TWI776982B - Reliable server management method and device supporting wireless network switching - Google Patents

Reliable server management method and device supporting wireless network switching Download PDF

Info

Publication number
TWI776982B
TWI776982B TW107138773A TW107138773A TWI776982B TW I776982 B TWI776982 B TW I776982B TW 107138773 A TW107138773 A TW 107138773A TW 107138773 A TW107138773 A TW 107138773A TW I776982 B TWI776982 B TW I776982B
Authority
TW
Taiwan
Prior art keywords
access point
wireless access
terminal device
wireless
authentication
Prior art date
Application number
TW107138773A
Other languages
Chinese (zh)
Other versions
TW201933904A (en
Inventor
石飛
宋益楠
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201933904A publication Critical patent/TW201933904A/en
Application granted granted Critical
Publication of TWI776982B publication Critical patent/TWI776982B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Hardware Redundancy (AREA)

Abstract

本案揭示了一種支援無線網路切換的可靠伺服管理方法,包括:檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;以及,在所述認證操作執行過程中至少一次執行如下切換操作:將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;基於所述終端設備接收所述第一無線存取點快取的所述資料報文;將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。所述方法避免了無線網路切換過程中資料報文丟失導致出錯或者失敗,同時降低了無線網路切換過程產生的延遲。This case discloses a reliable server management method for supporting wireless network switching, including: after detecting that a terminal device is switched from a first wireless access point to a second wireless access point, notifying the first wireless access point that the cache is reliable The data message returned by the servo management platform for the servo request; based on the second wireless access point, an authentication operation is initiated to the reliable servo management platform; and, during the execution of the authentication operation, the following switching operations are performed at least once: the terminal device switches from the second wireless access point back to the first wireless access point; based on the terminal device receiving the data message cached by the first wireless access point; The terminal device switches from the first wireless access point to the second wireless access point. The method avoids errors or failures caused by the loss of data packets in the wireless network switching process, and simultaneously reduces the delay generated in the wireless network switching process.

Description

支援無線網路切換的可靠伺服管理方法以及裝置Reliable server management method and device supporting wireless network switching

本案關於可靠伺服管理領域,具體關於一種支援無線網路切換的可靠伺服管理方法。本案同時關於一種支援無線網路切換的可靠伺服管理裝置,另一種支援無線網路切換的可靠伺服管理方法以及裝置,以及兩種電子設備。This case relates to the field of reliable server management, specifically a method for reliable server management that supports wireless network switching. This case also relates to a reliable server management device supporting wireless network switching, another reliable server management method and device supporting wireless network switching, and two electronic devices.

TSM(Trusted Service Manager,可靠伺服管理平臺)是實現對具備安全儲存、運算、防攻擊等能力的安全載體進行空間管理、應用管理和空中發卡的系統平臺,為線下通過NFC等技術進行行動支付、門禁等伺服提供了實施基礎。TSM能夠實現可靠的資料傳輸與伺服應用的空中接入,比如根據用戶的選擇,通過手機中設置的安全晶片空中加載某一個城市的交通卡,並進行交通卡的充值等操作。同時,在NFC生態中,TSM還扮演著發行商與伺服提供商、用戶、其他參與者之間的中間人角色,使得伺服應用的開展更加快速和安全。 目前的可靠伺服管理平臺中,由TSM伺服器通過無線存取點將資料報文傳遞給物聯網(Internet of Things,IoT)設備中的安全晶片,終端設備再通過無線存取點,將安全晶片對資料報文的執行結果傳遞給TSM伺服器,如此重複多次在TSM伺服器與終端設備中的安全晶片之間進行資料報文傳輸,直到所有的資料報文全部傳輸完畢,即:TSM伺服器對終端設備中安全晶片的操作執行完成,比如,TSM伺服器在終端設備的安全晶片中完成空中發卡。 然而,實際應用中的終端設備隨用戶所處位置的變化同樣會發生位移,如果終端設備在多次資料報文的傳輸過程中發生位移行為,比如從一無線存取點的無線網路覆蓋範圍移動至另一無線存取點的無線網路覆蓋範圍內,即發生漫遊。在漫遊期間,終端設備會失去舊的無線存取點的連接,同時會嘗試與新的無線存取點建立連接,受到設備性能、無線存取點性能、網路情況等諸多因素的影響,並且因為認證的原因,從舊的無線存取點切換到新的無線存取點,不僅會存在1至5秒的延遲,此外還可能導致TSM伺服器與終端設備之間的連接處於中斷狀態,甚至資料報文的丟失,最終導致空中發卡的失敗。TSM (Trusted Service Manager, Reliable Servo Management Platform) is a system platform that implements space management, application management and air card issuance for secure carriers with secure storage, computing, and anti-attack capabilities. It is used for offline mobile payment through NFC and other technologies. , access control and other servos provide the basis for implementation. TSM can realize reliable data transmission and over-the-air access to servo applications. For example, according to the user's choice, a city's transportation card can be loaded over the air through the security chip set in the mobile phone, and the transportation card can be recharged. At the same time, in the NFC ecosystem, TSM also acts as a middleman between publishers and server providers, users, and other participants, making the development of server applications faster and more secure. In the current reliable server management platform, the TSM server transmits data packets to the security chip in the Internet of Things (IoT) device through the wireless access point, and the terminal device passes the wireless access point to the security chip. The execution result of the data message is passed to the TSM server, and the data message transmission is repeated between the TSM server and the security chip in the terminal device until all data messages are transmitted, that is, the TSM server The operation of the security chip in the terminal device is completed, for example, the TSM server completes the over-the-air card issuance in the security chip of the terminal device. However, in practical applications, the terminal device will also be displaced with the change of the user's location. If the terminal device is displaced during the transmission of multiple data packets, for example, from the wireless network coverage of a wireless access point Roaming occurs when you move within the wireless network coverage of another wireless access point. During roaming, the terminal device will lose the connection of the old wireless access point, and at the same time will try to establish a connection with the new wireless access point, which is affected by many factors such as device performance, wireless access point performance, network conditions, etc., and For authentication reasons, switching from the old wireless access point to the new wireless access point will not only cause a delay of 1 to 5 seconds, but also may cause the connection between the TSM server and the terminal device to be interrupted, or even The loss of data packets will eventually lead to the failure of air card issuance.

本案提供一種支援無線網路切換的可靠伺服管理方法,以解決現有技術存在的缺陷。本案同時關於一種支援無線網路切換的可靠伺服管理裝置,另一種支援無線網路切換的可靠伺服管理方法以及裝置,以及兩種電子設備。 本案提供一種支援無線網路切換的可靠伺服管理方法,包括: 檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作; 以及,在所述認證操作執行過程中至少一次執行如下切換操作: 將所述終端設備從所述第二無線存取點切換回所述第一無線存取點; 基於所述終端設備接收所述第一無線存取點快取的所述資料報文; 將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 可選的,所述終端設備處於所述第一無線存取點和所述第二無線存取點二者無線網路覆蓋範圍的重疊區域內。 可選的,所述認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行所述切換操作。 可選的,所述認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段; 以及,在所述第一認證階段、所述第二認證階段和/或所述第三認證階段執行後,分別執行所述切換操作,並按照所述第一認證階段、所述切換操作、所述第二認證階段、所述切換操作、所述第三認證階段至所述切換操作的順序執行。 可選的,所述第一認證階段,採用如下方式實現: 建立所述終端設備與所述第二無線存取點之間的第二無線鏈路; 基於所述第二無線鏈路向所述第二無線存取點發送認證請求; 接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求; 針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊。 可選的,所述第二認證階段,採用如下方式實現: 接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息。 可選的,所述第三認證階段,採用如下方式實現: 接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點; 接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知; 接收所述第二無線存取點發送的輪詢報文; 針對所述輪詢報文向所述第二無線存取點發送相應的輪詢應答報文。 可選的,所述第三認證階段執行後,在執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點步驟前,執行如下操作: 判斷所述伺服請求是否執行完畢,若是,執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點步驟;若否,執行所述基於所述終端設備接收所述第一無線存取點快取的所述資料報文步驟。 可選的,所述基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作,採用如下方式實現: 建立所述終端設備與所述第二無線存取點之間的第二無線鏈路; 基於所述第二無線鏈路向所述第二無線存取點發送認證請求; 接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求; 針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊; 接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息; 接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點; 接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知。 可選的,所述第一無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式,且所述第二無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式; 其中,若所述第一無線存取點和/或所述第二無線存取點針對所述終端設備的模式為休眠模式,所述第一無線存取點和/或所述第二無線存取點將向所述終端設備發送的資料報文快取。 可選的,所述將所述終端設備從所述第二無線存取點切換回所述第一無線存取點,通過將所述第二無線存取點對於所述終端設備設置為所述休眠模式,並將所述第一無線存取點對於所述終端設備設置為所述工作模式實現。 可選的,所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點,通過將所述第一無線存取點對於所述終端設備設置為所述休眠模式,並將所述第二無線存取點對於所述終端設備設置為所述工作模式實現。 可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作: 基於所述終端設備與所述第一無線存取點之間建立的第一無線鏈路,向所述可靠伺服管理平臺發起所述伺服請求; 基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。 可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作: 判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 可選的,所述終端設備包括:物聯網設備。 可選的,所述伺服請求包括:空中發卡請求。 本案還提供一種支援無線網路切換的可靠伺服管理裝置,包括: 資料報文快取單元,用於檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 認證操作發起單元,用於基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作; 以及,在所述認證操作發起單元運行過程中至少一次運行第一切換單元、資料報文接收單元和第二切換單元; 其中,所述第一切換單元,用於將所述終端設備從所述第二無線存取點切換回所述第一無線存取點; 所述資料報文接收單元,用於基於所述終端設備接收所述第一無線存取點快取的所述資料報文; 所述第二切換單元,用於將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 本案另外提供一種支援無線網路切換的可靠伺服管理方法,包括: 從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知; 以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作: 從所述第二無線存取點切換到所述第一無線存取點; 接收所述第一無線存取點發送的其快取的所述資料報文; 從所述第一無線存取點切換到所述第二無線存取點; 其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。 可選的,所述支援無線網路切換的可靠伺服管理方法,包括: 建立與所述第一無線存取點的第一無線鏈路; 基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。 可選的,所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知步驟執行前,執行如下步驟: 判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,執行所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知步驟。 可選的,所述伺服請求包括:空中發卡請求。 本案另外提供一種支援無線網路切換的可靠伺服管理裝置,包括: 切換通知單元,用於從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知; 以及,在從所述切換通知單元運行後,至少一次運行無線存取點切換單元、快取資料報文接收單元以及無線存取點二次切換單元; 所述無線存取點切換單元,用於從所述第二無線存取點切換到所述第一無線存取點; 所述快取資料報文接收單元,用於接收所述第一無線存取點發送的其快取的所述資料報文; 所述無線存取點二次切換單元,用於從所述第一無線存取點切換到所述第二無線存取點; 其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。 本案還提供一種電子設備,包括: 記憶體和處理器; 所述記憶體用於儲存計算機可執行指令,所述處理器用於執行所述計算機可執行指令: 檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作; 以及,在所述認證操作執行過程中至少一次執行如下切換操作: 將所述終端設備從所述第二無線存取點切換回所述第一無線存取點; 基於所述終端設備接收所述第一無線存取點快取的所述資料報文; 將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 本案另外提供一種電子設備,包括: 記憶體和處理器; 所述記憶體用於儲存計算機可執行指令,所述處理器用於執行所述計算機可執行指令: 從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知; 以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作: 從所述第二無線存取點切換到所述第一無線存取點; 接收所述第一無線存取點發送的其快取的所述資料報文; 從所述第一無線存取點切換到所述第二無線存取點; 其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。 本案提供的所述支援無線網路切換的可靠伺服管理方法,包括:檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文;基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作;以及,在所述認證操作執行過程中至少一次執行如下切換操作:將所述終端設備從所述第二無線存取點切換回所述第一無線存取點;基於所述終端設備接收所述第一無線存取點快取的所述資料報文;將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 所述支援無線網路切換的可靠伺服管理方法,在將所述終端設備從所述第一無線存取點切換到所述第二無線存取點的過程中,一方面基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作,以便建立所述終端設備與所述可靠伺服管理平臺的連接,同時在所述認證操作的執行過程中,通過將所述終端設備在所述第二無線存取點和所述第一無線存取點之間進行來回切換,避免無線網路切換過程中資料報文丟失導致出錯或者失敗,同時也確保所述終端設備在切換到所述第二無線存取點後也能正常存取所述可靠伺服管理平臺,降低了無線網路切換過程產生的延遲。The present application provides a reliable server management method for supporting wireless network switching, so as to solve the defects existing in the prior art. This case also relates to a reliable server management device supporting wireless network switching, another reliable server management method and device supporting wireless network switching, and two electronic devices. This case provides a reliable server management method supporting wireless network switching, including: After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notifying the first wireless access point to cache the data message returned by the reliable server management platform for the server request; Initiating an authentication operation to the reliable server management platform based on the second wireless access point; And, the following switching operations are performed at least once during the execution of the authentication operation: switching the terminal device from the second wireless access point back to the first wireless access point; based on the terminal device receiving the data message cached by the first wireless access point; Handover the terminal device from the first wireless access point to the second wireless access point. Optionally, the terminal device is located in the overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point. Optionally, the authentication operation is performed by being decomposed into multiple authentication stages, and the switching operation is performed at least once before, during or after each authentication stage is performed. Optionally, the authentication phases after the authentication operation is decomposed include: a first authentication phase, a second authentication phase, and a third authentication phase; And, after the first authentication phase, the second authentication phase and/or the third authentication phase are performed, the switching operation is performed respectively, and the switching operation is performed according to the first authentication phase, the switching operation, the The second authentication phase, the switching operation, the third authentication phase and the switching operation are performed in sequence. Optionally, the first authentication stage is implemented in the following manner: establishing a second wireless link between the terminal device and the second wireless access point; sending an authentication request to the second wireless access point based on the second wireless link; receiving an identification information acquisition request returned by the second wireless access point for the authentication request; A response frame is sent to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device. Optionally, the second authentication stage is implemented in the following manner: receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information; Encrypt the cipher information corresponding to the identification information by using the key; Send a response message including the encrypted password information to the reliable server management platform based on the second wireless link. Optionally, the third authentication stage is implemented in the following manner: Receive an authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second after the reliable server management platform verifies the password information contained in the response message. wireless access point; receiving a notification sent by the second wireless access point that its port authorizes access to the terminal device; receiving a polling message sent by the second wireless access point; A corresponding polling response packet is sent to the second wireless access point for the polling packet. Optionally, after the third authentication phase is performed, before performing the step of switching the terminal device from the first wireless access point to the second wireless access point, perform the following operations: Determine whether the execution of the serving request is completed, if so, execute the step of switching the terminal device from the first wireless access point to the second wireless access point; if not, execute the step of switching the terminal device from the first wireless access point to the second wireless access point; The step of the device receiving the data message cached by the first wireless access point. Optionally, the initiation of an authentication operation to the reliable server management platform based on the second wireless access point is implemented in the following manner: establishing a second wireless link between the terminal device and the second wireless access point; sending an authentication request to the second wireless access point based on the second wireless link; receiving an identification information acquisition request returned by the second wireless access point for the authentication request; Send a response frame to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device; receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting password information; Encrypt the cipher information corresponding to the identification information by using the key; sending a response message including the encrypted password information to the reliable server management platform based on the second wireless link; Receive an authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second after the reliable server management platform verifies the password information contained in the response message. wireless access point; A notification sent by the second wireless access point that its port is authorized to access the terminal device is received. Optionally, the mode of the first wireless access point for the terminal device includes an operating mode and/or a sleep mode, and the mode of the second wireless access point for the terminal device includes an operating mode and/or sleep mode; Wherein, if the mode of the first wireless access point and/or the second wireless access point for the terminal device is the sleep mode, the first wireless access point and/or the second wireless access point The retrieval point will cache the data message sent to the terminal device. Optionally, the switching of the terminal device from the second wireless access point back to the first wireless access point is performed by setting the second wireless access point to the terminal device as the A sleep mode is implemented, and the first wireless access point is set to the working mode for the terminal device. Optionally, the switching of the terminal device from the first wireless access point to the second wireless access point is performed by setting the first wireless access point to the terminal device as the The sleep mode is implemented, and the second wireless access point is set to the working mode for the terminal device. Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable server management platform for the server request. Before the steps are executed, do the following: based on the first wireless link established between the terminal device and the first wireless access point, initiate the serving request to the reliable serving management platform; The data message returned by the reliable service management platform for the service request is received based on the first wireless link. Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable server management platform for the server request. Before the steps are executed, do the following: Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, switch the terminal device from the first wireless access point to the second wireless access point. Optionally, the terminal device includes an Internet of Things device. Optionally, the servo request includes: an over-the-air card issuance request. This case also provides a reliable server management device supporting wireless network switching, including: The data message cache unit is used to notify the first wireless access point to cache the information returned by the reliable server management platform for the server request after detecting that the terminal device switches from the first wireless access point to the second wireless access point. data message; an authentication operation initiating unit, configured to initiate an authentication operation to the reliable server management platform based on the second wireless access point; And, during the operation of the authentication operation initiating unit, the first switching unit, the data message receiving unit and the second switching unit are operated at least once; Wherein, the first switching unit is configured to switch the terminal device from the second wireless access point back to the first wireless access point; the data message receiving unit, configured to receive the data message cached by the first wireless access point based on the terminal device; The second switching unit is used for switching the terminal device from the first wireless access point to the second wireless access point. This case also provides a reliable server management method supporting wireless network switching, including: Switch from the first wireless access point to the second wireless access point, and send a notification of the cache data packet to the first wireless access point; And, after switching from the first wireless access point to the second wireless access point, at least one of the following switching operations is performed: handover from the second wireless access point to the first wireless access point; receiving the cached data message sent by the first wireless access point; switching from the first wireless access point to the second wireless access point; Wherein, the data message is returned by the reliable servo management platform for the servo request. Optionally, the reliable server management method for supporting wireless network switching includes: establishing a first wireless link with the first wireless access point; The data message returned by the reliable service management platform for the service request is received based on the first wireless link. Optionally, before performing the step of switching from the first wireless access point to the second wireless access point and sending the notification step of the cache data packet to the first wireless access point, the following steps are performed: Determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, execute the switching from the first wireless access point to the second wireless storage A notification step of sending a cache data message to the first wireless access point. Optionally, the servo request includes: an over-the-air card issuance request. This case also provides a reliable server management device supporting wireless network switching, including: a handover notification unit, configured to switch from a first wireless access point to a second wireless access point, and send a notification of a cache data packet to the first wireless access point; and, after running from the switching notification unit, run the wireless access point switching unit, the cache data message receiving unit and the wireless access point secondary switching unit at least once; the wireless access point switching unit for switching from the second wireless access point to the first wireless access point; the cached data message receiving unit, configured to receive the cached data message sent by the first wireless access point; the wireless access point secondary switching unit for switching from the first wireless access point to the second wireless access point; Wherein, the data message is returned by the reliable servo management platform for the servo request. This case also provides an electronic device, including: memory and processor; The memory is used to store computer-executable instructions, and the processor is used to execute the computer-executable instructions: After detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notifying the first wireless access point to cache the data message returned by the reliable server management platform for the server request; Initiating an authentication operation to the reliable server management platform based on the second wireless access point; And, the following switching operations are performed at least once during the execution of the authentication operation: switching the terminal device from the second wireless access point back to the first wireless access point; based on the terminal device receiving the data message cached by the first wireless access point; Handover the terminal device from the first wireless access point to the second wireless access point. This case also provides an electronic device, including: memory and processor; The memory is used to store computer-executable instructions, and the processor is used to execute the computer-executable instructions: Switch from the first wireless access point to the second wireless access point, and send a notification of the cache data packet to the first wireless access point; And, after switching from the first wireless access point to the second wireless access point, at least one of the following switching operations is performed: handover from the second wireless access point to the first wireless access point; receiving the cached data message sent by the first wireless access point; switching from the first wireless access point to the second wireless access point; Wherein, the data message is returned by the reliable servo management platform for the servo request. The reliable server management method for supporting wireless network switching provided in this application includes: after detecting that a terminal device is switched from a first wireless access point to a second wireless access point, notifying the first wireless access point to cache The data message returned by the reliable server management platform for the server request; based on the second wireless access point, an authentication operation is initiated to the reliable server management platform; and, during the execution of the authentication operation, the following switching operations are performed at least once: switching the terminal device from the second wireless access point back to the first wireless access point; receiving the data message cached by the first wireless access point based on the terminal device; The terminal device switches from the first wireless access point to the second wireless access point. The reliable server management method for supporting wireless network switching, in the process of switching the terminal device from the first wireless access point to the second wireless access point, is based on the second wireless access point on the one hand. The access point initiates an authentication operation to the reliable servo management platform, so as to establish a connection between the terminal device and the reliable servo management platform, and during the execution of the authentication operation, by placing the terminal device in the Switching back and forth between the second wireless access point and the first wireless access point avoids errors or failures caused by the loss of data packets during the wireless network switching process, and also ensures that the terminal device is switched to the first wireless access point. After two wireless access points, the reliable server management platform can also be accessed normally, which reduces the delay in the wireless network switching process.

在下面的描述中闡述了很多具體細節以便於充分理解本案。但是本案能夠以很多不同於在此描述的其他方式來實施,本領域技術人員可以在不違背本案內涵的情況下做類似推廣,因此本案不受下面揭示的具體實施的限制。 本案提供一種支援無線網路切換的可靠伺服管理方法,本案還提供一種支援無線網路切換的可靠伺服管理裝置,另一種支援無線網路切換的可靠伺服管理方法以及裝置,以及兩種電子設備。以下分別結合本案提供的實施例的附圖逐一進行詳細說明,並且對方法的各個步驟進行說明。 本案提供的一種支援無線網路切換的可靠伺服管理方法實施例如下: 參照附圖1,其示出了本案提供的一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖,參照附圖2,其示出了本案提供的一種無線網路切換場景的示意圖,參照附圖3,其示出了本案提供的一種支援無線網路切換的可靠伺服管理裝過程的示意圖。 步驟S101,檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文。 如圖2所示,TSM伺服器(即可靠伺服管理平臺)通過無線存取點1(第一無線存取點,比如Wi-Fi熱點)與終端設備進行資料報文(APDU報文)傳輸的過程中,資料報文往往需要逐條或者分批發送給終端設備的安全晶片(SE)進行執行,在執行過程中,終端設備由於位置的變化可能引起連接的無線存取點發生變化,比如終端設備從無線存取點1的無線網路覆蓋範圍漫遊至無線存取點2(第二無線存取點)的無線網路覆蓋範圍。在這一漫遊過程中,當終端設備移動到無線存取點1和無線存取點2二者無線網路覆蓋範圍的重疊區域內時,會發生漫遊前的無線網路切換行為,即終端設備從無線存取點1切換到無線存取點2,取決於實際應用場景中設備性能、無線存取點性能、網路情況等諸多因素,這一無線網路切換行為需要耗時1至5秒。在無線網路切換期間,終端設備會失去與無線存取點1的連接,並嘗試與無線存取點2建立無線連接,並且因為認證的原因,從無線存取點1切換到無線存取點2,不僅存在延遲,還可能導致TSM伺服器與終端設備之間的連接處於中斷狀態,甚至資料報文的丟失,最終導致可靠伺服管理過程的失敗。本案提供的所述支援無線網路切換的可靠伺服管理方法,為了確保無線網路切換過程中資料報文不會丟失,同時降低無線網路切換過程產生的延遲,通過將終端設備在無線存取點1和無線存取點2之間進行來回切換,既保證終端設備通過無線存取點1與TSM伺服器之間的連接,避免資料報文丟失,保障可靠伺服管理過程正常進行;同時也確保終端設備與無線存取點2之間的連接保持正常,降低無線網路切換過程產生的延遲。 本案實施例以可靠伺服管理過程中的應用空中下載或者在SE中創建安全域(即空中發卡)為例進行說明,如附圖3所示,在無線網路切換之前,可基於終端設備與無線存取點1之間建立的第一無線鏈路,向TSM伺服器發起伺服請求並基於該第一無線鏈路接收TSM伺服器針對伺服請求返回的資料報文。較佳的,所述伺服請求是指空中發卡請求,所述終端設備是指空中發卡這一場景中的物聯網設備。即:物聯網設備從無線存取點1切換到無線存取點2之前,物聯網設備通過無線存取點1與TSM伺服器進行通訊,具體是指物聯網設備通過TSM SDK發起OTA(Over The Air)請求,即空中發卡請求,比如用於在SE中創建安全域、在SE中空中安裝應用等請求,無線存取點1將該OTA請求轉發給TSM伺服器。TSM伺服器收到OTA請求後,對OTA請求進行處理後產生對應的APDU指令腳本,並將產生的APDU指令腳本以APDU報文的形式逐條或者分批發送給無線存取點1,再由無線存取點1轉發到物聯網設備端的TSM SDK,最終APDU報文被寫入SE中進行執行。 需要說明的是,本案實施例在將物聯網設備從無線存取點1切換到無線存取點2的過程中,物聯網設備需處於無線存取點1和無線存取點2二者無線網路覆蓋範圍的重疊區域內。較佳的,物聯網設備在從無線存取點1切換到無線存取點2之前,還可以通過如下判斷操作,來判斷無線存取點2無線網路的訊號強度是否大於無線存取點1無線網路的訊號強度,若大於,則將物聯網設備從無線存取點1切換到無線存取點2;若無線存取點2無線網路的訊號強度小於或者等於無線存取點1無線網路的訊號強度,可在延時特定時間間隔後重新檢測、對比無線存取點1與無線存取點2二者的訊號強度,並根據比較結果確定是否進行切換。 本實施例可利用IEEE802.11標準支援多頻道通訊的特性與無線存取點1進行通訊,並在無線存取點2執行認證過程,以便通過無線存取點2建立物聯網設備與TSM伺服器的連接。本案實施例提供的一種較佳實施方式中,利用無線存取點對於物聯網設備的兩種模式(工作模式和休眠模式)在無線存取點1和無線存取點2之間進行切換。其一,如果無線存取點1或者無線存取點2對於物聯網設備處於休眠模式下,則無線存取點1或者無線存取點2接收到TSM伺服器下發的APDU報文後,APDU報文被停止向物聯網設備轉發,而是由無線存取點1或者無線存取點2在本地快取APDU報文,這就要求無線存取點1和無線存取點2具備快取APDU報文的功能。其二,如果無線存取點1或者無線存取點2對於物聯網設備處於工作模式下,則無線存取點1或者無線存取點2接收到TSM伺服器下發的APDU報文後,將APDU報文向物聯網設備正常轉發即可。 比如,當物聯網設備從無線存取點1切換到無線存取點2的過程中,物聯網設備與無線存取點2進行認證以建立連接,此時,將無線存取點1對於物聯網設備的模式設置為休眠模式,則無線存取點1收到從TSM伺服器下發的APDU報文後會在本地快取APDU報文。當物聯網設備從無線存取點2被切換回無線存取點1的過程中,將無線存取點1對於物聯網設備的模式從休眠模式切回到工作模式,在此基礎上,無線存取點1會將之前快取的APDU報文轉發給物聯網設備。 本步驟中,檢測到物聯網設備從無線存取點1切換到無線存取點2後,通知無線存取點1快取TSM伺服器針對OTA請求返回的資料報文。比如將無線存取點1對於物聯網設備的模式從工作模式切換為休眠模式,並且將無線存取點2對於物聯網設備的模式從休眠模式切換為工作模式,在進行模式切換之後,TSM伺服器向物聯網設備下發的APDU報文被快取在無線存取點1處,待無線存取點1對於物聯網設備的模式恢復工作模式後向物聯網設備下發。 步驟S102,基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作。 如上所述,上述步驟S101將無線存取點2對於物聯網設備的模式切換為工作模式,本步驟在此基礎上通過無線存取點2向TSM伺服器發起認證操作,以便通過無線存取點2建立物聯網設備與TSM伺服器之間的連接,確保物聯網設備最終切換到無線存取點2之後,能夠通過無線存取點2保持與TSM伺服器之間的資料報文傳輸。較佳的,可通過將所述認證操作分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行將物聯網設備從無線存取點2切換回無線存取點1的切換操作。 本案實施例提供的一種較佳實施方式中,所述認證操作分解後的認證階段包括第一認證階段、第二認證階段和第三認證階段,並且在所述第一認證階段、所述第二認證階段和所述第三認證階段執行後,分別執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體執行順序如下:所述第一認證階段->將物聯網設備從無線存取點2切換回無線存取點1的切換操作->所述第二認證階段->將物聯網設備從無線存取點2切換回無線存取點1的切換操作->所述第三認證階段->將物聯網設備從無線存取點2切換回無線存取點1的切換操作。 (1)所述第一認證階段,較佳採用如下方式實現: 建立物聯網設備與無線存取點2之間的第二無線鏈路; 基於所述第二無線鏈路向無線存取點2發送認證請求; 接收無線存取點2針對所述認證請求返回的標識資訊獲取請求; 針對所述標識資訊獲取請求向無線存取點2發送響應幀;所述響應幀中包含所述物聯網設備對應的標識資訊。 例如,如附圖3所示,在第一認證階段,無線存取點1對於物聯網設備進入睡眠模式,因此無線存取點1在接收到TSM伺服器下發的APDU報文後,無線存取點1在本地快取TSM伺服器下發的APDU報文。同時,無線存取點2對於物聯網設備進入工作模式,則由物聯網設備向無線存取點2發起連接請求,從而建立物聯網設備與無線存取點2之間的無線連接,因為最初的狀態是未認證狀態,所以此時無線存取點2與物聯網設備之間除了IEEE 802.1x協議包外不能接收和發送任何資料包。 建立物聯網設備與無線存取點2之間的無線連接後,物聯網設備通過該無線連接向無線存取點2發出認證請求(EAPOL-Start),啟動認證過程。無線存取點2在收到物聯網設備的認證請求後,向物聯網設備發出一個Identity(標識)類型的EAP請求(EAP-Request/Identity),要求物聯網設備將其標識發送給無線存取點2。物聯網設備端在收到無線存取點2的EAP請求(EAP-Request/Identity)後,將標識資訊通過Identity類型的EAP響應幀(EAP-Response/Identity)發送給無線存取點2,響應無線存取點2發出的EAP請求(EAP-Request/Identity),此後,由無線存取點2將該EAP響應幀(EAP-Response/Identity)發送給TSM伺服器進行處理。 如附圖3所示,上述第一認證階段執行完成後,執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體參見下述步驟S103至S105對所述切換操作的詳細說明。 (2)所述第二認證階段,較佳採用如下方式實現: 接收無線存取點2發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 基於所述第二無線鏈路向TSM伺服器發送包含加密後的所述密碼資訊的應答訊息。 例如,如附圖3所示,在第二認證階段,無線存取點1對於物聯網設備進入睡眠模式,因此無線存取點1在接收到TSM伺服器下發的APDU報文後,無線存取點1在本地快取TSM伺服器下發的APDU報文。TSM伺服器收到無線存取點2發來的請求(即EAP響應幀(EAP-Response/Identity))後,從中提取出物聯網設備對應的標識資訊後,將該標識資訊與資料庫中的標識資訊列表中對比,找到該標識資訊對應的密碼資訊,並用隨機產生的一個MD5 Challenge訊息對密碼進行加密處理,然後將此MD5 Challenge訊息通過EAPOR格式封裝以Access-Challenge報文發送給無線存取點2。無線存取點2在收到來自TSM伺服器的EAPOR格式的Access-Challenge報文後,通過解封裝,將其中的MD5 Challenge訊息轉發給物聯網設備。物聯網設備在收到由無線存取點2轉發的MD5 Challenge訊息(即質詢訊息)後,用該Challenge訊息對密碼部分進行加密處理,然後產生EAP-Response/MD5 Challenge報文,並將產生的EAP-Response/MD5 Challenge報文(即應答訊息)發送給無線存取點2。無線存取點2又將此EAP-Response/MD5 Challenge報文以EAPOR格式封裝在報文(Access-Request)中發送給TSM伺服器。 如附圖3所示,上述第二認證階段執行完成後,執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體參見下述步驟S103至S105對所述切換操作的詳細說明。 (3)所述第三認證階段,較佳採用如下方式實現: 接收無線存取點2發送的認證通過報文;所述認證通過報文由TSM伺服器對所述應答訊息中包含的所述密碼資訊驗證通過後發送至無線存取點2; 接收無線存取點2發送的其埠針對所述物聯網設備授權存取的通知; 接收無線存取點2發送的輪詢報文; 針對所述輪詢報文向無線存取點2發送相應的輪詢應答報文。 例如,如附圖3所示,在第三認證階段,無線存取點1對於物聯網設備進入睡眠模式,因此無線存取點1在接收到TSM伺服器下發的APDU報文後,無線存取點1在本地快取TSM伺服器下發的APDU報文。TSM伺服器收到由無線存取點2傳來的包含已加密的密碼資訊的Access-Request報文後,與在本地經過加密運算後的密碼資訊進行對比,如果相同則認為為合法,並向無線存取點2發送認證通過報文(Access-Accept)。無線存取點2收到Access-Accept報文後,經過EAPOR解封裝再以EAP-Success報文向物聯網設備發送,並將埠改為授權狀態,允許物聯網設備通過埠進行存取。 此外,物聯網設備與無線存取點2的連接處於在線期間,無線存取點2會通過向物聯網設備定期發送Handshake Request(輪詢報文),對物聯網設備的在線情況進行監測。物聯網設備收到Handshake Request(輪詢報文)後向無線存取點2發送Handshake Response(輪詢應答報文),表示物聯網設備與無線存取點2的連接仍然在線。 如附圖3所示,上述第一認證階段執行完成後,執行一次將物聯網設備從無線存取點2切換回無線存取點1的切換操作,具體參見下述步驟S103至S105對所述切換操作的詳細說明。 在具體實施時,除上述提供的將所述認證操作分解為3個認證階段的方式進行執行,還可以將所述認證操作分解為1個、2個、4個甚至更多認證階段的方式進行執行,具體實現方式與上述提供的將所述認證操作分解為3個認證階段的方式類似。比如,將所述認證操作分解為一個認證階段,具體包括:建立物聯網設備與無線存取點2之間的第二無線鏈路,基於所述第二無線鏈路向無線存取點2發送認證請求,接收無線存取點2針對所述認證請求返回的標識資訊獲取請求,針對所述標識資訊獲取請求向無線存取點2發送響應幀,所述響應幀中包含所述物聯網設備對應的標識資訊;接收無線存取點2發送的質詢訊息,所述質詢訊息中包含對密碼資訊進行加密的密鑰,利用所述密鑰對所述標識資訊對應的密碼資訊進行加密,基於所述第二無線鏈路向TSM伺服器發送包含加密後的所述密碼資訊的應答訊息;接收無線存取點2發送的認證通過報文,所述認證通過報文由TSM伺服器對所述應答訊息中包含的所述密碼資訊驗證通過後發送至無線存取點2,接收無線存取點2發送的其埠針對所述物聯網設備授權存取的通知。 步驟S103,將所述終端設備從所述第二無線存取點切換回所述第一無線存取點。 需要說明的是,本步驟和下述步驟S104以及下述步驟S105共同組成將物聯網設備從無線存取點2切換回無線存取點1的切換操作,本案實施例中,所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作的執行前提是分別在上述第一認證階段、第二認證階段和第三認證階段執行之後。具體的,如附圖3所示,所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作第一次被執行,是在所述第一認證階段執行後、且所述第二認證階段執行前進行。所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作第二次被執行,是在所述第二認證階段執行後、且所述第三認證階段執行前進行。所述將物聯網設備從無線存取點2切換回無線存取點1的切換操作第三次被執行,是在所述第三認證階段執行後進行。 如上所述,無線存取點1對於物聯網設備、無線存取點2設置有休眠模式和工作模式兩種模式,基於此,本步驟將物聯網設備從無線存取點2切換回無線存取點1,較佳是通過無線存取點2對於物聯網設備的模式設置為休眠模式,並將無線存取點1對於物聯網設備的模式設置為工作模式來實現。 步驟S104,基於所述終端設備接收所述第一無線存取點快取的所述資料報文。 在上述步驟S103將物聯網設備從無線存取點2切換回無線存取點1之後,本步驟基於物聯網設備接收無線存取點1快取的資料報文,並將接收到的所述資料報文傳輸給物聯網設備設置的安全晶片進行執行,並將安全晶片針對所述資料報文的執行結果通過無線存取點1返回給TSM伺服器。 步驟S105,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 如上所述,無線存取點1對於物聯網設備、無線存取點2設置有休眠模式和工作模式兩種模式,基於此,本步驟將物聯網設備從無線存取點1切換到無線存取點2,較佳是通過無線存取點1對於物聯網設備的模式設置為休眠模式,並將無線存取點2對於物聯網設備的模式設置為工作模式來實現。 本案實施例提供的一種較佳實施方式中,在上述第三認證階段執行後,在執行本步驟將物聯網設備從無線存取點1切換到無線存取點2之前,還可以執行如下判斷操作,判斷所述空中發卡請求是否執行完畢,如果執行完畢,則執行本步驟,將物聯網設備從無線存取點1切換到無線存取點2,物聯網設備通過無線存取點2與TSM伺服器進行資料報文傳輸;如果所述空中發卡請求尚未執行完畢,則返回執行上述步驟S104,基於物聯網設備接收無線存取點1快取的TSM伺服器下發的資料報文,並由物聯網設備設置的安全晶片執行所述資料報文。 如附圖3所示,在上述認證操作的3個認證階段全部被執行後,並且由上述步驟S103至步驟S105共同組成的所述切換操作第三次被執行後,則完成將物聯網設備從無線存取點1切換到無線存取點2的切換操作,在此切換操作後,物聯網設備與TSM伺服器之間進行的資料報文傳輸通過無線存取點2來完成,從而實現物聯網設備從無線存取點1到無線存取點2的“無縫切換”,因為在上述切換操作的進行過程中,通過將物聯網設備在無線存取點1和無線存取點2之間進行來回切換,一方面避免物聯網設備與TSM伺服器之間傳輸的資料報文丟失,確保空中發卡操作的正常進行;另一方面通過無線存取點2在TSM伺服器完成物聯網設備的認證操作,從而在最終將物聯網設備切換到無線存取點2之後,物聯網設備能夠通過無線存取點2實現對TSM伺服器的正常存取,在這一切換過程中,用戶既感知不到連接中斷,甚至感知不到由於認證產生的延遲,因此是“無縫切換”。 綜上所述,所述支援無線網路切換的可靠伺服管理方法,在將物聯網設備從無線存取點1切換到無線存取點2的過程中,一方面基於無線存取點2向TSM伺服器發起認證操作,以便建立物聯網設備與TSM伺服器的連接,同時在所述認證操作的執行過程中,通過將物聯網設備在無線存取點2和無線存取點1之間進行來回切換,避免無線網路切換過程中資料報文丟失導致空中發卡失敗,同時也確保物聯網設備在切換到無線存取點2後也能正常存取TSM伺服器,降低了無線網路切換過程產生的延遲。 本案提供的一種支援無線網路切換的可靠伺服管理裝置實施例如下: 在上述的實施例中,提供了一種支援無線網路切換的可靠伺服管理方法,與之相對應的,本案還提供了一種支援無線網路切換的可靠伺服管理裝置,下面結合附圖進行說明。 參照附圖4,其示出了本案提供的一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖。 由於裝置實施例基本相似於方法實施例,所以描述得比較簡單,相關的部分請參見上述提供的方法實施例的對應說明即可。下述描述的裝置實施例僅僅是示意性的。 本案提供一種支援無線網路切換的可靠伺服管理裝置,包括: 資料報文快取單元401,用於檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 認證操作發起單元402,用於基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作; 以及,在所述認證操作發起單元運行過程中至少一次運行第一切換單元403、資料報文接收單元404和第二切換單元405; 其中,所述第一切換單元403,用於將所述終端設備從所述第二無線存取點切換回所述第一無線存取點; 所述資料報文接收單元404,用於基於所述終端設備接收所述第一無線存取點快取的所述資料報文; 所述第二切換單元405,用於將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 可選的,所述終端設備處於所述第一無線存取點和所述第二無線存取點二者無線網路覆蓋範圍的重疊區域內。 可選的,所述認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行所述切換操作。 可選的,所述認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段; 以及,在所述第一認證階段、所述第二認證階段和/或所述第三認證階段執行後,分別執行所述切換操作,並按照所述第一認證階段、所述切換操作、所述第二認證階段、所述切換操作、所述第三認證階段至所述切換操作的順序執行。 可選的,所述第一認證階段,包括: 第二無線鏈路建立子單元,用於建立所述終端設備與所述第二無線存取點之間的第二無線鏈路; 認證請求發送子單元,用於基於所述第二無線鏈路向所述第二無線存取點發送認證請求; 標識資訊獲取請求接收子單元,用於接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求; 響應幀發送子單元,用於針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊。 可選的,所述第二認證階段,包括: 質詢訊息接收子單元,用於接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 加密子單元,用於利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 應答訊息發送子單元,用於基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息。 可選的,所述第三認證階段,包括: 認證通過報文接收子單元,用於接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點; 埠授權通知接收子單元,用於接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知; 輪詢報文接收子單元,用於接收所述第二無線存取點發送的輪詢報文; 輪詢應答報文發送子單元,用於針對所述輪詢報文向所述第二無線存取點發送相應的輪詢應答報文。 可選的,所述認證操作發起單元402,包括: 判斷子單元,用於判斷所述伺服請求是否執行完畢,若是,運行所述第二切換單元405;若否,運行所述資料報文接收單元404。 可選的,所述認證操作發起單元402,包括: 第一子單元,用於建立所述終端設備與所述第二無線存取點之間的第二無線鏈路; 第二子單元,用於基於所述第二無線鏈路向所述第二無線存取點發送認證請求; 第三子單元,用於接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求; 第四子單元,用於針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊; 第五子單元,用於接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 第六子單元,用於利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 第七子單元,用於基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息; 第八子單元,用於接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點; 第九子單元,用於接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知。 可選的,所述第一無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式,且所述第二無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式; 其中,若所述第一無線存取點和/或所述第二無線存取點針對所述終端設備的模式為休眠模式,所述第一無線存取點和/或所述第二無線存取點將向所述終端設備發送的資料報文快取。 可選的,所述第一切換單元403,通過將所述第二無線存取點對於所述終端設備設置為所述休眠模式,並將所述第一無線存取點對於所述終端設備設置為所述工作模式實現。 可選的,所述第二切換單元405,通過將所述第一無線存取點對於所述終端設備設置為所述休眠模式,並將所述第二無線存取點對於所述終端設備設置為所述工作模式實現。 可選的,所述支援無線網路切換的可靠伺服管理裝置,包括: 伺服請求發送單元,用於基於所述終端設備與所述第一無線存取點之間建立的第一無線鏈路,向所述可靠伺服管理平臺發起所述伺服請求; 資料報文接收單元,用於基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。 可選的,所述支援無線網路切換的可靠伺服管理裝置,包括: 訊號強度判斷單元,用於判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 可選的,所述終端設備包括:物聯網設備。 可選的,所述伺服請求包括:空中發卡請求。 本案提供的另一種支援無線網路切換的可靠伺服管理方法實施例如下: 在上述的實施例中,提供了一種支援無線網路切換的可靠伺服管理方法,與之配合,本案還提供了另一種支援無線網路切換的可靠伺服管理方法,基於終端設備實現,下面結合附圖進行說明。 參照附圖5,其示出了本案提供的另一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖。 由於該方法實施例與上述提供的方法實施例相互對應,所以描述得比較簡單,相關的部分請參見上述提供的方法實施例的對應說明即可。下述描述的方法實施例僅僅是示意性的。 本案提供一種支援無線網路切換的可靠伺服管理方法,包括: 步驟S501,從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知; 以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作: 步驟S502,從所述第二無線存取點切換到所述第一無線存取點; 步驟S503,接收所述第一無線存取點發送的其快取的所述資料報文; 步驟S504,從所述第一無線存取點切換到所述第二無線存取點; 其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。 可選的,所述支援無線網路切換的可靠伺服管理方法,包括: 建立與所述第一無線存取點的第一無線鏈路; 基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。 可選的,上述步驟S501執行前,執行如下步驟: 判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,執行上述步驟S501,從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知。 可選的,所述伺服請求包括:空中發卡請求。 本案提供的另一種支援無線網路切換的可靠伺服管理裝置實施例如下: 在上述的實施例中,提供了另一種支援無線網路切換的可靠伺服管理方法,與之相對應的,本案還提供了另一種支援無線網路切換的可靠伺服管理裝置,下面結合附圖進行說明。 參照附圖6,其示出了本案提供的另一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖。 由於裝置實施例基本相似於方法實施例,所以描述得比較簡單,相關的部分請參見上述提供的方法實施例的對應說明即可。下述描述的裝置實施例僅僅是示意性的。 本案提供另一種支援無線網路切換的可靠伺服管理裝置,包括: 切換通知單元601,用於從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知; 以及,在從所述切換通知單元601運行後,至少一次運行無線存取點切換單元602、快取資料報文接收單元603以及無線存取點二次切換單元604; 所述無線存取點切換單元602,用於從所述第二無線存取點切換到所述第一無線存取點; 所述快取資料報文接收單元603,用於接收所述第一無線存取點發送的其快取的所述資料報文; 所述無線存取點二次切換單元604,用於從所述第一無線存取點切換到所述第二無線存取點; 其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。 本案提供的一種電子設備實施例如下: 在上述的實施例中,提供了一種支援無線網路切換的可靠伺服管理方法,此外,本案還提供了一種用於實現所述支援無線網路切換的可靠伺服管理方法的電子設備,下面結合附圖進行說明。 參照附圖7,其示出了本實施例提供的一種電子設備的示意圖。 本案提供的所述電子設備實施例描述得比較簡單,相關的部分請參見上述提供的所述支援無線網路切換的可靠伺服管理方法實施例的對應說明即可。下述描述的實施例僅僅是示意性的。 本案提供一種電子設備,包括: 記憶體701和處理器702; 所述記憶體701用於儲存計算機可執行指令,所述處理器702用於執行如下計算機可執行指令: 檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文; 基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作; 以及,在所述認證操作執行過程中至少一次執行如下切換操作: 將所述終端設備從所述第二無線存取點切換回所述第一無線存取點; 基於所述終端設備接收所述第一無線存取點快取的所述資料報文; 將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 可選的,所述終端設備處於所述第一無線存取點和所述第二無線存取點二者無線網路覆蓋範圍的重疊區域內。 可選的,所述認證操作通過分解為多個認證階段的方式進行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行所述切換操作。 可選的,所述認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段; 以及,在所述第一認證階段、所述第二認證階段和/或所述第三認證階段執行後,分別執行所述切換操作,並按照所述第一認證階段、所述切換操作、所述第二認證階段、所述切換操作、所述第三認證階段至所述切換操作的順序執行。 可選的,所述第一認證階段,採用如下方式實現: 建立所述終端設備與所述第二無線存取點之間的第二無線鏈路; 基於所述第二無線鏈路向所述第二無線存取點發送認證請求; 接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求; 針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊。 可選的,所述第二認證階段,採用如下方式實現: 接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息。 可選的,所述第三認證階段,採用如下方式實現: 接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點; 接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知; 接收所述第二無線存取點發送的輪詢報文; 針對所述輪詢報文向所述第二無線存取點發送相應的輪詢應答報文。 可選的,所述第三認證階段執行後,在執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點指令執行前,所述處理器702還用於執行如下計算機可執行指令: 判斷所述伺服請求是否執行完畢,若是,執行所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點指令;若否,執行所述基於所述終端設備接收所述第一無線存取點快取的所述資料報文指令。 可選的,所述基於所述第二無線存取點向所述可靠伺服管理平臺發起認證操作,採用如下方式實現: 建立所述終端設備與所述第二無線存取點之間的第二無線鏈路; 基於所述第二無線鏈路向所述第二無線存取點發送認證請求; 接收所述第二無線存取點針對所述認證請求返回的標識資訊獲取請求; 針對所述標識資訊獲取請求向所述第二無線存取點發送響應幀;所述響應幀中包含所述終端設備對應的標識資訊; 接收所述第二無線存取點發送的質詢訊息;所述質詢訊息中包含對密碼資訊進行加密的密鑰; 利用所述密鑰對所述標識資訊對應的密碼資訊進行加密; 基於所述第二無線鏈路向所述可靠伺服管理平臺發送包含加密後的所述密碼資訊的應答訊息; 接收所述第二無線存取點發送的認證通過報文;所述認證通過報文由所述可靠伺服管理平臺對所述應答訊息中包含的所述密碼資訊驗證通過後發送至所述第二無線存取點; 接收所述第二無線存取點發送的其埠針對所述終端設備授權存取的通知。 可選的,所述第一無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式,且所述第二無線存取點針對所述終端設備的模式包括工作模式和/或休眠模式; 其中,若所述第一無線存取點和/或所述第二無線存取點針對所述終端設備的模式為休眠模式,所述第一無線存取點和/或所述第二無線存取點將向所述終端設備發送的資料報文快取。 可選的,所述將所述終端設備從所述第二無線存取點切換回所述第一無線存取點,通過將所述第二無線存取點對於所述終端設備設置為所述休眠模式,並將所述第一無線存取點對於所述終端設備設置為所述工作模式實現。 可選的,所述將所述終端設備從所述第一無線存取點切換到所述第二無線存取點,通過將所述第一無線存取點對於所述終端設備設置為所述休眠模式,並將所述第二無線存取點對於所述終端設備設置為所述工作模式實現。 可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文指令執行前,所述處理器702還用於執行如下計算機可執行指令: 基於所述終端設備與所述第一無線存取點之間建立的第一無線鏈路,向所述可靠伺服管理平臺發起所述伺服請求; 基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。 可選的,所述檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知所述第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文指令執行前,所述處理器702還用於執行如下計算機可執行指令: 判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,將所述終端設備從所述第一無線存取點切換到所述第二無線存取點。 可選的,所述終端設備包括:物聯網設備。 可選的,所述伺服請求包括:空中發卡請求。 本案提供的另一種電子設備實施例如下: 在上述的實施例中,提供了另一種支援無線網路切換的可靠伺服管理方法,此外,本案還提供了一種用於實現該方法的電子設備,下面結合附圖進行說明。 參照附圖8,其示出了本實施例提供的另一種電子設備的示意圖。 本案提供的所述電子設備實施例描述得比較簡單,相關的部分請參見上述提供的另一種支援無線網路切換的可靠伺服管理方法實施例的對應說明即可。下述描述的實施例僅僅是示意性的。 本案提供另一種電子設備,包括: 記憶體801和處理器802; 所述記憶體801用於儲存計算機可執行指令,所述處理器802用於執行所述計算機可執行指令: 從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知; 以及,在從所述第一無線存取點切換到所述第二無線存取點後,執行如下至少一次切換操作: 從所述第二無線存取點切換到所述第一無線存取點; 接收所述第一無線存取點發送的其快取的所述資料報文; 從所述第一無線存取點切換到所述第二無線存取點; 其中,所述資料報文由可靠伺服管理平臺針對伺服請求返回。 可選的,所述處理器802還用於執行所述計算機可執行指令: 建立與所述第一無線存取點的第一無線鏈路; 基於所述第一無線鏈路接收所述可靠伺服管理平臺針對所述伺服請求返回的所述資料報文。 可選的,所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知指令執行前,所述處理器802還用於執行所述計算機可執行指令: 判斷第二無線存取點的無線網路的訊號強度是否大於所述第一無線存取點的無線網路的訊號強度,若是,執行所述從第一無線存取點切換到第二無線存取點,並向所述第一無線存取點發送快取資料報文的通知指令。 可選的,所述伺服請求包括:空中發卡請求。 本案雖然以較佳實施例揭示如上,但其並不是用來限定本案,任何本領域技術人員在不脫離本案的精神和範圍內,都可以做出可能的變動和修改,因此本案的保護範圍應當以本案權利要求所界定的範圍為準。 在一個典型的配置中,計算設備包括一個或多個處理器、輸入/輸出介面、網路介面和記憶體。 記憶體可能包括計算機可讀媒體中的非永久性記憶體,隨機存取記憶體 (RAM) 和/或非揮發性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是計算機可讀媒體的示例。 計算機可讀媒體包括永久性和非永久性、可行動和非可行動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是計算機可讀指令、資料結構、程式的模組或其他資料。計算機的儲存媒體的例子包括,但不限於相變隨機存取記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,計算機可讀媒體不包括非暫態電腦可讀媒體(transitory media),如調變的資料訊號和載波。 本領域技術人員應明白,本案的實施例可提供為方法、系統或計算機程式產品。因此,本案可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。而且,本案可採用在一個或多個其中包含有計算機可用程式代碼的計算機可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的計算機程式產品的形式。 In the following description, numerous specific details are set forth to facilitate a full understanding of the present case. However, this case can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of this case, so this case is not limited by the specific implementation disclosed below. This application provides a reliable server management method supporting wireless network switching, a reliable server management device supporting wireless network switching, another reliable server management method and device supporting wireless network switching, and two electronic devices. The following is a detailed description one by one with reference to the accompanying drawings of the embodiments provided in the present application, and each step of the method is described. An example of a reliable server management method for supporting wireless network handover provided by this application is as follows: Referring to FIG. 1, it shows a process flow diagram of an embodiment of a reliable server management method for supporting wireless network switching provided by this application. FIG. 2 shows a schematic diagram of a wireless network switching scenario provided by the present application. Referring to FIG. 3 , it shows a schematic diagram of a reliable server management installation process supporting wireless network switching provided by the present application. Step S101 , after detecting that the terminal device switches from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable server management platform for the server request. As shown in Figure 2, the TSM server (that is, the reliable server management platform) transmits data packets (APDU packets) with the terminal device through the wireless access point 1 (the first wireless access point, such as a Wi-Fi hotspot). During the process, the data messages often need to be sent to the security chip (SE) of the terminal device one by one or in batches for execution. During the execution process, the terminal device may cause changes to the connected wireless access point due to the change of the location, such as the terminal. The device roams from the wireless network coverage of wireless access point 1 to the wireless network coverage of wireless access point 2 (the second wireless access point). During this roaming process, when the terminal device moves to the overlapping area of the wireless network coverage of wireless access point 1 and wireless access point 2, the wireless network switching behavior before roaming will occur, that is, the terminal device Switching from wireless access point 1 to wireless access point 2 depends on many factors such as device performance, wireless access point performance, network conditions and other factors in the actual application scenario. This wireless network switching behavior takes 1 to 5 seconds. . During wireless network handover, the terminal device will lose connection with wireless access point 1, and try to establish a wireless connection with wireless access point 2, and switch from wireless access point 1 to wireless access point for authentication reasons 2. Not only the delay, but also the connection between the TSM server and the terminal device may be interrupted, or even the loss of data packets, which will eventually lead to the failure of the reliable server management process. The reliable server management method for supporting wireless network switching provided in this case, in order to ensure that data packets will not be lost during the wireless network switching process, and at the same time reduce the delay generated by the wireless network switching process, by connecting the terminal equipment in the wireless access process Switching back and forth between point 1 and wireless access point 2 not only ensures the connection between the terminal device and the TSM server through wireless access point 1, avoids the loss of data packets, and ensures the normal process of reliable server management; The connection between the terminal device and the wireless access point 2 remains normal, which reduces the delay caused by the wireless network handover process. The embodiment of this case is described by taking the application of over-the-air downloading in the process of reliable servo management or the creation of a security domain (ie, over-the-air card issuance) in SE as an example. As shown in Fig. 3, before the wireless network switching, the The first wireless link established between the access points 1 initiates a serving request to the TSM server and receives a data packet returned by the TSM server for the serving request based on the first wireless link. Preferably, the servo request refers to an over-the-air card issuance request, and the terminal device refers to an IoT device in the scenario of over-the-air card issuance. That is, before the IoT device switches from wireless access point 1 to wireless access point 2, the IoT device communicates with the TSM server through wireless access point 1. Specifically, the IoT device initiates OTA (Over The Air) through the TSM SDK. ) request, that is, an over-the-air card issuance request, such as a request for creating a security domain in the SE, installing an application over-the-air in the SE, etc. The wireless access point 1 forwards the OTA request to the TSM server. After receiving the OTA request, the TSM server processes the OTA request and generates the corresponding APDU command script, and sends the generated APDU command script to the wireless access point 1 one by one or in batches in the form of APDU packets, and then sent by The wireless access point 1 forwards it to the TSM SDK on the IoT device, and finally the APDU message is written into the SE for execution. It should be noted that, in the process of switching the IoT device from the wireless access point 1 to the wireless access point 2 in the embodiment of this case, the IoT device needs to be in the wireless network of both the wireless access point 1 and the wireless access point 2. within the overlapping area of the road coverage. Preferably, before switching from the wireless access point 1 to the wireless access point 2, the IoT device can also judge whether the signal strength of the wireless network of the wireless access point 2 is greater than that of the wireless access point 1 through the following judgment operation: If the signal strength of the wireless network is greater than that, switch the IoT device from the wireless access point 1 to the wireless access point 2; if the signal strength of the wireless network of the wireless access point 2 is less than or equal to the wireless access point 1 wireless The signal strength of the network can be re-detected and compared with the signal strengths of the wireless access point 1 and the wireless access point 2 after a delay of a certain time interval, and whether to switch or not is determined according to the comparison result. This embodiment can use the feature of the IEEE802.11 standard to support multi-channel communication to communicate with the wireless access point 1, and perform an authentication process on the wireless access point 2, so as to establish the Internet of Things device and the TSM server through the wireless access point 2 Connection. In a preferred implementation provided by the embodiment of this application, two modes (working mode and sleep mode) of the wireless access point for IoT devices are used to switch between the wireless access point 1 and the wireless access point 2. First, if the wireless access point 1 or the wireless access point 2 is in sleep mode for the IoT device, after the wireless access point 1 or the wireless access point 2 receives the APDU message sent by the TSM server, the APDU The message is stopped from forwarding to the IoT device, but the APDU message is cached locally by wireless access point 1 or wireless access point 2, which requires wireless access point 1 and wireless access point 2 to have cached APDUs function of the message. Second, if the wireless access point 1 or the wireless access point 2 is in the working mode for the IoT device, after the wireless access point 1 or the wireless access point 2 receives the APDU message sent by the TSM server, the The APDU message can be normally forwarded to the IoT device. For example, when the IoT device switches from wireless access point 1 to wireless access point 2, the IoT device authenticates with wireless access point 2 to establish a connection. If the mode of the device is set to sleep mode, the wireless access point 1 will cache the APDUs locally after receiving the APDUs sent from the TSM server. When the IoT device is switched from the wireless access point 2 to the wireless access point 1, the mode of the wireless access point 1 for the IoT device is switched from the sleep mode to the working mode. The fetch point 1 will forward the previously cached APDU packets to the IoT device. In this step, after detecting that the IoT device is switched from the wireless access point 1 to the wireless access point 2, the wireless access point 1 is notified to cache the data packet returned by the TSM server for the OTA request. For example, the mode of wireless access point 1 for IoT devices is switched from working mode to sleep mode, and the mode of wireless access point 2 for IoT devices is switched from sleep mode to working mode. After the mode switching, TSM servo The APDU message sent by the device to the IoT device is cached at the wireless access point 1, and sent to the IoT device after the wireless access point 1 returns to the working mode for the IoT device. Step S102, initiate an authentication operation to the reliable server management platform based on the second wireless access point. As mentioned above, the above step S101 switches the mode of the wireless access point 2 for the IoT device to the working mode. On this basis, in this step, an authentication operation is initiated to the TSM server through the wireless access point 2, so that the wireless access point 2 can pass the wireless access point. 2. Establish the connection between the IoT device and the TSM server to ensure that after the IoT device is finally switched to the wireless access point 2, the data message transmission between the IoT device and the TSM server can be maintained through the wireless access point 2. Preferably, the authentication operation can be performed by decomposing the authentication operation into a plurality of authentication stages, and before, during or after the execution of each authentication stage, at least one execution is performed to remove the IoT device from the wireless access point. 2 Switch back to the switching operation of wireless access point 1. In a preferred implementation provided by the embodiment of the present application, the authentication phase after the authentication operation is decomposed includes a first authentication phase, a second authentication phase and a third authentication phase, and in the first authentication phase, the second authentication phase After the authentication phase and the third authentication phase are executed, a switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed respectively, and the specific execution sequence is as follows: the first authentication phase -> the The handover operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 -> the second authentication stage -> the handover operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 - >The third authentication phase->Handover operation to switch the IoT device from wireless access point 2 back to wireless access point 1 . (1) The first authentication stage is preferably implemented in the following manner: establishing a second wireless link between the IoT device and the wireless access point 2; sending the wireless access point 2 based on the second wireless link Send an authentication request; Receive an identification information acquisition request returned by the wireless access point 2 for the authentication request; Send a response frame to the wireless access point 2 in response to the identification information acquisition request; the response frame includes the IoT device corresponding identification information. For example, as shown in FIG. 3, in the first authentication stage, the wireless access point 1 enters the sleep mode for the IoT device. Therefore, after the wireless access point 1 receives the APDU message sent by the TSM server, the wireless storage Take point 1 to cache the APDUs sent by the TSM server locally. At the same time, when the wireless access point 2 enters the working mode for the IoT device, the IoT device initiates a connection request to the wireless access point 2, thereby establishing a wireless connection between the IoT device and the wireless access point 2, because the initial The status is unauthenticated, so at this time, the wireless access point 2 and the IoT device cannot receive and send any data packets except IEEE 802.1x protocol packets. After the wireless connection between the IoT device and the wireless access point 2 is established, the IoT device sends an authentication request (EAPOL-Start) to the wireless access point 2 through the wireless connection to start the authentication process. After receiving the authentication request from the IoT device, the wireless access point 2 sends an EAP request (EAP-Request/Identity) of the Identity (identity) type to the IoT device, asking the IoT device to send its identity to the wireless access point. point 2. After receiving the EAP request (EAP-Request/Identity) from the wireless access point 2, the IoT device sends the identification information to the wireless access point 2 through the EAP response frame (EAP-Response/Identity) of the Identity type. After the EAP request (EAP-Request/Identity) sent by the wireless access point 2, the wireless access point 2 sends the EAP response frame (EAP-Response/Identity) to the TSM server for processing. As shown in FIG. 3 , after the above-mentioned first authentication stage is completed, a switching operation of switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed. For details, please refer to the following steps S103 to S105 for the description Detailed description of the toggle operation. (2) The second authentication stage is preferably implemented in the following manner: Receive a challenge message sent by the wireless access point 2; the challenge message includes a key for encrypting cipher information; encrypting the cipher information corresponding to the identification information; and sending a response message including the encrypted cipher information to the TSM server based on the second wireless link. For example, as shown in FIG. 3, in the second authentication stage, the wireless access point 1 enters the sleep mode for the IoT device. Therefore, after the wireless access point 1 receives the APDU message sent by the TSM server, the wireless storage Take point 1 to cache the APDUs sent by the TSM server locally. After the TSM server receives the request from the wireless access point 2 (that is, the EAP response frame (EAP-Response/Identity)), after extracting the identification information corresponding to the IoT device, the identification information is combined with the identification information in the database. Compare the identification information list, find the password information corresponding to the identification information, encrypt the password with a randomly generated MD5 Challenge message, and then encapsulate the MD5 Challenge message in the EAPOR format and send it to the wireless access via an Access-Challenge message. point 2. After receiving the Access-Challenge message in the EAPOR format from the TSM server, the wireless access point 2 forwards the MD5 Challenge message to the IoT device through decapsulation. After receiving the MD5 Challenge message (that is, the challenge message) forwarded by the wireless access point 2, the IoT device uses the Challenge message to encrypt the password part, and then generates an EAP-Response/MD5 Challenge message, which will be generated. The EAP-Response/MD5 Challenge message (ie the response message) is sent to the wireless access point 2. The wireless access point 2 encapsulates the EAP-Response/MD5 Challenge message in an EAPOR format in a message (Access-Request) and sends it to the TSM server. As shown in FIG. 3 , after the above-mentioned second authentication stage is completed, a switching operation of switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed. For details, please refer to the following steps S103 to S105 for the description Detailed description of the toggle operation. (3) The third authentication stage is preferably implemented in the following manner: receiving an authentication pass message sent by the wireless access point 2; the authentication pass message is sent by the TSM server to the After the password information is verified, it is sent to the wireless access point 2; Receive the notification sent by the wireless access point 2 that its port is authorized to access the IoT device; Receive the polling message sent by the wireless access point 2; The polling message sends the corresponding polling response message to the wireless access point 2. For example, as shown in FIG. 3, in the third authentication stage, the wireless access point 1 enters the sleep mode for the IoT device. Therefore, after the wireless access point 1 receives the APDU message sent by the TSM server, the wireless storage Take point 1 to cache the APDUs sent by the TSM server locally. After receiving the Access-Request message containing the encrypted password information from the wireless access point 2, the TSM server compares it with the locally encrypted password information. The wireless access point 2 sends an authentication pass message (Access-Accept). After the wireless access point 2 receives the Access-Accept message, it decapsulates it through EAPOR and sends it to the IoT device in an EAP-Success message, and changes the port to the authorized state, allowing the IoT device to access through the port. In addition, while the connection between the IoT device and the wireless access point 2 is online, the wireless access point 2 will monitor the online status of the IoT device by periodically sending a Handshake Request (polling message) to the IoT device. After receiving the Handshake Request (polling message), the IoT device sends a Handshake Response (polling response message) to the wireless access point 2, indicating that the connection between the IoT device and the wireless access point 2 is still online. As shown in FIG. 3 , after the above-mentioned first authentication stage is completed, a switching operation of switching the IoT device from the wireless access point 2 to the wireless access point 1 is performed. For details, please refer to the following steps S103 to S105 for the description Detailed description of the toggle operation. During specific implementation, in addition to the above-mentioned method of decomposing the authentication operation into three authentication stages, the authentication operation can also be decomposed into one, two, four or even more authentication phases. The specific implementation manner is similar to the manner of decomposing the authentication operation into three authentication stages provided above. For example, decomposing the authentication operation into an authentication phase specifically includes: establishing a second wireless link between the IoT device and the wireless access point 2, and sending a message to the wireless access point 2 based on the second wireless link Authentication request, receive the identification information acquisition request returned by the wireless access point 2 for the authentication request, and send a response frame to the wireless access point 2 in response to the identification information acquisition request, where the response frame contains the corresponding identification information; receive a challenge message sent by the wireless access point 2, the challenge message includes a key for encrypting the password information, and the password information corresponding to the identification information is encrypted by using the key, based on the The second wireless link sends a response message including the encrypted password information to the TSM server; receives an authentication pass message sent by the wireless access point 2, the authentication pass message is sent by the TSM server to the response message The password information contained in the password is sent to the wireless access point 2 after the verification is passed, and the notification sent by the wireless access point 2 that its port is authorized to access the Internet of Things device is received. Step S103, switching the terminal device from the second wireless access point back to the first wireless access point. It should be noted that this step, the following step S104 and the following step S105 together constitute the switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1. The precondition for performing the switching operation of switching the device from the wireless access point 2 back to the wireless access point 1 is after the first authentication phase, the second authentication phase and the third authentication phase are performed respectively. Specifically, as shown in FIG. 3 , the switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed for the first time after the first authentication stage is performed, and The second authentication stage is performed before execution. The switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed for the second time after the second authentication phase is performed and before the third authentication phase is performed. The switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed for the third time after the third authentication stage is performed. As mentioned above, the wireless access point 1 has two modes: sleep mode and working mode for the IoT device and the wireless access point 2. Based on this, this step switches the IoT device from the wireless access point 2 back to the wireless access mode. Point 1 is preferably achieved by setting the mode of the wireless access point 2 for the IoT device to the sleep mode, and setting the mode of the wireless access point 1 to the IoT device to the working mode. Step S104, based on the terminal device receiving the data message cached by the first wireless access point. After switching the IoT device from the wireless access point 2 back to the wireless access point 1 in the above step S103, this step is based on the IoT device receiving the data message cached by the wireless access point 1, and storing the received data The message is transmitted to the security chip set by the IoT device for execution, and the execution result of the security chip for the data message is returned to the TSM server through the wireless access point 1 . Step S105, switching the terminal device from the first wireless access point to the second wireless access point. As mentioned above, the wireless access point 1 has two modes: sleep mode and working mode for the IoT device and the wireless access point 2. Based on this, this step switches the IoT device from the wireless access point 1 to the wireless access point. Point 2 is preferably achieved by setting the mode of the wireless access point 1 for the IoT device to the sleep mode, and setting the mode of the wireless access point 2 to the IoT device to the working mode. In a preferred implementation provided by the embodiment of this application, after the third authentication stage is executed, and before this step is executed to switch the IoT device from the wireless access point 1 to the wireless access point 2, the following judgment operation may also be performed , determine whether the over-the-air card issuance request is completed, and if it is completed, perform this step to switch the IoT device from wireless access point 1 to wireless access point 2, and the IoT device through wireless access point 2 and TSM servo If the over-the-air card issuance request has not been executed, then return to the above-mentioned step S104, based on the Internet of Things device to receive the data message issued by the TSM server cached by the wireless access point 1, and send it by the Internet of Things device. The security chip provided by the networked device executes the data message. As shown in FIG. 3 , after the three authentication stages of the above authentication operation are all executed, and after the switching operation composed of the above steps S103 to S105 is executed for the third time, the Internet of Things device is completed. The switching operation of the wireless access point 1 to the wireless access point 2, after this switching operation, the data message transmission between the IoT device and the TSM server is completed through the wireless access point 2, thereby realizing the Internet of Things "Seamless handover" of devices from AP 1 to AP 2, because during the above handover operation, the IoT device is switched between AP 1 and AP 2 Switching back and forth, on the one hand, avoids the loss of data packets transmitted between the IoT device and the TSM server, and ensures the normal operation of over-the-air card issuance; on the other hand, completes the authentication operation of the IoT device on the TSM server through the wireless access point 2 , so that after the IoT device is finally switched to the wireless access point 2, the IoT device can achieve normal access to the TSM server through the wireless access point 2. During this switching process, the user cannot perceive the connection. Interruptions, not even perceived delays due to authentication, are "seamless handovers". To sum up, the reliable server management method for supporting wireless network switching, in the process of switching IoT devices from wireless access point 1 to wireless access point 2, is based on wireless access point 2 to TSM on the one hand. The server initiates an authentication operation to establish a connection between the IoT device and the TSM server, and during the execution of the authentication operation, the IoT device goes back and forth between wireless access point 2 and wireless access point 1 Handover, to avoid the loss of data packets during the wireless network switching process and cause the failure of air card issuance, and also ensure that the IoT devices can also access the TSM server normally after switching to the wireless access point 2, reducing the generation of wireless network switching. Delay. An example of a reliable server management device supporting wireless network switching provided in this application is as follows: In the above-mentioned embodiments, a reliable server management method supporting wireless network switching is provided. Correspondingly, this application also provides a reliable server management method for supporting wireless network switching. A reliable server management device supporting wireless network switching is described below with reference to the accompanying drawings. Referring to FIG. 4 , it shows a schematic diagram of an embodiment of a reliable server management device supporting wireless network handover provided by the present application. Since the apparatus embodiment is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, please refer to the corresponding description of the method embodiment provided above. The apparatus embodiments described below are merely illustrative. The present application provides a reliable server management device supporting wireless network switching, including: a data message cache unit 401, configured to detect that a terminal device is switched from a first wireless access point to a second wireless access point, notify The first wireless access point caches the data message returned by the reliable server management platform in response to the server request; the authentication operation initiating unit 402 is configured to initiate an authentication operation to the reliable server management platform based on the second wireless access point; and , run the first switching unit 403, the data message receiving unit 404 and the second switching unit 405 at least once during the running process of the authentication operation initiating unit; wherein, the first switching unit 403 is used to switch the terminal device Switching back from the second wireless access point to the first wireless access point; the data message receiving unit 404 is configured to receive the cached data of the first wireless access point based on the terminal device data message; the second switching unit 405 is configured to switch the terminal device from the first wireless access point to the second wireless access point. Optionally, the terminal device is located in the overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point. Optionally, the authentication operation is performed by being decomposed into multiple authentication stages, and the switching operation is performed at least once before, during or after each authentication stage is performed. Optionally, the authentication phases after the authentication operation is decomposed include: a first authentication phase, a second authentication phase, and a third authentication phase; After the third authentication phase is performed, the switching operations are performed respectively, and the steps from the first authentication phase, the switching operation, the second authentication phase, the switching operation, the third authentication phase to the Sequential execution of switching operations. Optionally, the first authentication stage includes: a second wireless link establishment subunit, configured to establish a second wireless link between the terminal device and the second wireless access point; sending an authentication request a subunit for sending an authentication request to the second wireless access point based on the second wireless link; an identification information acquisition request receiving subunit for receiving the authentication request from the second wireless access point The returned identification information acquisition request; a response frame sending subunit, configured to send a response frame to the second wireless access point for the identification information acquisition request; the response frame includes identification information corresponding to the terminal device. Optionally, the second authentication stage includes: a challenge message receiving subunit, configured to receive a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting cryptographic information; an encryption subunit, used for encrypting the cipher information corresponding to the identification information by using the key; a response message sending subunit, used for sending an encrypted message to the reliable server management platform based on the second wireless link The response message of the password information. Optionally, the third authentication stage includes: an authentication pass message receiving subunit, configured to receive an authentication pass message sent by the second wireless access point; the authentication pass message is sent by the reliable server The management platform verifies the password information contained in the response message and sends it to the second wireless access point; a port authorization notification receiving sub-unit is used to receive the port of the second wireless access point. A notification for authorized access to the terminal device; a polling message receiving subunit, configured to receive a polling message sent by the second wireless access point; a polling response message sending subunit, configured to The polling message sends a corresponding polling response message to the second wireless access point. Optionally, the authentication operation initiating unit 402 includes: a judging subunit for judging whether the execution of the servo request is completed, if so, running the second switching unit 405; if not, running the data message receiving unit 404. Optionally, the authentication operation initiating unit 402 includes: a first subunit for establishing a second wireless link between the terminal device and the second wireless access point; a second subunit for using sending an authentication request to the second wireless access point based on the second wireless link; a third subunit, configured to receive an identification information acquisition request returned by the second wireless access point for the authentication request; a fourth subunit, for sending a response frame to the second wireless access point in response to the identification information acquisition request; the response frame includes identification information corresponding to the terminal device; a fifth subunit, for receiving A challenge message sent by the second wireless access point; the challenge message includes a key for encrypting the cipher information; a sixth subunit is used to use the key to perform encryption on the cipher information corresponding to the identification information encryption; a seventh subunit for sending a response message including the encrypted password information to the reliable server management platform based on the second wireless link; an eighth subunit for receiving the second wireless link An authentication pass message sent by the access point; the authentication pass message is sent to the second wireless access point after the reliable server management platform verifies the password information contained in the response message and passes it; The nine subunits are used for receiving a notification sent by the second wireless access point that its port is authorized to access the terminal device. Optionally, the mode of the first wireless access point for the terminal device includes an operating mode and/or a sleep mode, and the mode of the second wireless access point for the terminal device includes an operating mode and/or sleep mode; wherein, if the mode of the first wireless access point and/or the second wireless access point for the terminal device is the sleep mode, the first wireless access point and/or the second wireless access point The two wireless access points cache the data packets sent to the terminal device. Optionally, the first switching unit 403, by setting the second wireless access point to the terminal device in the sleep mode, and setting the first wireless access point to the terminal device Implemented for the described working mode. Optionally, the second switching unit 405 sets the first wireless access point to the terminal device in the sleep mode, and sets the second wireless access point to the terminal device Implemented for the described working mode. Optionally, the reliable server management apparatus supporting wireless network handover includes: a server request sending unit configured to, based on a first wireless link established between the terminal device and the first wireless access point, Initiating the service request to the reliable service management platform; and a data message receiving unit, configured to receive the data message returned by the reliable service management platform for the service request based on the first wireless link. Optionally, the reliable server management device supporting wireless network handover includes: a signal strength judgment unit for judging whether the signal strength of the wireless network of the second wireless access point is greater than that of the first wireless access point The signal strength of the wireless network, if yes, switch the terminal device from the first wireless access point to the second wireless access point. Optionally, the terminal device includes an Internet of Things device. Optionally, the servo request includes: an over-the-air card issuance request. Another example of a reliable server management method for supporting wireless network handover provided in this case is as follows: In the above-mentioned embodiment, a reliable server management method for supporting wireless network handover is provided, and in cooperation with it, this case also provides another The reliable server management method supporting wireless network switching is implemented based on terminal equipment, and is described below with reference to the accompanying drawings. Referring to FIG. 5 , it shows a process flow chart of another embodiment of a reliable server management method supporting wireless network handover provided by the present application. Since this method embodiment corresponds to the method embodiment provided above, the description is relatively simple, and for relevant parts, please refer to the corresponding description of the method embodiment provided above. The method embodiments described below are merely illustrative. This application provides a reliable server management method for supporting wireless network switching, including: Step S501, switching from a first wireless access point to a second wireless access point, and sending a cache data report to the first wireless access point and, after switching from the first wireless access point to the second wireless access point, perform at least one handover operation as follows: Step S502, switching from the second wireless access point to the second wireless access point the first wireless access point; Step S503, receive the cached data message sent by the first wireless access point; Step S504, switch from the first wireless access point to the second wireless access point A wireless access point; wherein, the data message is returned by a reliable server management platform for a server request. Optionally, the reliable service management method for supporting wireless network handover includes: establishing a first wireless link with the first wireless access point; receiving the reliable service management based on the first wireless link The data message returned by the platform for the server request. Optionally, before performing the above step S501, perform the following steps: determine whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, if so, perform the above Step S501, switching from the first wireless access point to the second wireless access point, and sending a notification of a cache data packet to the first wireless access point. Optionally, the servo request includes: an over-the-air card issuance request. Another example of a reliable server management device supporting wireless network handover provided in this case is as follows: In the above-mentioned embodiment, another reliable server management method supporting wireless network handover is provided. Correspondingly, this case also provides Another reliable server management device supporting wireless network switching is provided, which will be described below with reference to the accompanying drawings. Referring to FIG. 6 , it shows a schematic diagram of another embodiment of a reliable server management apparatus supporting wireless network handover provided by the present application. Since the apparatus embodiment is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, please refer to the corresponding description of the method embodiment provided above. The apparatus embodiments described below are merely illustrative. This application provides another reliable server management device supporting wireless network handover, comprising: a handover notification unit 601 for handover from a first wireless access point to a second wireless access point, and reporting to the first wireless access point sending a notification of the cache data message; and, after running from the handover notification unit 601, run the wireless access point switching unit 602, the cache data message receiving unit 603 and the wireless access point secondary switching unit at least once 604; the wireless access point switching unit 602 for switching from the second wireless access point to the first wireless access point; the cache data message receiving unit 603 for receiving the the cached data message sent by the first wireless access point; the wireless access point secondary switching unit 604 for switching from the first wireless access point to the second wireless access point point; wherein, the data message is returned by the reliable servo management platform for the servo request. An example of an electronic device provided by this application is as follows: In the above-mentioned embodiment, a reliable server management method for supporting wireless network handover is provided, and in addition, this application also provides a reliable method for realizing the supporting wireless network switching. The electronic equipment of the servo management method will be described below with reference to the accompanying drawings. Referring to FIG. 7 , it shows a schematic diagram of an electronic device provided in this embodiment. The description of the electronic device embodiments provided in this case is relatively simple, and for relevant parts, please refer to the corresponding descriptions of the embodiments of the reliable server management method supporting wireless network handover provided above. The embodiments described below are merely illustrative. This application provides an electronic device, including: a memory 701 and a processor 702; the memory 701 is used to store computer-executable instructions, and the processor 702 is used to execute the following computer-executable instructions: After the wireless access point switches to the second wireless access point, the first wireless access point is notified to cache the data message returned by the reliable server management platform for the server request; The reliable server management platform initiates an authentication operation; and, during the execution of the authentication operation, the following switching operations are performed at least once: switching the terminal device from the second wireless access point back to the first wireless access point; Based on the terminal device receiving the data message cached by the first wireless access point; switching the terminal device from the first wireless access point to the second wireless access point. Optionally, the terminal device is located in the overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point. Optionally, the authentication operation is performed by being decomposed into multiple authentication stages, and the switching operation is performed at least once before, during or after each authentication stage is performed. Optionally, the authentication phases after the authentication operation is decomposed include: a first authentication phase, a second authentication phase, and a third authentication phase; After the third authentication phase is performed, the switching operations are performed respectively, and the steps from the first authentication phase, the switching operation, the second authentication phase, the switching operation, the third authentication phase to the Sequential execution of switching operations. Optionally, the first authentication stage is implemented in the following manner: establishing a second wireless link between the terminal device and the second wireless access point; The second wireless access point sends an authentication request; receives an identification information acquisition request returned by the second wireless access point for the authentication request; sends a response frame to the second wireless access point in response to the identification information acquisition request ; The response frame includes the identification information corresponding to the terminal device. Optionally, the second authentication stage is implemented in the following manner: receiving a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting cipher information; using the key encrypting the password information corresponding to the identification information; and sending a response message including the encrypted password information to the reliable server management platform based on the second wireless link. Optionally, the third authentication stage is implemented in the following manner: receiving an authentication pass message sent by the second wireless access point; the authentication pass message is sent by the reliable server management platform to the response message The password information contained in the password is sent to the second wireless access point after the verification is passed; Receive the notification sent by the second wireless access point that its port is authorized to access the terminal device; Receive the second wireless access point The polling message sent by the wireless access point; for the polling message, a corresponding polling response message is sent to the second wireless access point. Optionally, after the third authentication phase is executed, before executing the instruction to switch the terminal device from the first wireless access point to the second wireless access point, the processor 702 is also used for executing the following computer-executable instructions: judging whether the execution of the serving request is completed, and if so, executing the instruction to switch the terminal device from the first wireless access point to the second wireless access point; If not, execute the instruction based on the terminal device receiving the data message cached by the first wireless access point. Optionally, the initiating an authentication operation to the reliable server management platform based on the second wireless access point is implemented in the following manner: establishing a second connection between the terminal device and the second wireless access point a wireless link; sending an authentication request to the second wireless access point based on the second wireless link; receiving an identification information acquisition request returned by the second wireless access point for the authentication request; for the identification The information acquisition request sends a response frame to the second wireless access point; the response frame includes identification information corresponding to the terminal device; receives a challenge message sent by the second wireless access point; the challenge message contains including a key for encrypting password information; using the key to encrypt the password information corresponding to the identification information; sending the encrypted password to the reliable server management platform based on the second wireless link information response message; receiving an authentication pass message sent by the second wireless access point; the authentication pass message is sent by the reliable server management platform after verifying the password information contained in the response message. to the second wireless access point; and receiving a notification sent by the second wireless access point that its port is authorized to access the terminal device. Optionally, the mode of the first wireless access point for the terminal device includes an operating mode and/or a sleep mode, and the mode of the second wireless access point for the terminal device includes an operating mode and/or sleep mode; wherein, if the mode of the first wireless access point and/or the second wireless access point for the terminal device is the sleep mode, the first wireless access point and/or the second wireless access point The two wireless access points cache the data packets sent to the terminal device. Optionally, the switching of the terminal device from the second wireless access point back to the first wireless access point is performed by setting the second wireless access point to the terminal device as the A sleep mode is implemented, and the first wireless access point is set to the working mode for the terminal device. Optionally, the switching of the terminal device from the first wireless access point to the second wireless access point is performed by setting the first wireless access point to the terminal device as the The sleep mode is implemented, and the second wireless access point is set to the working mode for the terminal device. Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable server management platform for the server request. Before the instructions are executed, the processor 702 is further configured to execute the following computer-executable instructions: based on the first wireless link established between the terminal device and the first wireless access point, to the reliable server management platform Initiating the serving request; and receiving the data message returned by the reliable serving management platform for the serving request based on the first wireless link. Optionally, after detecting that the terminal device is switched from the first wireless access point to the second wireless access point, notify the first wireless access point to cache the data message returned by the reliable server management platform for the server request. Before the instruction is executed, the processor 702 is further configured to execute the following computer-executable instructions: determining whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point , if yes, switch the terminal device from the first wireless access point to the second wireless access point. Optionally, the terminal device includes an Internet of Things device. Optionally, the servo request includes: an over-the-air card issuance request. Another embodiment of the electronic device provided in this case is as follows: In the above-mentioned embodiment, another reliable servo management method for supporting wireless network switching is provided. In addition, this case also provides an electronic device for implementing the method, the following The description is given in conjunction with the accompanying drawings. Referring to FIG. 8 , it shows a schematic diagram of another electronic device provided by this embodiment. The description of the electronic device embodiment provided in this case is relatively simple, and for related parts, please refer to the corresponding description of the embodiment of another reliable server management method supporting wireless network handover provided above. The embodiments described below are merely illustrative. This application provides another electronic device, including: a memory 801 and a processor 802; the memory 801 is used to store computer-executable instructions, and the processor 802 is used to execute the computer-executable instructions: switching the access point to the second wireless access point, and sending a notification of the cache data packet to the first wireless access point; and, after switching from the first wireless access point to the second wireless access point After fetching the point, perform at least one of the following switching operations: switching from the second wireless access point to the first wireless access point; receiving the cached data report sent by the first wireless access point text; switching from the first wireless access point to the second wireless access point; wherein, the data message is returned by the reliable server management platform for a server request. Optionally, the processor 802 is further configured to execute the computer-executable instructions: establishing a first wireless link with the first wireless access point; receiving the reliable server based on the first wireless link The data message returned by the management platform for the server request. Optionally, before the switching from the first wireless access point to the second wireless access point and the notification instruction of sending the cache data packet to the first wireless access point is executed, the processor 802 may further for executing the computer-executable instructions: determining whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point; The wireless access point switches to the second wireless access point, and sends a notification command of the cache data message to the first wireless access point. Optionally, the servo request includes: an over-the-air card issuance request. Although this case is disclosed above with preferred embodiments, it is not intended to limit this case. Any person skilled in the art can make possible changes and modifications without departing from the spirit and scope of this case. Therefore, the protection scope of this case should be The scope defined by the claims in this case shall prevail. In a typical configuration, a computing device includes one or more processors, an input/output interface, a network interface, and memory. Memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in the form of computer-readable media, such as read-only memory (ROM) or flash memory. RAM). Memory is an example of a computer-readable medium. Computer-readable media includes both permanent and non-permanent, removable and non-removable media, and can be implemented by any method or technology for information storage. Information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change random access memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVDs) or other optical storage, magnetic cassettes, magnetic tapes, magnetic disks or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. As defined herein, computer-readable media does not include non-transitory computer-readable media, such as modulated data signals and carrier waves. It will be apparent to those skilled in the art that the embodiments of the present invention may be provided as a method, a system or a computer program product. Accordingly, the present case may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) having computer-usable program code embodied therein.

1‧‧‧無線存取點 2‧‧‧無線存取點 401‧‧‧資料報文快取單元 402‧‧‧認證操作發起單元 403‧‧‧第一切換單元 404‧‧‧資料報文接收單元 405‧‧‧第二切換單元 601‧‧‧切換通知單元 602‧‧‧無線存取點切換單元 603‧‧‧快取資料報文接收單元 604‧‧‧無線存取點二次切換單元 701‧‧‧記憶體 702‧‧‧處理器 801‧‧‧記憶體 802‧‧‧處理器 S101‧‧‧步驟 S102‧‧‧步驟 S103‧‧‧步驟 S104‧‧‧步驟 S105‧‧‧步驟 S501‧‧‧步驟 S502‧‧‧步驟 S503‧‧‧步驟 S504‧‧‧步驟1‧‧‧Wireless Access Point 2‧‧‧Wireless Access Point 401‧‧‧Data Packet Cache Unit 402‧‧‧Authentication operation initiating unit 403‧‧‧First switching unit 404‧‧‧Data message receiving unit 405‧‧‧Second switching unit 601‧‧‧Switch notification unit 602‧‧‧Wireless Access Point Switching Unit 603‧‧‧Cache data message receiving unit 604‧‧‧Wireless Access Point Secondary Switching Unit 701‧‧‧Memory 702‧‧‧Processor 801‧‧‧Memory 802‧‧‧processor S101‧‧‧Steps Step S102‧‧‧ Step S103‧‧‧ Step S104‧‧‧ Step S105‧‧‧ S501‧‧‧Steps Step S502‧‧‧ S503‧‧‧Steps Step S504‧‧‧

附圖1是本案提供的一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖; 附圖2是本案提供的一種無線網路切換場景的示意圖; 附圖3是本案提供的一種支援無線網路切換的可靠伺服管理裝過程的示意圖; 附圖4是本案提供的一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖; 附圖5是本案提供的另一種支援無線網路切換的可靠伺服管理方法實施例的處理流程圖; 附圖6是本案提供的另一種支援無線網路切換的可靠伺服管理裝置實施例的示意圖; 附圖7是本案提供的一種電子設備實施例的示意圖; 附圖8是本案提供的另一種電子設備實施例的示意圖。FIG. 1 is a process flow diagram of an embodiment of a reliable server management method supporting wireless network handover provided in this case; Accompanying drawing 2 is a schematic diagram of a wireless network switching scenario provided in this case; Accompanying drawing 3 is the schematic diagram of a kind of reliable server management installation process that supports wireless network switching provided by this case; FIG. 4 is a schematic diagram of an embodiment of a reliable server management device supporting wireless network switching provided by the present application; FIG. 5 is a process flow diagram of another embodiment of a reliable server management method supporting wireless network handover provided by the present application; FIG. 6 is a schematic diagram of another embodiment of a reliable server management device supporting wireless network switching provided by the present application; 7 is a schematic diagram of an embodiment of an electronic device provided in this case; FIG. 8 is a schematic diagram of another embodiment of an electronic device provided in this case.

Claims (15)

一種支援無線網路切換的可靠伺服管理方法,包括:由處理器檢測到終端設備從第一無線存取點切換到第二無線存取點後,該處理器通知該第一無線存取點快取可靠伺服管理平臺針對由該終端設備發起的伺服請求返回的資料報文;基於該第二無線存取點向該可靠伺服管理平臺發起認證操作;以及,在該認證操作執行過程中至少一次執行如下切換操作:將該終端設備從該第二無線存取點切換回該第一無線存取點;基於該終端設備接收該第一無線存取點快取的該資料報文;將該終端設備從該第一無線存取點切換到該第二無線存取點。 A reliable server management method for supporting wireless network switching, comprising: after a processor detects that a terminal device switches from a first wireless access point to a second wireless access point, the processor notifies the first wireless access point that the Get the data message returned by the reliable server management platform for the server request initiated by the terminal device; initiate an authentication operation to the reliable server management platform based on the second wireless access point; and, execute at least one time during the execution of the authentication operation The following switching operations: switching the terminal device from the second wireless access point back to the first wireless access point; receiving the data message cached by the first wireless access point based on the terminal device; Handover from the first wireless access point to the second wireless access point. 根據請求項1之支援無線網路切換的可靠伺服管理方法,其中,該終端設備處於該第一無線存取點和該第二無線存取點二者無線網路覆蓋範圍的重疊區域內。 The reliable server management method for supporting wireless network handover according to claim 1, wherein the terminal device is located in the overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point. 根據請求項2之支援無線網路切換的可靠伺服管理方法,其中,該認證操作通過分解為多個認證階段的方式進 行執行,並在每個認證階段執行前、執行過程中或者執行後,至少一次執行該切換操作。 The reliable server management method for supporting wireless network handover according to claim 2, wherein the authentication operation is performed by decomposing a plurality of authentication stages. and execute the switching operation at least once before, during, or after each authentication stage is executed. 根據請求項3之支援無線網路切換的可靠伺服管理方法,其中,該認證操作分解後的認證階段包括:第一認證階段、第二認證階段和第三認證階段;以及,在該第一認證階段、該第二認證階段和/或該第三認證階段執行後,分別執行該切換操作,並按照該第一認證階段、該切換操作、該第二認證階段、該切換操作、該第三認證階段至該切換操作的順序執行。 The reliable server management method for supporting wireless network handover according to claim 3, wherein the authentication phases after the authentication operation is decomposed include: a first authentication phase, a second authentication phase and a third authentication phase; and, in the first authentication phase stage, the second certification stage and/or the third certification stage are executed, respectively perform the switching operation, and follow the first certification stage, the switching operation, the second certification stage, the switching operation, the third certification The stages to the switching operation are executed sequentially. 根據請求項4之支援無線網路切換的可靠伺服管理方法,其中,該第一認證階段,採用如下方式實現:建立該終端設備與該第二無線存取點之間的第二無線鏈路;基於該第二無線鏈路向該第二無線存取點發送認證請求;接收該第二無線存取點針對該認證請求返回的標識資訊獲取請求;針對該標識資訊獲取請求向該第二無線存取點發送響應幀;該響應幀中包含該終端設備對應的標識資訊。 The reliable server management method for supporting wireless network handover according to claim 4, wherein, the first authentication stage is implemented in the following manner: establishing a second wireless link between the terminal device and the second wireless access point; Send an authentication request to the second wireless access point based on the second wireless link; receive an identification information acquisition request returned by the second wireless access point in response to the authentication request; report the identification information acquisition request to the second wireless storage Take the point to send a response frame; the response frame contains the identification information corresponding to the terminal device. 根據請求項5之支援無線網路切換的可靠伺服管理方法,其中,該第二認證階段,採用如下方式實現: 接收該第二無線存取點發送的質詢訊息;該質詢訊息中包含對密碼資訊進行加密的密鑰;利用該密鑰對該標識資訊對應的密碼資訊進行加密;基於該第二無線鏈路向該可靠伺服管理平臺發送包含加密後的該密碼資訊的應答訊息。 The reliable server management method for supporting wireless network handover according to claim 5, wherein the second authentication stage is implemented in the following manner: Receive a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting cryptographic information; use the key to encrypt the cryptographic information corresponding to the identification information; The reliable server management platform sends a response message including the encrypted password information. 根據請求項6之支援無線網路切換的可靠伺服管理方法,其中,該第三認證階段,採用如下方式實現:接收該第二無線存取點發送的認證通過報文;該認證通過報文由該可靠伺服管理平臺對該應答訊息中包含的該密碼資訊驗證通過後發送至該第二無線存取點;接收該第二無線存取點發送的其埠針對該終端設備授權存取的通知;接收該第二無線存取點發送的輪詢報文;針對該輪詢報文向該第二無線存取點發送相應的輪詢應答報文。 According to the reliable server management method for supporting wireless network handover according to claim 6, wherein, the third authentication stage is implemented in the following manner: receiving an authentication passing message sent by the second wireless access point; the authentication passing message is sent by the The reliable server management platform sends the password information contained in the response message to the second wireless access point after passing the verification; receives a notification sent by the second wireless access point that its port is authorized to access the terminal device; Receive a polling message sent by the second wireless access point; and send a corresponding polling response message to the second wireless access point for the polling message. 根據請求項7之支援無線網路切換的可靠伺服管理方法,其中,該第三認證階段執行後,在執行該將該終端設備從該第一無線存取點切換到該第二無線存取點步驟前,執行如下操作:判斷該伺服請求是否執行完畢,若是,執行該將該終端設備從該第一無線存取點切換到該第二無線存取點步驟;若否,執行該基於該終端設備接收該第一無線存取點 快取的該資料報文步驟。 The reliable server management method for supporting wireless network handover according to claim 7, wherein, after the third authentication stage is executed, after executing the handover of the terminal device from the first wireless access point to the second wireless access point Before the step, perform the following operations: determine whether the execution of the service request is completed, if so, perform the step of switching the terminal device from the first wireless access point to the second wireless access point; if not, perform the step based on the terminal The device receives the first wireless access point The step of caching this data message. 根據請求項3之支援無線網路切換的可靠伺服管理方法,其中,該基於該第二無線存取點向該可靠伺服管理平臺發起認證操作,採用如下方式實現:建立該終端設備與該第二無線存取點之間的第二無線鏈路;基於該第二無線鏈路向該第二無線存取點發送認證請求;接收該第二無線存取點針對該認證請求返回的標識資訊獲取請求;針對該標識資訊獲取請求向該第二無線存取點發送響應幀;該響應幀中包含該終端設備對應的標識資訊;接收該第二無線存取點發送的質詢訊息;該質詢訊息中包含對密碼資訊進行加密的密鑰;利用該密鑰對該標識資訊對應的密碼資訊進行加密;基於該第二無線鏈路向該可靠伺服管理平臺發送包含加密後的該密碼資訊的應答訊息;接收該第二無線存取點發送的認證通過報文;該認證通過報文由該可靠伺服管理平臺對該應答訊息中包含的該密碼資訊驗證通過後發送至該第二無線存取點;接收該第二無線存取點發送的其埠針對該終端設備授權存取的通知。 The reliable server management method for supporting wireless network handover according to claim 3, wherein the initiation of an authentication operation to the reliable server management platform based on the second wireless access point is implemented in the following manner: establishing the terminal device and the second wireless access point. a second wireless link between wireless access points; sending an authentication request to the second wireless access point based on the second wireless link; receiving an identification information acquisition request returned by the second wireless access point for the authentication request ; Send a response frame to the second wireless access point for the identification information acquisition request; the response frame contains the identification information corresponding to the terminal device; receive a challenge message sent by the second wireless access point; the challenge message contains a key for encrypting cryptographic information; using the key to encrypt the cryptographic information corresponding to the identification information; sending a response message containing the encrypted cryptographic information to the reliable server management platform based on the second wireless link; receiving The authentication pass message sent by the second wireless access point; the authentication pass message is sent to the second wireless access point by the reliable server management platform after the password information contained in the response message has passed the verification; A notification sent by the second wireless access point that its port authorizes access to the terminal device. 根據請求項1至9任意一之支援無線網路切換的可靠伺服管理方法,其中,該第一無線存取點針對該終端設備的模式包括工作模式和/或休眠模式,且該第二無線存取點針對該終端設備的模式包括工作模式和/或休眠模式;其中,若該第一無線存取點和/或該第二無線存取點針對該終端設備的模式為休眠模式,該第一無線存取點和/或該第二無線存取點將向該終端設備發送的資料報文快取。 The reliable server management method for supporting wireless network handover according to any one of claims 1 to 9, wherein the mode of the first wireless access point for the terminal device includes an active mode and/or a sleep mode, and the second wireless storage The mode of the access point for the terminal device includes a working mode and/or a sleep mode; wherein, if the mode of the first wireless access point and/or the second wireless access point for the terminal device is a sleep mode, the first wireless access point and/or the second wireless access point is a sleep mode. The wireless access point and/or the second wireless access point caches data packets sent to the terminal device. 根據請求項10之支援無線網路切換的可靠伺服管理方法,其中,該將該終端設備從該第二無線存取點切換回該第一無線存取點,通過將該第二無線存取點對於該終端設備設置為該休眠模式,並將該第一無線存取點對於該終端設備設置為該工作模式實現。 The reliable server management method for supporting wireless network handover according to claim 10, wherein the terminal device is handed over from the second wireless access point back to the first wireless access point, by the second wireless access point The terminal device is set to the sleep mode, and the first wireless access point is set to the working mode for the terminal device. 根據請求項10之支援無線網路切換的可靠伺服管理方法,其中,該將該終端設備從該第一無線存取點切換到該第二無線存取點,通過將該第一無線存取點對於該終端設備設置為該休眠模式,並將該第二無線存取點對於該終端設備設置為該工作模式實現。 The reliable server management method for supporting wireless network handover according to claim 10, wherein the terminal device is handed over from the first wireless access point to the second wireless access point by the first wireless access point The terminal device is set to the sleep mode, and the second wireless access point is set to the work mode for the terminal device. 根據請求項2至9任意一之支援無線網路切換的可靠伺服管理方法,其中,該檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行 前,執行如下操作:基於該終端設備與該第一無線存取點之間建立的第一無線鏈路,向該可靠伺服管理平臺發起該伺服請求;基於該第一無線鏈路接收該可靠伺服管理平臺針對該伺服請求返回的該資料報文。 The reliable server management method for supporting wireless network switching according to any one of claim 2 to 9, wherein after detecting that the terminal device switches from the first wireless access point to the second wireless access point, the first wireless storage Steps to fetch the data message returned by the reliable server management platform for the server request Before, perform the following operations: based on the first wireless link established between the terminal device and the first wireless access point, initiate the server request to the reliable server management platform; receive the reliable server based on the first wireless link The data message returned by the management platform for the server request. 根據請求項13之支援無線網路切換的可靠伺服管理方法,其中,該檢測到終端設備從第一無線存取點切換到第二無線存取點後,通知該第一無線存取點快取可靠伺服管理平臺針對伺服請求返回的資料報文步驟執行前,執行如下操作:判斷第二無線存取點的無線網路的訊號強度是否大於該第一無線存取點的無線網路的訊號強度,若是,將該終端設備從該第一無線存取點切換到該第二無線存取點。 The reliable server management method for supporting wireless network switching according to claim 13, wherein after detecting that the terminal device switches from the first wireless access point to the second wireless access point, the first wireless access point is notified to cache The reliable server management platform performs the following operations before executing the step of responding to the data message returned by the server request: judging whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point , if yes, switch the terminal device from the first wireless access point to the second wireless access point. 一種支援無線網路切換的可靠伺服管理方法,包括:由處理器從第一無線存取點切換到第二無線存取點,該處理器並向該第一無線存取點發送快取資料報文的通知;以及,在從該第一無線存取點切換到該第二無線存取點後,執行如下至少一次切換操作:從該第二無線存取點切換到該第一無線存取點;接收該第一無線存取點發送的其快取的該資料報文;從該第一無線存取點切換到該第二無線存取點; 其中,該資料報文由可靠伺服管理平臺針對由該終端設備發起的伺服請求返回。 A reliable server management method for supporting wireless network switching, comprising: switching from a first wireless access point to a second wireless access point by a processor, the processor sending a cache data report to the first wireless access point and, after switching from the first wireless access point to the second wireless access point, perform at least one handover operation as follows: switching from the second wireless access point to the first wireless access point ; receive the cached data message sent by the first wireless access point; switch from the first wireless access point to the second wireless access point; Wherein, the data message is returned by the reliable servo management platform for the servo request initiated by the terminal device.
TW107138773A 2018-01-18 2018-11-01 Reliable server management method and device supporting wireless network switching TWI776982B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201810048658.8A CN110062427B (en) 2018-01-18 2018-01-18 Trusted service management method and device supporting wireless network switching and electronic equipment
??201810048658.8 2018-01-18
CN201810048658.8 2018-01-18

Publications (2)

Publication Number Publication Date
TW201933904A TW201933904A (en) 2019-08-16
TWI776982B true TWI776982B (en) 2022-09-11

Family

ID=67301955

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107138773A TWI776982B (en) 2018-01-18 2018-11-01 Reliable server management method and device supporting wireless network switching

Country Status (3)

Country Link
CN (1) CN110062427B (en)
TW (1) TWI776982B (en)
WO (1) WO2019141135A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741439A (en) * 2020-06-22 2020-10-02 河北远东通信系统工程有限公司 Cluster multicast switching method of B-trunk system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203783A1 (en) * 2002-11-08 2004-10-14 Gang Wu Wireless network handoff key
US20100157943A1 (en) * 2008-12-23 2010-06-24 Qualcomm Incorporated Access point handover control based on closed subscriber group subscription information
CN102006646A (en) * 2009-08-28 2011-04-06 华为终端有限公司 Switching method and equipment
US20140031772A1 (en) * 2012-07-30 2014-01-30 Next Healthcare, Inc. System and method for collecting stem cells
TW201545527A (en) * 2010-10-29 2015-12-01 蘋果公司 Access data provisioning apparatus and methods
US20170011395A1 (en) * 2013-09-30 2017-01-12 Apple Inc. Multi-path communication of electronic device secure element data for online payments

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848514B (en) * 2009-03-23 2016-08-03 华为技术有限公司 WiMAX access network is switched to method and the relevant device of WiFi access network
CN101631371A (en) * 2009-08-27 2010-01-20 上海交通大学 Zero delay switching method of wireless access points
FR3004884B1 (en) * 2013-04-17 2016-09-09 Oberthur Technologies SECURE ELEMENT FOR TELECOMMUNICATIONS TERMINAL

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203783A1 (en) * 2002-11-08 2004-10-14 Gang Wu Wireless network handoff key
US20100157943A1 (en) * 2008-12-23 2010-06-24 Qualcomm Incorporated Access point handover control based on closed subscriber group subscription information
CN102006646A (en) * 2009-08-28 2011-04-06 华为终端有限公司 Switching method and equipment
TW201545527A (en) * 2010-10-29 2015-12-01 蘋果公司 Access data provisioning apparatus and methods
US20140031772A1 (en) * 2012-07-30 2014-01-30 Next Healthcare, Inc. System and method for collecting stem cells
US20170011395A1 (en) * 2013-09-30 2017-01-12 Apple Inc. Multi-path communication of electronic device secure element data for online payments

Also Published As

Publication number Publication date
CN110062427A (en) 2019-07-26
CN110062427B (en) 2020-10-20
TW201933904A (en) 2019-08-16
WO2019141135A1 (en) 2019-07-25

Similar Documents

Publication Publication Date Title
US10498531B2 (en) Electronic subscriber identity module (eSIM) provisioning error recovery
RU2663972C1 (en) Security assurance at connection between communication device and network device
US10367810B2 (en) Electronic subscriber identity module (eSIM) installation and testing
US8931067B2 (en) Enabling seamless offloading between wireless local-area networks in fixed mobile convergence systems
RU2440688C2 (en) User profile, policy and distribution of pmip keys in wireless communication network
EP3065334A1 (en) Key configuration method, system and apparatus
US10798082B2 (en) Network authentication triggering method and related device
CN103888941A (en) Method and device for key negotiation of wireless network
US9807088B2 (en) Method and network node for obtaining a permanent identity of an authenticating wireless device
US20230354013A1 (en) Secure communication method and device
CN101627644A (en) Token-based dynamic key distribution method for roaming environments
US9674704B1 (en) Network connectivity switching utilizing an authentication device
JP2023519997A (en) Method and communication apparatus for securing terminal parameter updates
JP2017534214A (en) Privacy during wireless station re-authentication with an authentication server
US20170150351A1 (en) Network Connectivity Switching Utilizing an Authentication Device
CN113543121A (en) Protection method for updating terminal parameter and communication device
TWI776982B (en) Reliable server management method and device supporting wireless network switching
WO2015081784A1 (en) Method, device, and system for verifying security capability
US20220174490A1 (en) System, method, storage medium and equipment for mobile network access
WO2018126791A1 (en) Authentication method and device, and computer storage medium
CN102487505B (en) Access authentication method of sensor node, apparatus thereof and system thereof
CN112105024B (en) Base station identity authentication method, device and equipment
CN112400335A (en) Method and computing device for performing data integrity protection
US20240179529A1 (en) Message transmission method and communication apparatus
CN114143016B (en) Authentication method based on general guide architecture GBA and corresponding device

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent