore, after receiving the APDU packet issued by the TSM server, the wireless access point 1 wirelessly stores the wireless access point 1. Fetch point 1 caches the APDU packets delivered by the local TSM server. At the same time, when the wireless access point 2 enters the working mode for the IoT device, the IoT device initiates a connection request to the wireless access point 2 to establish a wireless connection between the IoT device and the wireless access point 2, because the original The status is unauthenticated, so at this time, no data packet can be received and sent between the wireless access point 2 and the IoT device except the IEEE 802.1x protocol packet.
After establishing a wireless connection between the IoT device and the wireless access point 2, the IoT device sends an authentication request (EAPOL-Start) to the wireless access point 2 through the wireless connection to start the authentication process. After receiving the authentication request from the IoT device, the wireless access point 2 sends an Identity type EAP request (EAP-Request / Identity) to the IoT device, and requests the IoT device to send its identity to the wireless access Point 2. After receiving the EAP request (EAP-Request / Identity) of the wireless access point 2, the IoT device sends the identification information to the wireless access point 2 through an Identity type EAP response frame (EAP-Response / Identity), and responds The EAP request (EAP-Request / Identity) sent by the wireless access point 2 is thereafter sent by the wireless access point 2 to the TSM server for processing the EAP response frame (EAP-Response / Identity).
As shown in FIG. 3, after the execution of the first authentication phase is completed, a switching operation for switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed. For details, refer to steps S103 to S105 described below. A detailed description of the switching operation.
(2) The second authentication phase is preferably implemented in the following manner:
Receiving a challenge message sent by the wireless access point 2; the challenge message includes a key for encrypting password information;
Encrypting password information corresponding to the identification information by using the key;
Sending a response message including the encrypted password information to the TSM server based on the second wireless link.
For example, as shown in FIG. 3, in the second authentication phase, the wireless access point 1 enters the sleep mode for the IoT device. Therefore, after receiving the APDU message sent by the TSM server, the wireless access point 1 wirelessly stores the wireless access point 1. Fetch point 1 caches the APDU packets delivered by the local TSM server. After the TSM server receives the request from the wireless access point 2 (that is, the EAP response frame (EAP-Response / Identity)), it extracts the identification information corresponding to the IoT device from it, and then uses the identification information and the Compare the identification information list, find the password information corresponding to the identification information, and encrypt the password with a randomly generated MD5 Challenge message, and then encapsulate this MD5 Challenge message in the EAPOR format and send it in an Access-Challenge message to the wireless access Point 2. After receiving the EAPOR format Access-Challenge message from the TSM server, the wireless access point 2 decapsulates and forwards the MD5 Challenge message to the IoT device. After receiving the MD5 Challenge message (that is, the challenge message) forwarded by the wireless access point 2, the IoT device uses the Challenge message to encrypt the password part, and then generates an EAP-Response / MD5 Challenge message. The EAP-Response / MD5 Challenge message (that is, the response message) is sent to the wireless access point 2. The wireless access point 2 encapsulates this EAP-Response / MD5 Challenge message in an EAPOR format in a message (Access-Request) and sends it to the TSM server.
As shown in FIG. 3, after the execution of the second authentication phase is completed, a switching operation for switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed. For details, refer to steps S103 to S105 below. A detailed description of the switching operation.
(3) The third authentication stage is preferably implemented in the following manner:
Receiving an authentication pass message sent by the wireless access point 2; the authentication pass message is sent to the wireless access point 2 after the password information included in the response message is verified by the TSM server;
Receiving a notification from its wireless access point 2 that its port authorizes access to the IoT device;
Receiving a polling message sent by the wireless access point 2;
A corresponding polling response message is sent to the wireless access point 2 for the polling message.
For example, as shown in FIG. 3, in the third authentication stage, the wireless access point 1 enters the sleep mode for the IoT device. Therefore, after receiving the APDU packet issued by the TSM server, the wireless access point 1 wirelessly stores the wireless access point 1. Fetch point 1 caches the APDU packets delivered by the local TSM server. After receiving the Access-Request message from the wireless access point 2 containing the encrypted password information, the TSM server compares the encrypted password information with the local encrypted operation. The wireless access point 2 sends an authentication-accept message (Access-Accept). After the wireless access point 2 receives the Access-Accept message, it de-encapsulates it and sends it to the IoT device as an EAP-Success message, and changes the port to an authorized state, allowing the IoT device to access through the port.
In addition, when the connection between the IoT device and the wireless access point 2 is online, the wireless access point 2 will periodically send a Handshake Request (polling message) to the IoT device to monitor the online status of the IoT device. The IoT device sends a Handshake Response (polling response message) to the wireless access point 2 after receiving the Handshake Request (polling message), which indicates that the connection between the IoT device and the wireless access point 2 is still online.
As shown in FIG. 3, after the execution of the above-mentioned first authentication phase, a switching operation for switching the Internet of Things device from the wireless access point 2 to the wireless access point 1 is performed. A detailed description of the switching operation.
In specific implementation, in addition to the implementation of the method for decomposing the authentication operation into 3 authentication phases, the method can also be performed by decomposing the authentication operation into 1, 2, 4, or even more authentication phases. The specific implementation manner is similar to the manner of decomposing the authentication operation into three authentication phases provided above. For example, decomposing the authentication operation into an authentication phase specifically includes: establishing a second wireless link between the IoT device and the wireless access point 2, and sending the second wireless link to the wireless access point 2 based on the second wireless link. The authentication request receives the identification information acquisition request returned by the wireless access point 2 in response to the authentication request, and sends a response frame to the wireless access point 2 in response to the identification information acquisition request, and the response frame includes a corresponding response of the IoT device. Receiving the challenge information sent by the wireless access point 2, the challenge message includes a key for encrypting the password information, and using the key to encrypt the password information corresponding to the identifier information, based on the The second wireless link sends a response message including the encrypted password information to the TSM server; receives an authentication pass message sent by the wireless access point 2, and the TSM server responds to the response message with the authentication pass message The password information contained in the password information is sent to the wireless access point 2 after receiving the pass, and the port sent by the wireless access point 2 is authorized to access the IoT device. .
Step S103: Switch the terminal device from the second wireless access point back to the first wireless access point.
It should be noted that this step and the following step S104 and the following step S105 collectively constitute a switching operation for switching the Internet of Things device from the wireless access point 2 to the wireless access point 1. In the embodiment of this case, the The premise of performing the switching operation of the device switching from the wireless access point 2 to the wireless access point 1 is after the execution of the first authentication phase, the second authentication phase, and the third authentication phase, respectively. Specifically, as shown in FIG. 3, the switching operation of switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed for the first time, after the first authentication phase is performed, and The second authentication phase is performed before execution. The second operation of switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed for the second time after the second authentication phase is performed and before the third authentication phase is performed. The switching operation of switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed for the third time, after the third authentication phase is performed.
As mentioned above, the wireless access point 1 sets the sleep mode and the working mode for the IoT device and the wireless access point 2. Based on this, this step switches the IoT device from the wireless access point 2 to wireless access. Point 1 is preferably implemented by setting the mode of the wireless access point 2 for the Internet of Things device to the sleep mode, and setting the mode of the wireless access point 1 for the Internet of Things device to the working mode.
Step S104: Receive the data message cached by the first wireless access point based on the terminal device.
After the IoT device is switched from the wireless access point 2 to the wireless access point 1 in the above step S103, this step is based on the IoT device receiving the cached data message of the wireless access point 1 and sending the received data The message is transmitted to the security chip set by the IoT device for execution, and the execution result of the security chip for the data message is returned to the TSM server through the wireless access point 1.
Step S105: Switch the terminal device from the first wireless access point to the second wireless access point.
As described above, the wireless access point 1 has two modes of sleep mode and work mode for the IoT device and the wireless access point 2. Based on this, this step switches the IoT device from the wireless access point 1 to the wireless access. Point 2 is preferably implemented by setting the mode of the wireless access point 1 for the Internet of Things device to the sleep mode, and setting the mode of the wireless access point 2 for the Internet of Things device to the working mode.
In a preferred implementation provided by the embodiment of the present case, after the third authentication stage is performed, before performing this step to switch the IoT device from the wireless access point 1 to the wireless access point 2, the following judgment operation may be performed. To determine whether the execution of the card issuing request in the air is completed, and if the execution is completed, execute this step to switch the IoT device from the wireless access point 1 to the wireless access point 2, and the IoT device communicates with the TSM servo through the wireless access point 2 The device performs data message transmission; if the card issuing request in the air has not yet been completed, return to step S104 above, and based on the IoT device, receive the data message issued by the TSM server of the wireless access point 1 cache, and The security chip provided by the networked device executes the data message.
As shown in FIG. 3, after all the three authentication phases of the above authentication operation are performed, and after the third switching operation consisting of the above steps S103 to S105 is performed for the third time, the IoT device is completed from Switching operation from wireless access point 1 to wireless access point 2. After this switching operation, the data message transmission between the IoT device and the TSM server is completed through wireless access point 2 to achieve the Internet of Things "Seamless handover" of devices from wireless access point 1 to wireless access point 2, because during the above switching operation, the IoT device is switched between wireless access point 1 and wireless access point 2 Switch back and forth, on the one hand, to avoid the loss of data messages transmitted between the IoT device and the TSM server, to ensure the normal operation of card issuing in the air; on the other hand, to complete the authentication operation of the IoT device on the TSM server through the wireless access point 2 , So that after the IoT device is finally switched to the wireless access point 2, the IoT device can realize the normal access to the TSM server through the wireless access point 2. During this switching process, Both households imperceptible connection is interrupted, even imperceptible due to a delay certification produced, thus "seamless handover."
In summary, the reliable servo management method for supporting wireless network switching, in the process of switching IoT devices from wireless access point 1 to wireless access point 2, on the one hand, based on wireless access point 2 to TSM The server initiates an authentication operation in order to establish a connection between the IoT device and the TSM server. At the same time, during the execution of the authentication operation, the IoT device is moved back and forth between the wireless access point 2 and the wireless access point 1. Switching to avoid the failure of card issuance in the air caused by the loss of data messages during the wireless network switching process. At the same time, it also ensures that the IoT device can access the TSM server normally after switching to the wireless access point 2, which reduces the occurrence of the wireless network switching process. Delay.
An example of a reliable servo management device supporting wireless network switching provided in this case is as follows:
In the above embodiments, a reliable servo management method for supporting wireless network switching is provided. Correspondingly, this case also provides a reliable servo management device for supporting wireless network switching, which will be described below with reference to the drawings.
Referring to FIG. 4, a schematic diagram of an embodiment of a reliable servo management device supporting wireless network handover provided by the present application is shown.
Since the device embodiment is basically similar to the method embodiment, it is described relatively simply. For related parts, please refer to the corresponding description of the method embodiment provided above. The device embodiments described below are only schematic.
This case provides a reliable servo management device that supports wireless network switching, including:
The data message cache unit 401 is configured to notify the first wireless access point cache reliable servo management platform to return to the servo request after detecting that the terminal device switches from the first wireless access point to the second wireless access point. Information message
An authentication operation initiating unit 402, configured to initiate an authentication operation to the reliable servo management platform based on the second wireless access point;
And, the first switching unit 403, the data message receiving unit 404, and the second switching unit 405 are run at least once during the operation of the authentication operation initiation unit;
The first switching unit 403 is configured to switch the terminal device from the second wireless access point back to the first wireless access point;
The data message receiving unit 404 is configured to receive the data message cached by the first wireless access point based on the terminal device;
The second switching unit 405 is configured to switch the terminal device from the first wireless access point to the second wireless access point.
Optionally, the terminal device is located in an overlapping area of wireless network coverage of both the first wireless access point and the second wireless access point.
Optionally, the authentication operation is performed by being decomposed into multiple authentication phases, and the switching operation is performed at least once before, during, or after each authentication phase.
Optionally, the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase;
And after the first authentication phase, the second authentication phase, and / or the third authentication phase are performed, the switching operation is performed respectively, and the switching operation is performed according to The second authentication phase, the switching operation, and the third authentication phase to the switching operation are performed in order.
Optionally, the first authentication phase includes:
A second wireless link establishment subunit, configured to establish a second wireless link between the terminal device and the second wireless access point;
An authentication request sending subunit, configured to send an authentication request to the second wireless access point based on the second wireless link;
An identification information acquisition request receiving subunit, configured to receive an identification information acquisition request returned by the second wireless access point for the authentication request;
A response frame sending subunit is configured to send a response frame to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device.
Optionally, the second authentication phase includes:
A challenge message receiving subunit, configured to receive a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information;
An encryption subunit, configured to use the key to encrypt password information corresponding to the identification information;
A response message sending subunit is configured to send a response message including the encrypted password information to the reliable servo management platform based on the second wireless link.
Optionally, the third authentication phase includes:
The authentication pass message receiving subunit is configured to receive the authentication pass message sent by the second wireless access point; the authentication pass message is sent by the reliable servo management platform to the password included in the response message. Sending the information to the second wireless access point after passing the information verification;
A port authorization notification receiving subunit, configured to receive a notification that its port is authorized to access the terminal device sent by the second wireless access point;
A polling message receiving subunit, configured to receive a polling message sent by the second wireless access point;
A polling response message sending subunit is configured to send a corresponding polling response message to the second wireless access point for the polling message.
Optionally, the authentication operation initiation unit 402 includes:
The judging subunit is configured to judge whether the execution of the servo request is completed. If yes, run the second switching unit 405; if not, run the data message receiving unit 404.
Optionally, the authentication operation initiation unit 402 includes:
A first subunit, configured to establish a second wireless link between the terminal device and the second wireless access point;
A second subunit, configured to send an authentication request to the second wireless access point based on the second wireless link;
A third subunit, configured to receive an identification information acquisition request returned by the second wireless access point for the authentication request;
A fourth subunit, configured to send a response frame to the second wireless access point for the identification information acquisition request; the response frame includes identification information corresponding to the terminal device;
A fifth subunit, configured to receive a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information;
A sixth subunit, configured to use the key to encrypt password information corresponding to the identification information;
A seventh subunit, configured to send a response message including the encrypted password information to the reliable servo management platform based on the second wireless link;
An eighth subunit, configured to receive an authentication pass message sent by the second wireless access point; the authentication pass message is verified by the reliable servo management platform for the password information included in the response message Sending it to the second wireless access point;
The ninth sub-unit is configured to receive a notification that its port sends authorized access to the terminal device sent by the second wireless access point.
Optionally, the mode of the first wireless access point for the terminal device includes an operating mode and / or a sleep mode, and the mode of the second wireless access point for the terminal device includes an operating mode and / or Sleep mode
Wherein, if a mode of the first wireless access point and / or the second wireless access point for the terminal device is a sleep mode, the first wireless access point and / or the second wireless storage point The fetch point caches the data message sent to the terminal device.
Optionally, the first switching unit 403 sets the second wireless access point to the terminal device to the sleep mode, and sets the first wireless access point to the terminal device. Implemented for the working mode.
Optionally, the second switching unit 405 sets the first wireless access point to the terminal device to the sleep mode, and sets the second wireless access point to the terminal device. Implemented for the working mode.
Optionally, the reliable servo management device supporting wireless network switching includes:
A servo request sending unit, configured to initiate the servo request to the reliable servo management platform based on a first wireless link established between the terminal device and the first wireless access point;
A data message receiving unit is configured to receive the data message returned by the reliable servo management platform for the servo request based on the first wireless link.
Optionally, the reliable servo management device supporting wireless network switching includes:
The signal strength judgment unit is configured to determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, remove the terminal device from the first wireless access point. A wireless access point switches to the second wireless access point.
Optionally, the terminal device includes: an Internet of Things device.
Optionally, the servo request includes: a card issuing request in the air.
The implementation of another reliable servo management method supporting wireless network switching provided in this case is as follows:
In the above embodiment, a reliable servo management method supporting wireless network switching is provided. In cooperation with this case, this case also provides another reliable servo management method supporting wireless network switching, which is implemented based on a terminal device. Figure for illustration.
Referring to FIG. 5, it illustrates a processing flowchart of another embodiment of a reliable servo management method for supporting wireless network switching provided in the present case.
Since this method embodiment corresponds to the method embodiment provided above, it is described relatively simply. For related parts, please refer to the corresponding description of the method embodiment provided above. The method embodiments described below are merely exemplary.
This case provides a reliable servo management method that supports wireless network switching, including:
Step S501: switching from a first wireless access point to a second wireless access point, and sending a notification of a cached data message to the first wireless access point;
And, after switching from the first wireless access point to the second wireless access point, performing at least one of the following switching operations:
Step S502, switching from the second wireless access point to the first wireless access point;
Step S503: Receive the cached data message sent by the first wireless access point;
Step S504, switching from the first wireless access point to the second wireless access point;
The data message is returned by a reliable servo management platform in response to a servo request.
Optionally, the reliable servo management method supporting wireless network switching includes:
Establishing a first wireless link with the first wireless access point;
Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link.
Optionally, before step S501 is performed, perform the following steps:
Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, execute step S501 to switch from the first wireless access point to the second wireless access point A wireless access point, and sending a notification of a cached data message to the first wireless access point.
Optionally, the servo request includes: a card issuing request in the air.
An example of another reliable servo management device supporting wireless network switching provided in this case is as follows:
In the above-mentioned embodiment, another reliable servo management method for supporting wireless network switching is provided. Correspondingly, this case also provides another reliable servo management device for supporting wireless network switching. Instructions.
Referring to FIG. 6, it illustrates a schematic diagram of another embodiment of a reliable servo management device supporting wireless network switching provided in this case.
Since the device embodiment is basically similar to the method embodiment, it is described relatively simply. For related parts, please refer to the corresponding description of the method embodiment provided above. The device embodiments described below are only schematic.
This case provides another reliable servo management device that supports wireless network switching, including:
A switching notification unit 601, configured to switch from a first wireless access point to a second wireless access point, and send a notification of a cached data message to the first wireless access point;
And after running from the switching notification unit 601, the wireless access point switching unit 602, the cached data message receiving unit 603, and the wireless access point secondary switching unit 604 are run at least once;
The wireless access point switching unit 602 is configured to switch from the second wireless access point to the first wireless access point;
The cached data message receiving unit 603 is configured to receive the cached data message sent by the first wireless access point;
The wireless access point secondary switching unit 604 is configured to switch from the first wireless access point to the second wireless access point;
The data message is returned by a reliable servo management platform in response to a servo request.
An example of an electronic device provided in this case is as follows:
In the above embodiment, a reliable servo management method for supporting wireless network switching is provided. In addition, this case also provides an electronic device for implementing the reliable servo management method for supporting wireless network switching. Figure for illustration.
Referring to FIG. 7, a schematic diagram of an electronic device according to this embodiment is shown.
The embodiment of the electronic device provided in this case is relatively simple. For related parts, please refer to the corresponding description of the embodiment of the reliable servo management method for supporting wireless network switching provided above. The embodiments described below are merely exemplary.
This case provides an electronic device, including:
A memory 701 and a processor 702;
The memory 701 is configured to store computer-executable instructions, and the processor 702 is configured to execute the following computer-executable instructions:
After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notifying the first wireless access point to cache the data message returned by the reliable servo management platform for the servo request;
Initiate an authentication operation to the reliable servo management platform based on the second wireless access point;
And, the following switching operation is performed at least once during the execution of the authentication operation:
Switching the terminal device from the second wireless access point back to the first wireless access point;
Receiving the data message cached by the first wireless access point based on the terminal device;
Switching the terminal device from the first wireless access point to the second wireless access point.
Optionally, the terminal device is located in an overlapping area of wireless network coverage of both the first wireless access point and the second wireless access point.
Optionally, the authentication operation is performed by being decomposed into multiple authentication phases, and the switching operation is performed at least once before, during, or after each authentication phase.
Optionally, the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase;
And after the first authentication phase, the second authentication phase, and / or the third authentication phase are performed, the switching operation is performed respectively, and the switching operation is performed according to The second authentication phase, the switching operation, and the third authentication phase to the switching operation are performed in order.
Optionally, the first authentication phase is implemented in the following manner:
Establishing a second wireless link between the terminal device and the second wireless access point;
Sending an authentication request to the second wireless access point based on the second wireless link;
Receiving an identification information acquisition request returned by the second wireless access point for the authentication request;
Sending a response frame to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device.
Optionally, the second authentication phase is implemented in the following manner:
Receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information;
Encrypting password information corresponding to the identification information by using the key;
Sending a response message including the encrypted password information to the reliable servo management platform based on the second wireless link.
Optionally, the third authentication phase is implemented in the following manner:
Receiving an authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second by the reliable servo management platform after the password information included in the response message is verified Wireless access point
Receiving a notification that its port sends authorized access to the terminal device sent by the second wireless access point;
Receiving a polling message sent by the second wireless access point;
Sending a corresponding polling response message to the second wireless access point for the polling message.
Optionally, after the third authentication phase is performed, before the execution of the instruction of switching the terminal device from the first wireless access point to the second wireless access point is executed, the processor 702 It is also used to execute the following computer-executable instructions:
Determine whether the servo request is completed, and if so, execute the instruction for switching the terminal device from the first wireless access point to the second wireless access point; if not, execute the terminal-based The device receives the data message instruction cached by the first wireless access point.
Optionally, the initiating an authentication operation to the reliable servo management platform based on the second wireless access point is implemented in the following manner:
Establishing a second wireless link between the terminal device and the second wireless access point;
Sending an authentication request to the second wireless access point based on the second wireless link;
Receiving an identification information acquisition request returned by the second wireless access point for the authentication request;
Sending a response frame to the second wireless access point for the identification information acquisition request; the response frame includes identification information corresponding to the terminal device;
Receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information;
Encrypting password information corresponding to the identification information by using the key;
Sending a response message including the encrypted password information to the reliable servo management platform based on the second wireless link;
Receiving an authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second by the reliable servo management platform after the password information included in the response message is verified Wireless access point
Receiving a notification that its port is authorized to access the terminal device sent by the second wireless access point.
Optionally, the mode of the first wireless access point for the terminal device includes an operating mode and / or a sleep mode, and the mode of the second wireless access point for the terminal device includes an operating mode and / or Sleep mode
Wherein, if a mode of the first wireless access point and / or the second wireless access point for the terminal device is a sleep mode, the first wireless access point and / or the second wireless storage point The fetch point caches the data message sent to the terminal device.
Optionally, the switching the terminal device from the second wireless access point back to the first wireless access point, by setting the second wireless access point to the terminal device as the The sleep mode is implemented by setting the first wireless access point to the terminal device in the working mode.
Optionally, the switching the terminal device from the first wireless access point to the second wireless access point, by setting the first wireless access point to the terminal device as the The sleep mode is implemented by setting the second wireless access point to the terminal device in the working mode.
Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, the first wireless access point is notified to cache the reliable message from the servo management platform in response to the servo request. Before the instructions are executed, the processor 702 is further configured to execute the following computer-executable instructions:
Initiating the servo request to the reliable servo management platform based on a first wireless link established between the terminal device and the first wireless access point;
Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link.
Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, the first wireless access point is notified to cache the reliable message from the servo management platform in response to the servo request. Before the instructions are executed, the processor 702 is further configured to execute the following computer-executable instructions:
Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, switch the terminal device from the first wireless access point to The second wireless access point.
Optionally, the terminal device includes: an Internet of Things device.
Optionally, the servo request includes: a card issuing request in the air.
Another example of an electronic device provided in this case is as follows:
In the above embodiment, another reliable servo management method for supporting wireless network switching is provided. In addition, this case also provides an electronic device for implementing the method, which is described below with reference to the accompanying drawings.
Referring to FIG. 8, a schematic diagram of another electronic device according to this embodiment is shown.
The embodiment of the electronic device provided in this case is relatively simple. For related parts, please refer to the corresponding description of the embodiment of another reliable servo management method for supporting wireless network switching provided above. The embodiments described below are merely exemplary.
This case provides another electronic device, including:
Memory 801 and processor 802;
The memory 801 is configured to store computer-executable instructions, and the processor 802 is configured to execute the computer-executable instructions:
Switching from a first wireless access point to a second wireless access point, and sending a notification of a cached data message to the first wireless access point;
And, after switching from the first wireless access point to the second wireless access point, performing at least one of the following switching operations:
Switching from the second wireless access point to the first wireless access point;
Receiving the cached data message sent by the first wireless access point;
Switching from the first wireless access point to the second wireless access point;
The data message is returned by a reliable servo management platform in response to a servo request.
Optionally, the processor 802 is further configured to execute the computer-executable instructions:
Establishing a first wireless link with the first wireless access point;
Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link.
Optionally, before switching from the first wireless access point to the second wireless access point and sending a notification instruction of a cached data message to the first wireless access point, the processor 802 further For executing the computer-executable instructions:
Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, perform the switching from the first wireless access point to the second wireless storage point Fetch a point, and send a notification instruction of a cached data message to the first wireless access point.
Optionally, the servo request includes: a card issuing request in the air.
Although the present case is disclosed above with a preferred embodiment, it is not intended to limit the case. Any person skilled in the art can make possible changes and modifications without departing from the spirit and scope of the case. Therefore, the protection scope of the case Subject to the scope defined by the claims in this case.
In a typical configuration, a computing device includes one or more processors, an input / output interface, a network interface, and memory.
Memory may include non-permanent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flash) RAM). Memory is an example of a computer-readable medium.
Computer-readable media includes permanent and non-permanent, removable and non-removable media. Information can be stored by any method or technology. Information can be computer-readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change random access memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable and programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), Digital versatile discs (DVDs) or other optical storage, magnetic tape cartridges, magnetic disk storage or other magnetic storage devices or any other non-transmitting media may be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include non-transitory computer-readable media (such as modulated data signals and carrier waves).
Those skilled in the art should understand that the embodiments of the present invention may be provided as a method, a system, or a computer program product. Therefore, this case may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this case may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer-usable program code.

1‧‧‧無線存取點1‧‧‧Wireless Access Point

2‧‧‧無線存取點 2‧‧‧Wireless Access Point

401‧‧‧資料報文快取單元 401‧‧‧data message cache unit

402‧‧‧認證操作發起單元 402‧‧‧Authentication Operation Initiation Unit

403‧‧‧第一切換單元 403‧‧‧first switching unit

404‧‧‧資料報文接收單元 404‧‧‧data message receiving unit

405‧‧‧第二切換單元 405‧‧‧Second switching unit

601‧‧‧切換通知單元 601‧‧‧Switch notification unit

602‧‧‧無線存取點切換單元 602‧‧‧Wireless Access Point Switching Unit

603‧‧‧快取資料報文接收單元 603‧‧‧Cache data message receiving unit

604‧‧‧無線存取點二次切換單元 604‧‧‧Wireless access point secondary switching unit

701‧‧‧記憶體 701‧‧‧Memory

702‧‧‧處理器 702‧‧‧ processor

801‧‧‧記憶體 801‧‧‧Memory

802‧‧‧處理器 802‧‧‧ processor

S101‧‧‧步驟 S101‧‧‧step

S102‧‧‧步驟 S102‧‧‧step

S103‧‧‧步驟 S103‧‧‧step

S104‧‧‧步驟 S104‧‧‧step

S105‧‧‧步驟 S105‧‧‧step

S501‧‧‧步驟 S501‧‧‧step

S502‧‧‧步驟 S502‧‧‧step

S503‧‧‧步驟 S503‧‧‧step

S504‧‧‧步驟 S504‧‧‧step

附圖1是本案提供的一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖;FIG. 1 is a processing flowchart of an embodiment of a reliable servo management method supporting wireless network switching provided by the present case;

附圖2是本案提供的一種無線網路切換場景的示意圖; FIG. 2 is a schematic diagram of a wireless network switching scenario provided by the present case;

附圖3是本案提供的一種支援無線網路切換的可靠伺服管理裝過程的示意圖; FIG. 3 is a schematic diagram of a reliable servo management installation process supporting wireless network switching provided by the present case; FIG.

附圖4是本案提供的一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖; FIG. 4 is a schematic diagram of an embodiment of a reliable servo management device supporting wireless network switching provided by the present case; FIG.

附圖5是本案提供的另一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖; FIG. 5 is a processing flowchart of another embodiment of a reliable servo management method for supporting wireless network switching provided by the present case; FIG.

附圖6是本案提供的另一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖; FIG. 6 is a schematic diagram of another embodiment of a reliable servo management device supporting wireless network switching provided by the present case; FIG.

附圖7是本案提供的一種電子設備實施例的示意圖; FIG. 7 is a schematic diagram of an embodiment of an electronic device provided by the present application; FIG.

附圖8是本案提供的另一種電子設備實施例的示意圖。 FIG. 8 is a schematic diagram of another embodiment of an electronic device provided by the present application.

Claims (24)

一種支援無線網路切換的可靠伺服管理方法,包括: 檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 基於該第二無線存取點向該可靠伺服管理平臺發起認證操作; 以及,在該認證操作執行過程中至少一次執行如下切換操作: 將該終端設備從該第二無線存取點切換回該第一無線存取點; 基於該終端設備接收該第一無線存取點快取的該資料報文; 將該終端設備從該第一無線存取點切換到該第二無線存取點。A reliable servo management method supporting wireless network switching, including: After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable servo management platform in response to the servo request; Initiate an authentication operation to the reliable servo management platform based on the second wireless access point; And, during the execution of the authentication operation, the following switching operation is performed at least once: Switching the terminal device from the second wireless access point back to the first wireless access point; Receiving the data message cached by the first wireless access point based on the terminal device; Switching the terminal device from the first wireless access point to the second wireless access point. 根據申請專利範圍第1項之支援無線網路切換的可靠伺服管理方法,其中,該終端設備處於該第一無線存取點和該第二無線存取點二者無線網路覆蓋範圍的重疊區域內。The reliable servo management method for supporting wireless network switching according to item 1 of the scope of patent application, wherein the terminal device is located in an overlapping area of wireless network coverage of both the first wireless access point and the second wireless access point. Inside. 根據申請專利範圍第2項之支援無線網路切換的可靠伺服管理方法,其中,該認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行該切換操作。The reliable servo management method for supporting wireless network switching according to item 2 of the scope of patent application, wherein the authentication operation is performed by decomposing into multiple authentication phases, and before, during, or during each authentication phase Then, perform the switching operation at least once. 根據申請專利範圍第3項之支援無線網路切換的可靠伺服管理方法,其中,該認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段; 以及,在該第一認證階段、該第二認證階段和/或該第三認證階段執行後,分別執行該切換操作,並按照該第一認證階段、該切換操作、該第二認證階段、該切換操作、該第三認證階段至該切換操作的順序執行。The reliable servo management method for supporting wireless network switching according to item 3 of the patent application scope, wherein the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase; And, after the first authentication phase, the second authentication phase, and / or the third authentication phase are performed, the switching operation is performed respectively, and according to the first authentication phase, the switching operation, the second authentication phase, the The switching operation and the third authentication phase to the switching operation are performed in order. 根據申請專利範圍第4項之支援無線網路切換的可靠伺服管理方法,其中,該第一認證階段,採用如下方式實現: 建立該終端設備與該第二無線存取點之間的第二無線鏈路; 基於該第二無線鏈路向該第二無線存取點發送認證請求; 接收該第二無線存取點針對該認證請求返回的標識資訊獲取請求; 針對該標識資訊獲取請求向該第二無線存取點發送響應幀;該響應幀中包含該終端設備對應的標識資訊。The reliable servo management method supporting wireless network switching according to item 4 of the scope of patent application, wherein the first authentication phase is implemented as follows: Establishing a second wireless link between the terminal device and the second wireless access point; Sending an authentication request to the second wireless access point based on the second wireless link; Receiving the identification information acquisition request returned by the second wireless access point for the authentication request; In response to the identification information acquisition request, a response frame is sent to the second wireless access point; the response frame includes identification information corresponding to the terminal device. 根據申請專利範圍第5項之支援無線網路切換的可靠伺服管理方法,其中,該第二認證階段,採用如下方式實現: 接收該第二無線存取點發送的質詢訊息;該質詢訊息中包含對密碼資訊進行加密的密鑰; 利用該密鑰對該標識資訊對應的密碼資訊進行加密; 基於該第二無線鏈路向該可靠伺服管理平臺發送包含加密後的該密碼資訊的應答訊息。The reliable servo management method supporting wireless network switching according to item 5 of the scope of patent application, wherein the second authentication phase is implemented as follows: Receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information; Use the key to encrypt the password information corresponding to the identification information; Sending a response message including the encrypted password information to the reliable servo management platform based on the second wireless link. 根據申請專利範圍第6項之支援無線網路切換的可靠伺服管理方法,其中,該第三認證階段,採用如下方式實現: 接收該第二無線存取點發送的認證通過報文;該認證通過報文由該可靠伺服管理平臺對該應答訊息中包含的該密碼資訊驗證通過後發送至該第二無線存取點; 接收該第二無線存取點發送的其埠針對該終端設備授權存取的通知; 接收該第二無線存取點發送的輪詢報文; 針對該輪詢報文向該第二無線存取點發送相應的輪詢應答報文。The reliable servo management method for supporting wireless network switching according to item 6 of the patent application scope, wherein the third authentication stage is implemented as follows: Receiving the authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second wireless access point after the password information contained in the response message is verified by the reliable server management platform; Receiving a notification that its port sends authorized access to the terminal device sent by the second wireless access point; Receiving a polling message sent by the second wireless access point; A corresponding polling response message is sent to the second wireless access point for the polling message. 根據申請專利範圍第7項之支援無線網路切換的可靠伺服管理方法,其中,該第三認證階段執行後,在執行該將該終端設備從該第一無線存取點切換到該第二無線存取點步驟前,執行如下操作: 判斷該伺服請求是否執行完畢,若是,執行該將該終端設備從該第一無線存取點切換到該第二無線存取點步驟;若否,執行該基於該終端設備接收該第一無線存取點快取的該資料報文步驟。The reliable servo management method for supporting wireless network switching according to item 7 of the scope of patent application, wherein after the third authentication phase is performed, the terminal device is switched from the first wireless access point to the second wireless after the third authentication phase is performed. Before the access point steps, do the following: Determine whether the servo request is completed, if yes, perform the step of switching the terminal device from the first wireless access point to the second wireless access point; if not, perform the receiving of the first wireless storage based on the terminal device Fetch the cached data message step. 根據申請專利範圍第3項之支援無線網路切換的可靠伺服管理方法,其中,該基於該第二無線存取點向該可靠伺服管理平臺發起認證操作,採用如下方式實現: 建立該終端設備與該第二無線存取點之間的第二無線鏈路; 基於該第二無線鏈路向該第二無線存取點發送認證請求; 接收該第二無線存取點針對該認證請求返回的標識資訊獲取請求; 針對該標識資訊獲取請求向該第二無線存取點發送響應幀;該響應幀中包含該終端設備對應的標識資訊; 接收該第二無線存取點發送的質詢訊息;該質詢訊息中包含對密碼資訊進行加密的密鑰; 利用該密鑰對該標識資訊對應的密碼資訊進行加密; 基於該第二無線鏈路向該可靠伺服管理平臺發送包含加密後的該密碼資訊的應答訊息; 接收該第二無線存取點發送的認證通過報文;該認證通過報文由該可靠伺服管理平臺對該應答訊息中包含的該密碼資訊驗證通過後發送至該第二無線存取點; 接收該第二無線存取點發送的其埠針對該終端設備授權存取的通知。According to the reliable servo management method for supporting wireless network switching according to item 3 of the scope of patent application, wherein the second wireless access point initiates an authentication operation to the reliable servo management platform, which is implemented as follows: Establishing a second wireless link between the terminal device and the second wireless access point; Sending an authentication request to the second wireless access point based on the second wireless link; Receiving the identification information acquisition request returned by the second wireless access point for the authentication request; Send a response frame to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device; Receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information; Use the key to encrypt the password information corresponding to the identification information; Sending a response message including the encrypted password information to the reliable servo management platform based on the second wireless link; Receiving the authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second wireless access point after the password information contained in the response message is verified by the reliable server management platform; Receiving a notification that the port of the second wireless access point sends authorized access to the terminal device. 根據申請專利範圍第1至9項任意一項之支援無線網路切換的可靠伺服管理方法,其中,該第一無線存取點針對該終端設備的模式包括工作模式和/或休眠模式,且該第二無線存取點針對該終端設備的模式包括工作模式和/或休眠模式; 其中,若該第一無線存取點和/或該第二無線存取點針對該終端設備的模式為休眠模式,該第一無線存取點和/或該第二無線存取點將向該終端設備發送的資料報文快取。The reliable servo management method for supporting wireless network switching according to any one of claims 1 to 9, wherein the mode of the first wireless access point for the terminal device includes a working mode and / or a sleep mode, and the The mode of the second wireless access point for the terminal device includes a working mode and / or a sleep mode; Wherein, if the mode of the first wireless access point and / or the second wireless access point for the terminal device is a sleep mode, the first wireless access point and / or the second wireless access point will send to the terminal. Cache of data messages sent by the device. 根據申請專利範圍第10項之支援無線網路切換的可靠伺服管理方法,其中,該將該終端設備從該第二無線存取點切換回該第一無線存取點,通過將該第二無線存取點對於該終端設備設置為該休眠模式,並將該第一無線存取點對於該終端設備設置為該工作模式實現。According to the reliable servo management method for supporting wireless network switching according to item 10 of the scope of patent application, wherein the terminal device is switched from the second wireless access point back to the first wireless access point, the second wireless access point is The access point is set to the sleep mode for the terminal device, and the first wireless access point is set to the working mode for the terminal device. 根據申請專利範圍第10項之支援無線網路切換的可靠伺服管理方法,其中,該將該終端設備從該第一無線存取點切換到該第二無線存取點,通過將該第一無線存取點對於該終端設備設置為該休眠模式,並將該第二無線存取點對於該終端設備設置為該工作模式實現。According to the reliable servo management method for supporting wireless network switching according to item 10 of the scope of patent application, wherein the terminal device is switched from the first wireless access point to the second wireless access point, the first wireless access point is The access point is set to the sleep mode for the terminal device, and the second wireless access point is set to the working mode for the terminal device. 根據申請專利範圍第2至9項任意一項之支援無線網路切換的可靠伺服管理方法,其中,該檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作: 基於該終端設備與該第一無線存取點之間建立的第一無線鏈路,向該可靠伺服管理平臺發起該伺服請求; 基於該第一無線鏈路接收該可靠伺服管理平臺針對該伺服請求返回的該資料報文。The reliable servo management method for supporting wireless network switching according to any one of claims 2 to 9, in which the terminal device is notified after detecting that the terminal device is switched from the first wireless access point to the second wireless access point. Before the first wireless access point caches the reliable servo management platform to execute the data message returned by the servo request, the following operations are performed: Initiating the servo request to the reliable servo management platform based on a first wireless link established between the terminal device and the first wireless access point; Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link. 根據申請專利範圍第13項之支援無線網路切換的可靠伺服管理方法,其中,該檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作: 判斷第二無線存取點的無線網路的訊號強度是否大於該第一無線存取點的無線網路的訊號強度,若是,將該終端設備從該第一無線存取點切換到該第二無線存取點。The reliable servo management method for supporting wireless network switching according to item 13 of the patent application scope, wherein the first wireless access point is notified after detecting that the terminal device is switched from the first wireless access point to the second wireless access point. Before performing the steps of the data packet returned by the servo request from the point cache reliable servo management platform, perform the following operations: Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, switch the terminal device from the first wireless access point to the second wireless access point Wireless access point. 根據申請專利範圍第1至9項任意一項之支援無線網路切換的可靠伺服管理方法,其中,該終端設備包括:物聯網設備。The reliable servo management method for supporting wireless network switching according to any one of claims 1 to 9, wherein the terminal device includes: an Internet of Things device. 根據申請專利範圍第1至9項任意一項之支援無線網路切換的可靠伺服管理方法,其中,該伺服請求包括:空中發卡請求。The reliable servo management method for supporting wireless network switching according to any one of claims 1 to 9, wherein the servo request includes: a card issuing request in the air. 一種支援無線網路切換的可靠伺服管理裝置,包括: 資料報文快取單元,用於檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 認證操作發起單元,用於基於該第二無線存取點向該可靠伺服管理平臺發起認證操作; 以及,在該認證操作發起單元運行過程中至少一次運行第一切換單元、資料報文接收單元和第二切換單元; 其中,該第一切換單元,用於將該終端設備從該第二無線存取點切換回該第一無線存取點; 該資料報文接收單元,用於基於該終端設備接收該第一無線存取點快取的該資料報文; 該第二切換單元,用於將該終端設備從該第一無線存取點切換到該第二無線存取點。A reliable servo management device supporting wireless network switching, including: A data message cache unit, configured to notify the first wireless access point to cache the data returned by the reliable servo management platform for a servo request after detecting that the terminal device switches from the first wireless access point to the second wireless access point Message An authentication operation initiating unit, configured to initiate an authentication operation to the reliable servo management platform based on the second wireless access point; And, the first switching unit, the data message receiving unit, and the second switching unit are run at least once during the operation of the authentication operation initiation unit; The first switching unit is configured to switch the terminal device from the second wireless access point back to the first wireless access point; The data message receiving unit, configured to receive the data message cached by the first wireless access point based on the terminal device; The second switching unit is configured to switch the terminal device from the first wireless access point to the second wireless access point. 一種支援無線網路切換的可靠伺服管理方法,包括: 從第一無線存取點切換到第二無線存取點,並向該第一無線存取點發送快取資料報文的通知; 以及,在從該第一無線存取點切換到該第二無線存取點後,執行如下至少一次切換操作: 從該第二無線存取點切換到該第一無線存取點; 接收該第一無線存取點發送的其快取的該資料報文; 從該第一無線存取點切換到該第二無線存取點; 其中,該資料報文由可靠伺服管理平臺針對伺服請求返回。A reliable servo management method supporting wireless network switching, including: Switching from a first wireless access point to a second wireless access point, and sending a notification of a cached data message to the first wireless access point; And after switching from the first wireless access point to the second wireless access point, performing at least one of the following switching operations: Switching from the second wireless access point to the first wireless access point; Receiving the cached data message sent by the first wireless access point; Switching from the first wireless access point to the second wireless access point; Among them, the data message is returned by the reliable servo management platform in response to the servo request. 根據申請專利範圍第18之支援無線網路切換的可靠伺服管理方法,其中,包括: 建立與該第一無線存取點的第一無線鏈路; 基於該第一無線鏈路接收該可靠伺服管理平臺針對該伺服請求返回的該資料報文。A reliable servo management method supporting wireless network switching according to patent application scope 18, which includes: Establishing a first wireless link with the first wireless access point; Receiving the data message returned by the reliable servo management platform for the servo request based on the first wireless link. 根據申請專利範圍第19之支援無線網路切換的可靠伺服管理方法,其中,該從第一無線存取點切換到第二無線存取點,並向該第一無線存取點發送快取資料報文的通知步驟執行前,執行如下步驟: 判斷第二無線存取點的無線網路的訊號強度是否大於該第一無線存取點的無線網路的訊號強度,若是,執行該從第一無線存取點切換到第二無線存取點,並向該第一無線存取點發送快取資料報文的通知步驟。The reliable servo management method for supporting wireless network switching according to the 19th patent application scope, wherein the switching from the first wireless access point to the second wireless access point and sending cached data to the first wireless access point Before the message notification step is performed, perform the following steps: Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, perform the switching from the first wireless access point to the second wireless access point And sending a notification step of a cached data message to the first wireless access point. 根據申請專利範圍第18至20項任意一項之支援無線網路切換的可靠伺服管理方法,其中,該伺服請求包括:空中發卡請求。The reliable servo management method for supporting wireless network switching according to any one of claims 18 to 20, wherein the servo request includes: a card issuing request in the air. 一種支援無線網路切換的可靠伺服管理裝置,包括: 切換通知單元,用於從第一無線存取點切換到第二無線存取點,並向該第一無線存取點發送快取資料報文的通知; 以及,在從該切換通知單元運行後,至少一次運行無線存取點切換單元、快取資料報文接收單元以及無線存取點二次切換單元; 該無線存取點切換單元,用於從該第二無線存取點切換到該第一無線存取點; 該快取資料報文接收單元,用於接收該第一無線存取點發送的其快取的該資料報文; 該無線存取點二次切換單元,用於從該第一無線存取點切換到該第二無線存取點; 其中,該資料報文由可靠伺服管理平臺針對伺服請求返回。A reliable servo management device supporting wireless network switching, including: A switching notification unit, configured to switch from a first wireless access point to a second wireless access point, and send a notification of a cached data message to the first wireless access point; And after running from the switching notification unit, the wireless access point switching unit, the cached data message receiving unit, and the wireless access point secondary switching unit are run at least once; The wireless access point switching unit, configured to switch from the second wireless access point to the first wireless access point; The cached data message receiving unit is configured to receive the cached data message sent by the first wireless access point; The wireless access point secondary switching unit, configured to switch from the first wireless access point to the second wireless access point; Among them, the data message is returned by the reliable servo management platform in response to the servo request. 一種電子設備,包括: 記憶體和處理器; 該記憶體用於儲存計算機可執行指令,該處理器用於執行該計算機可執行指令: 檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 基於該第二無線存取點向該可靠伺服管理平臺發起認證操作; 以及,在該認證操作執行過程中至少一次執行如下切換操作: 將該終端設備從該第二無線存取點切換回該第一無線存取點; 基於該終端設備接收該第一無線存取點快取的該資料報文; 將該終端設備從該第一無線存取點切換到該第二無線存取點。An electronic device includes: Memory and processor; The memory is used to store computer executable instructions, and the processor is used to execute the computer executable instructions: After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable servo management platform in response to the servo request; Initiate an authentication operation to the reliable servo management platform based on the second wireless access point; And, during the execution of the authentication operation, the following switching operation is performed at least once: Switching the terminal device from the second wireless access point back to the first wireless access point; Receiving the data message cached by the first wireless access point based on the terminal device; Switching the terminal device from the first wireless access point to the second wireless access point. 一種電子設備,包括: 記憶體和處理器; 該記憶體用於儲存計算機可執行指令,該處理器用於執行該計算機可執行指令: 從第一無線存取點切換到第二無線存取點,並向該第一無線存取點發送快取資料報文的通知; 以及,在從該第一無線存取點切換到該第二無線存取點後,執行如下至少一次切換操作: 從該第二無線存取點切換到該第一無線存取點; 接收該第一無線存取點發送的其快取的該資料報文; 從該第一無線存取點切換到該第二無線存取點; 其中,該資料報文由可靠伺服管理平臺針對伺服請求返回。An electronic device includes: Memory and processor; The memory is used to store computer executable instructions, and the processor is used to execute the computer executable instructions: Switching from a first wireless access point to a second wireless access point, and sending a notification of a cached data message to the first wireless access point; And after switching from the first wireless access point to the second wireless access point, performing at least one of the following switching operations: Switching from the second wireless access point to the first wireless access point; Receiving the cached data message sent by the first wireless access point; Switching from the first wireless access point to the second wireless access point; Among them, the data message is returned by the reliable servo management platform in response to the servo request.
TW107138773A 2018-01-18 2018-11-01 Reliable server management method and device supporting wireless network switching TWI776982B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201810048658.8A CN110062427B (en) 2018-01-18 2018-01-18 Trusted service management method and device supporting wireless network switching and electronic equipment
??201810048658.8 2018-01-18
CN201810048658.8 2018-01-18

Publications (2)

Publication Number Publication Date
TW201933904A true TW201933904A (en) 2019-08-16
TWI776982B TWI776982B (en) 2022-09-11

Family

ID=67301955

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107138773A TWI776982B (en) 2018-01-18 2018-11-01 Reliable server management method and device supporting wireless network switching

Country Status (3)

Country Link
CN (1) CN110062427B (en)
TW (1) TWI776982B (en)
WO (1) WO2019141135A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741439A (en) * 2020-06-22 2020-10-02 河北远东通信系统工程有限公司 Cluster multicast switching method of B-trunk system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7792527B2 (en) * 2002-11-08 2010-09-07 Ntt Docomo, Inc. Wireless network handoff key
US8942204B2 (en) * 2008-12-23 2015-01-27 Qualcomm Incorporated Access point handover control based on closed subscriber group subscription information
CN101848514B (en) * 2009-03-23 2016-08-03 华为技术有限公司 WiMAX access network is switched to method and the relevant device of WiFi access network
CN101631371A (en) * 2009-08-27 2010-01-20 上海交通大学 Zero delay switching method of wireless access points
CN102006646B (en) * 2009-08-28 2012-08-08 华为终端有限公司 Switching method and equipment
US9723481B2 (en) * 2010-10-29 2017-08-01 Apple Inc. Access data provisioning apparatus and methods
US20140031772A1 (en) * 2012-07-30 2014-01-30 Next Healthcare, Inc. System and method for collecting stem cells
FR3004884B1 (en) * 2013-04-17 2016-09-09 Oberthur Technologies SECURE ELEMENT FOR TELECOMMUNICATIONS TERMINAL
US11748746B2 (en) * 2013-09-30 2023-09-05 Apple Inc. Multi-path communication of electronic device secure element data for online payments

Also Published As

Publication number Publication date
CN110062427B (en) 2020-10-20
TWI776982B (en) 2022-09-11
CN110062427A (en) 2019-07-26
WO2019141135A1 (en) 2019-07-25

Similar Documents

Publication Publication Date Title
US11824643B2 (en) Security lifecycle management of devices in a communications network
US10516540B2 (en) Management of profiles in an embedded universal integrated circuit card (eUICC)
US10498531B2 (en) Electronic subscriber identity module (eSIM) provisioning error recovery
JP6203985B1 (en) Secure provisioning of authentication credentials
EP3041164B1 (en) Subscriber profile transfer method, subscriber profile transfer system, and user equipment
RU2440688C2 (en) User profile, policy and distribution of pmip keys in wireless communication network
JP2020065276A (en) Apparatuses and methods for wireless communication
JP6033291B2 (en) Service access authentication method and system
US9654284B2 (en) Group based bootstrapping in machine type communication
EP3065334A1 (en) Key configuration method, system and apparatus
JP7410930B2 (en) Securing non-access layer communications in wireless communication networks
JP2014112969A (en) Negotiation with secure authentication capability
KR20130031829A (en) Method and apparatus for network personalization of subscriber devices
US11711693B2 (en) Non-3GPP device access to core network
US9674704B1 (en) Network connectivity switching utilizing an authentication device
KR100863135B1 (en) Dual Authentication Method in Mobile Networks
US20230179997A1 (en) Method, system, and apparatus for determining user plane security algorithm
JP2023162296A (en) Non-3GPP device access to core network
JP2017534214A (en) Privacy during wireless station re-authentication with an authentication server
US9918227B2 (en) Network connectivity switching utilizing an authentication device
JP2023519997A (en) Method and communication apparatus for securing terminal parameter updates
CN113543121A (en) Protection method for updating terminal parameter and communication device
WO2015081784A1 (en) Method, device, and system for verifying security capability
TWI776982B (en) Reliable server management method and device supporting wireless network switching
WO2018126791A1 (en) Authentication method and device, and computer storage medium

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent