WO2015113351A1 - 处理信息的方法、终端、服务器以及通信方法、系统 - Google Patents

处理信息的方法、终端、服务器以及通信方法、系统 Download PDF

Info

Publication number
WO2015113351A1
WO2015113351A1 PCT/CN2014/077817 CN2014077817W WO2015113351A1 WO 2015113351 A1 WO2015113351 A1 WO 2015113351A1 CN 2014077817 W CN2014077817 W CN 2014077817W WO 2015113351 A1 WO2015113351 A1 WO 2015113351A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
network side
backup information
original
information
Prior art date
Application number
PCT/CN2014/077817
Other languages
English (en)
French (fr)
Inventor
刘轶康
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US15/115,127 priority Critical patent/US9883402B2/en
Priority to JP2016549060A priority patent/JP6383795B2/ja
Priority to EP14880956.9A priority patent/EP3101929A4/en
Publication of WO2015113351A1 publication Critical patent/WO2015113351A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/805Real-time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, a terminal, a server, and a communication method and system for processing information.
  • Terminals such as mobile phones and tablets have become the main devices for people to contact, and people are increasingly dependent on these terminals.
  • Terminals such as mobile phones and tablets have become the main devices for people to contact, and people are increasingly dependent on these terminals.
  • an existing mobile phone must pass a Subscriber Identity Module (SIM card) to communicate with other mobile phones or tablets, and each SIM card has a unique number.
  • SIM card Subscriber Identity Module
  • the mobile phone that is forgotten at home is called the original mobile phone
  • the other mobile phone cannot be used to make a phone call to the other mobile phone using the original mobile phone number, and the phone number of the other mobile phone to the original mobile phone cannot be contacted.
  • the SIM card of the phone number must be re-submitted in order to establish communication with other users using the original number. It can be seen that there is a problem in the existing use of the mobile phone, that is, in the case of forgetting the mobile phone or losing the mobile phone, the telephone number of the original mobile phone cannot be used to establish communication with other devices.
  • the main technical problem to be solved by the embodiments of the present invention is to provide a method, a terminal, a server, and a communication method and system for processing information.
  • the original terminal in the case of a forgotten terminal or a lost terminal, the original terminal cannot be used.
  • the embodiment of the present invention provides a method for processing information, including: sending backup information of the original terminal to the network side for the replacement terminal to acquire and communicating according to the backup information, where the backup information includes: configuration information in the user identification card.
  • the method further includes: receiving the first user authentication password fed back by the network side.
  • the method when the network side asks whether to agree to send the backup information to the replacement terminal, the method further includes: agreeing or refusing to send the backup information to the replacement terminal.
  • the embodiment of the present invention further provides another method for processing information, including: the replacing terminal requests the network side to obtain backup information of the original terminal; the backup information includes: configuration information in the user identity card; and the replacement terminal receives the backup sent by the network side. Information; The replacement terminal communicates based on the backup information.
  • the method further includes: when the replacement terminal requests the network side to obtain the backup information of the original terminal, the replacement terminal sends the second user authentication password to the network side, where the network side checks the replacement terminal. right.
  • the replacement terminal and the original terminal are both mobile phones
  • the method further includes: requesting, by the replacement terminal, the network side to obtain the backup information of the original terminal, including: after the replacement mobile phone is powered on, inputting the original terminal User mobile phone number and second user authentication password; select a network matching the user's mobile phone number in the overlay network; carry the input user mobile phone number and the second user authentication password in the registration message, and initiate a request to the selected network.
  • the present invention further provides another method for processing information, including: receiving, by the network side, the backup information of the original terminal, where the backup information includes: configuration information in the user identification card; and receiving, by the network side, the backup of the original terminal sent by the replacement terminal Request for information; The network side sends the backup information to the replacement terminal.
  • the method before the network side sends the backup information to the replacement terminal, the method further includes: the network side performs authentication on the replacement terminal, and if the authentication passes, the backup information is sent to the replacement terminal.
  • the method further includes: the network side is based on the user identity identification card of the original terminal.
  • the internal configuration information generates a first user authentication password, and sends the first user authentication password to the original terminal.
  • the network side acquires the The second user authentication password;
  • the network side authenticating the replacement terminal includes: The network side determines whether the second user authentication password sent by the replacement terminal is the same as the first user authentication password, and if the same, the authentication passes.
  • the original terminal after the authentication of the replacement terminal is performed on the network side, the original terminal agrees to send the backup information to the replacement terminal and/or the original terminal does not reply to the network side within a preset time.
  • the network side sends the backup information to the replacement terminal.
  • the embodiment of the present invention further provides a communication method, including: sending backup information of the original terminal to the network side, and the backup information includes: configuration information of the user identity card of the original terminal; receiving and saving the backup information by the network side; The network side requests to obtain the backup information of the original terminal; the network side receives and responds to the request; the network side sends the backup information to the replacement terminal; the replacement terminal receives the backup information, and performs communication according to the backup information.
  • the embodiment of the invention further provides a terminal, comprising: a sending module, wherein the sending module is configured to send the backup information of the original terminal including the configuration information of the original terminal user identity card to the network side.
  • the embodiment of the present invention further provides a terminal, including: a requesting module, a receiving module, and a communication module; the requesting module is configured to request, from the network side, the backup information of the original terminal that includes configuration information in the user identification card; the receiving module is configured to Receiving backup information sent by the network side; the communication module is set to communicate according to the backup.
  • the embodiment of the present invention further provides a server, located on the network side, comprising: a storage module and a transceiver module; the storage module is configured to store backup information of the original terminal, and the backup information includes: configuration information in the user identification card; Receiving a request for acquiring backup information of the original terminal sent by the replacement terminal; the transceiver module is further configured to send the backup information to the replacement terminal.
  • the server further includes a processing module, where the processing module is configured to authenticate the replacement terminal when the transceiver module receives the request for the backup terminal to obtain the backup information of the original terminal. When the right passes, the transceiver module is notified to send the backup information to the replacement terminal.
  • the embodiment of the present invention further provides a communication system, including a first terminal, a second terminal, and a server, where the first terminal sends backup information of the original terminal to the server, and the server saves the backup information; When the backup information of the original terminal is requested, the backup information is sent to the second terminal.
  • a communication system including a first terminal, a second terminal, and a server, where the first terminal sends backup information of the original terminal to the server, and the server saves the backup information; When the backup information of the original terminal is requested, the backup information is sent to the second terminal.
  • the method for processing information, the terminal, the processor, and the communication method and system provided by the embodiment of the present invention can solve the problem that the original terminal cannot be used when the user forgets to carry or lose the original terminal in the related art.
  • the method for processing information by the terminal provided by the embodiment of the present invention specifically includes: sending the backup information of the original terminal to the network side for the replacement terminal to obtain and communicating according to the backup information, where the backup information includes: configuration information in the user identification card.
  • the method sends the configuration information of the user identification card of the original terminal to the network side and stores it in the network side.
  • the user can obtain the user identification of the original terminal from the network side by using the replacement terminal.
  • FIG. 1 is a schematic diagram of a method for processing information according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic diagram of a method for processing information according to Embodiment 2 of the present invention
  • Figure 3 is a schematic diagram of a method for processing information according to Embodiment 3 of the present invention
  • Figure 4 is a schematic structural diagram of a terminal according to Embodiment 6 of the present invention
  • Figure 5 is a schematic structural diagram of a server according to Embodiment 7 of the present invention
  • Embodiment 1 provides a method for processing information.
  • the core of the method is: sending backup information of the original terminal to the network side for the replacement terminal to acquire and perform communication according to the backup information, and backing up the information.
  • the original terminal is a terminal that the user communicates with the SIM card configuration information before using the replacement terminal.
  • the original terminal may be a terminal such as a mobile phone or a tablet computer
  • the user identification card includes a SIM card, a USIM card (Universal Subscriber Identity Module, a global user i only has another ll card), a UICC card (Universal Integrated Circuit Card), The UIM card (User Identity Module) and information stored in the terminal device to identify the user identity.
  • the sender of the backup information of the original terminal may be the original terminal itself, or may be another terminal, such as a computer of the operator.
  • the staff can directly add the new user.
  • the configuration information of the SIM card is sent to the network side.
  • the configuration information in the user identity card includes an operator name, a preferred PLMN list, etc., but does not contain security information.
  • the backup information may also include information that the user uses when using the replacement terminal, such as user address book information, installation of a common software list, backup of common software accounts, etc., so that the user can use the new information. Mobile phones to carry out work.
  • the network side may obtain the phone number corresponding to the user identity card in the original terminal or the name of the user, and the information that can uniquely identify the backup information as the identifier of the backup information.
  • the network side can search for the backup information by replacing the identifier of the backup information that the terminal needs to obtain by replacing the request sent by the terminal.
  • the method further includes: the original terminal receiving the first user authentication password fed back by the network side.
  • the first user authentication password may be a password randomly generated by the network side, or may be a password generated by the network side according to the configuration information of the user identification card, for example, the MD5 value calculated according to the configuration information. After the original terminal receives the first user authentication password, the user knows the content of the first user authentication password.
  • the network side can determine whether the password input by the user is related to the first user.
  • the authentication password is the same to determine whether the user is a legitimate user, preventing the criminals from stealing the backup information of the original terminal, and improving the security of the communication.
  • the method further includes: agreeing or refusing to send the backup information to the replacement terminal.
  • the network side asks whether the original terminal agrees to send the backup information to If the original terminal does not respond to the network side if it agrees or exceeds the specified time, the network side sends the backup information to the replacement terminal.
  • the second embodiment of the present invention provides a method for processing information.
  • the method specifically includes: replacing the terminal to request the server to obtain backup information of the original terminal; and the backup information includes: configuring the user identity card of the original terminal.
  • the replacement terminal receives the backup information sent by the network side; the replacement terminal performs communication according to the backup information.
  • the replacement terminal may be a terminal that can communicate according to the configuration information of the user identification card, such as a mobile phone, a tablet computer, or a computer.
  • the replacement terminal may request the network side to obtain the backup information, for example, registering in the network. Once the registration is successful, the network side knows that the replacement terminal obtains the backup information of the original terminal.
  • the replacement terminal when the replacement terminal requests the network side to obtain the backup information of the original terminal, the replacement terminal sends the second user authentication password to the network side for the network side to authenticate the replacement terminal.
  • the following two examples illustrate how the network side authenticates the replacement terminal by using the second user authentication password: (1) After the user sends the backup information to the network side, the network side generates the first information according to the configuration information of the user identity identification card. The user authenticates the password and informs the user. When the user obtains the backup information from the network side by using the replacement terminal, the user inputs the second user authentication password, and the network side determines whether the second user authentication password input by the user is the same as the first user authentication password. If the same, the authentication is passed.
  • the user registers in the network, and sets the user name and user password.
  • the user name takes the phone number as an example.
  • the backup information is sent to the network and saved in the network side.
  • the user uses the replacement terminal to the network
  • the network side requests to obtain backup information, it needs to log in to the network.
  • the user name and user password are required.
  • the user enters the user name (that is, the phone number when registering) and the user password.
  • the user password here is the second user authentication password.
  • the side authenticates the second user authentication password, and determines whether the second user authentication password input by the user is the same as the user password used by the user when registering. If the same, the authentication is passed.
  • the authentication of the replacement terminal is passed by the network side, it is determined that the replacement terminal is a legal terminal, and the backup information may be sent to the replacement terminal. If the authentication fails, the replacement terminal is determined not to be a legal terminal, and the backup information is not sent to the terminal. Replace the terminal. Further, if the second user authentication password that is input by the user several times is wrong, the original terminal is issued a warning to notify the legitimate user. It can be seen that by sending the second user authentication password to the network side, it is possible to effectively prevent the illegal personnel from stealing the backup information of the original terminal.
  • the network side should replace the backup information in the original terminal when the authentication of the terminal passes. Delete, to ensure that only one replacement terminal resides in the network.
  • Embodiment 3 provides a method for processing information.
  • the method specifically includes: receiving, by the network side, the backup information of the original terminal, where the backup information includes: configuration information in the user identification card; Receiving a request for retrieving backup information of the original terminal sent by the terminal; the network side transmitting the backup information to the replacement terminal.
  • the network side before the network side sends the backup information to the replacement terminal, the network side further includes: the network side authenticates the replacement terminal, and if the authentication passes, sends the backup information to the replacement terminal.
  • the network side authenticates the replacement terminal mainly to determine whether the replacement terminal has the right to obtain the backup information of the original terminal.
  • a common way to authenticate is through a password. The following two examples illustrate the authentication:
  • the network side After receiving the backup information sent by the original terminal, the network side obtains the configuration information of the user identification card in the backup information, and generates a first user authentication password according to the configuration information of the user identification card, and authenticates the first user.
  • the password is sent to the original terminal; after receiving the request for the backup terminal to obtain the backup information of the original terminal, the network side further includes: the network side acquires the second user authentication password sent by the replacement terminal; and the network side authenticates the replacement terminal.
  • the method includes: determining, by the network side, whether the second user authentication password sent by the replacement terminal is the same as the first user authentication password, and if the same, the authentication is passed.
  • the user registers in the network, and sets the user name and user password.
  • the user name takes the phone number as an example.
  • the backup information is sent to the network and saved in the network side.
  • the user uses the replacement terminal to request the network side to obtain backup information, you need to log in to the network.
  • the user enters the user name (ie, the telephone number at the time of registration) and the user password.
  • the user password here is the second user authentication password, and the network side authenticates the second user authentication password, and determines whether the second user authentication password input by the user is the same.
  • the user password used by the user at the time of registration is the same. If they are the same, the authentication is passed.
  • the authentication of the replacement terminal is passed by the network side, it is determined that the replacement terminal is a legal terminal, and the backup information may be sent to the replacement terminal. If the authentication fails, the replacement terminal is determined not to be a legal terminal, and the backup information is not sent to the terminal. Replace the terminal. Further, if the second user authentication password that is input by the user several times is wrong, the original terminal is issued a warning to notify the legitimate user. It can be seen that by sending the second user authentication password to the network side, it is possible to effectively prevent the illegal personnel from stealing the backup information of the original terminal.
  • the network side After the authentication of the replacement terminal is performed on the network side, the original terminal agrees to send the backup information to the replacement terminal, and/or the original terminal does not reply to the network side within the preset time, the network side will The configuration information is sent to the replacement terminal.
  • the backup information stored by the original terminal on the network side is obtained from the network side.
  • the network side asks whether the original terminal agrees to send the backup information to If the original terminal agrees, the network side sends the backup information to the replacement terminal.
  • the present embodiment is mainly for the convenience of the user to use the replacement terminal to communicate while forgetting to carry the original terminal
  • the original terminal when the network side asks the original terminal whether to agree to send the backup information to the replacement terminal, the original terminal usually does not Answer, so, if the original terminal does not respond to the network side within the preset time, the network side also sends the backup information to the replacement terminal.
  • the network side when the network side asks the original terminal, if the original terminal is at the user's side, and the user does not use other replacement terminals to obtain the backup information, it can be judged that the criminal is acquiring. Then, the network side may reply to disagree to send the backup information to the replacement terminal, and the network side does not send the backup information to the replacement terminal.
  • Embodiment 4 provides a communication method.
  • the method specifically includes: sending backup information of the original terminal to the network side, where the backup information includes: configuration information in the user identification card; and receiving and saving the backup information on the network side;
  • the replacement terminal requests the network side to obtain backup information of the original terminal; the network side receives and responds to the request; the network side sends the backup information to the replacement terminal; the replacement terminal receives the backup information, and performs communication according to the backup information.
  • the network side before the network side sends the backup information to the replacement terminal, the network side further includes: the network side authenticates the replacement terminal, and if the authentication passes, sends the backup information to the replacement terminal.
  • the network side authenticates the replacement terminal mainly to determine whether the replacement has the right to obtain the backup information of the original terminal.
  • the original terminal agrees to send the backup information to the replacement terminal, and/or the original terminal does not reply to the network side within the preset time, the network side will The configuration information is sent to the replacement terminal.
  • the following describes a specific embodiment: During the daily communication and work process by the user using his own mobile phone (original mobile phone), in order to prevent the phone from being taken in the future, the initiative is directed to The network initiates a request to activate the function of temporarily replacing the mobile phone.
  • the original mobile phone can save the backup information of the original terminal and the identifier of the backup information on the network.
  • the backup information includes the phone number, the configuration information of the SIM card and the network authentication code, and the identifier of the backup information is a phone number.
  • the telephone number is used to mark the owner of the relevant information set, and the configuration information in the sim card is used to provide the temporary new mobile phone without the sim card after the registration is successful, and the network authentication code is used to provide the temporary new mobile phone to confirm the legality of the network. . Users can also save other more useful information.
  • the network After receiving the information provided by the user, the network calculates the MD5 value based on the information, and generates a user authentication password related to the information, so as to ensure that the password cannot be copied by others.
  • the network sends the user authentication password to the original mobile phone. Once the user using the original phone receives the password, it can be recorded and saved in a safe place.
  • the user finds that he has forgotten the usual original mobile phone and cannot perform normal communication and work. The user can first find a previously replaced mobile phone, or borrow a mobile phone that someone else does not use temporarily, or purchase a new mobile phone. After obtaining the replacement mobile phone, there is still no SIM card at this time.
  • the user After the phone is turned on, the user enters his own mobile phone number and user authentication password, and manually searches for the covered network, and selects his own carrier's network.
  • the new mobile phone carries the mobile phone number entered by the user and the user authentication password in the registration message, and initiates a registration request to the network selected by the user.
  • the network side After receiving the registration request sent by the new mobile phone, the network side finds the previously stored information of the mobile phone number according to the mobile phone number carried therein, and calculates the MD5 value of the information, and compares it with the user authentication password provided by the user. If the comparison result is different, the user is not a legitimate user and the registration request of the user is rejected.
  • the mobile phone may be prohibited from initiating a new registration attempt within a certain period of time. If the network authentication password sent by the new mobile phone is the same as the calculated MD5 value, the new mobile phone can be considered as a legitimate user.
  • the network will initiate a page to the original mobile phone, inform the original mobile phone of the registration information of the new mobile phone, and ask whether the original mobile phone allows the new mobile phone to register. If the original mobile phone user finds that he has not used another mobile phone to initiate the registration request, he can reply to the network to reject the new mobile phone registration reply, and then can initiate the operation of modifying the backup information, which can ensure the user to verify the password update, before the update.
  • the network receives the original user's reply rejecting the new mobile phone registration within the specified time, it will reject the registration of the new mobile phone and inform the new mobile phone. If the original mobile phone replies to allow the new mobile phone to register, or if there is no response within the specified length of time, the network believes that the new mobile phone can register the network. At this point, the network will send a successful registration message to the new mobile phone, which will carry the network verification code previously saved by the user. The new mobile phone displays the network verification code to the user. If the user finds that the network verification code is different from the previously saved value, the network is considered to be an illegal network, and the new mobile phone can be controlled to disconnect the network, and the network is searched again to try to register.
  • the user can use the new mobile phone to register normally in the network, download the previously saved sim card information and save it in the mobile phone, to ensure that the new mobile phone can be used normally, and perform communication and various work.
  • the new mobile phone works normally in the communication network
  • the network should cancel the registration of the new mobile phone without the SIM card, and ensure the original The phone works fine.
  • the network should log off the registration of the previous new mobile phone when authenticating the new mobile phone, ensuring that there is only one in the network.
  • the new phone resides.
  • the address book, the common software information of the original mobile phone, the common account number and the like can be backed up, so that the new mobile phone can be correspondingly configured after being downloaded, which is convenient for the user to use.
  • Embodiment 5 This embodiment provides a terminal, where the terminal includes: a sending module, where the sending module is configured to send backup information of the original terminal including configuration information in the user identity card to the network side.
  • Embodiment 6 This embodiment provides a terminal.
  • the method includes: a requesting module, a receiving module, and a communication module.
  • the requesting module is configured to request, from the network side, the configuration information of the original terminal that includes the user identification card. Backup information;
  • the receiving module is configured to receive backup information sent by the network side;
  • the communication module is configured to communicate according to the backup.
  • Example 7 The embodiment provides a server, which is located at the network side.
  • the method includes: a storage module and a transceiver module; the storage module is configured to store backup information of the original terminal, and the backup information includes: configuration information in the user identification card;
  • the module is configured to receive a request for replacing the backup information of the original terminal sent by the replacement terminal;
  • the transceiver module is further configured to send the backup information to the replacement terminal.
  • the transceiver module may be a physical interface such as an Ethernet port.
  • the server further includes a processing module, and the processing module is configured to: when the transceiver module receives the request for acquiring the backup information of the original terminal sent by the replacement terminal, authenticating the replacement terminal, and if the authentication is passed, notifying the The transceiver module sends the backup information to the replacement terminal.
  • Embodiment 8 This embodiment provides a communication system.
  • the system includes: a first terminal, a second terminal, and a server.
  • the first terminal is a terminal provided in Embodiment 5, and the second terminal is Embodiment 6.
  • the provided terminal, the server is the server provided in Embodiment 7.
  • the first terminal sends the backup information of the original terminal to the server, and the server saves the backup information.
  • the server receives the request for the backup information of the original terminal, the server sends the backup information to the second terminal.
  • the method for processing information by the terminal specifically includes: sending the backup information of the original terminal to the network side for the replacement terminal to acquire and communicate according to the backup information, where the backup information includes: configuration information in the user identification card.
  • the method sends the configuration information of the user identification card of the original terminal to the network side and stores it in the network side.
  • the user forgets to carry the terminal or the lost terminal, the user can obtain the user identification of the original terminal from the network side by using the replacement terminal.
  • the configuration information of the card, the replacement terminal can establish communication with other terminals according to the obtained configuration information, thereby realizing establishing communication with other terminals by using the telephone number of the original terminal.

Abstract

本发明提供了处理信息的方法、终端、服务器以及通信方法、系统,可解决现有技术中当用户忘记携带或遗失原终端时,无法使用原终端的电话号码与其他设备建立通信的问题。本发明提供的终端处理信息的方法具体包括:将原终端的备份信息发送给网络侧供替换终端获取并根据备份信息进行通信,备份信息包括:用户身份识别卡内配置信息。该方法通过将原终端的用户识别卡的配置信息发送给网络侧,并存储在网络侧中,当用户忘记携带终端或遗失终端的情况下,可使用替换终端向网络侧获取原终端的用户识别卡的配置信息,替换终端可根据获取的配置信息与其他终端建立通信,由此实现了用原终端的电话号码与其他终端建立通信。

Description

处理信息的方法、 终端、 服务器以及通信方法、 系统 技术领域 本发明涉及通信领域, 尤其涉及处理信息的方法、 终端、 服务器以及通信方法、 系统。 背景技术 现代社会, 通信行业的发展使人和人之间的联系越来越密切。 手机、 平板电脑等 终端已经成为人们之间进行联系的主要设备,人们对这些终端的依赖程度也越来越高。 以手机为例, 现有的手机都必须通过用户身份识别卡 (Subscriber Identity Module, 简 称为 SIM卡) 才能与其他手机或平板电脑等进行通信, 每张 SIM卡都有唯一的号码。 如果用户将手机遗忘在家里(将遗忘在家的手机称为原手机),就不能用其他手机使用 原手机的电话号码给其他手机打电话, 其他手机拨打原手机的电话号码也不能联系上 用户。 如果用户遗失了手机, 同时遗失 SIM卡, 就必须补办该电话号码的 SIM卡, 才 能使用原号码与其他用户建立通讯。 由此可见, 现有的在使用手机时存在一个问题, 就是在遗忘手机或者遗失手机的情况下, 无法使用原手机的电话号码与其他设备建立 通信。 发明内容 本发明实施例要解决的主要技术问题是, 提供处理信息的方法、 终端、 服务器以 及通信方法、 系统, 解决相关技术中, 在遗忘终端或者遗失终端的情况下, 无法使用 原终端的电话号码与其他设备建立通信的问题。 本发明实施例提供了一种处理信息的方法, 包括: 将原终端的备份信息发送网络 侧供替换终端获取并根据备份信息进行通信, 备份信息包括: 用户身份识别卡内配置 信息。 在本发明提供的一种实施例中, 在将原终端的备份信息发送给网络侧之后, 还包 括: 接收网络侧反馈的第一用户认证密码。 在本发明提供的一种实施例中, 当被网络侧询问是否同意将备份信息发送给替换 终端时, 还包括: 同意或者拒绝将备份信息发送给替换终端。 本发明实施例还提供了另一种处理信息的方法, 包括: 替换终端向网络侧请求获 取原终端的备份信息; 备份信息包括: 用户身份识别卡内配置信息; 替换终端接收网 络侧发送的备份信息; 替换终端根据备份信息进行通信。 在本发明提供的一种实施例中, 该方法还包括: 在替换终端向网络侧请求获取原 终端的备份信息时, 替换终端向网络侧发送第二用户认证密码供网络侧对替换终端进 行鉴权。 在本发明提供的一种实施例中, 替换终端和原终端都为手机, 该方法还包括: 所 述替换终端向网络侧请求获取原终端的备份信息包括: 在替换手机开机后, 输入原终 端的用户手机号和第二用户认证密码; 在覆盖网络中选择与用户手机号匹配的网络; 将输入的用户手机号以及第二用户认证密码携带在注册消息中, 向选定的网络发起请 求。 本发明还提供了另一种处理信息的方法, 包括: 网络侧接收并保存原终端的备份 信息, 备份信息包括: 用户身份识别卡内配置信息; 网络侧接收替换终端发送的获取 原终端的备份信息的请求; 网络侧将备份信息发送给替换终端。 在本发明提供的一种实施例中, 在网络侧将备份信息发送给替换终端之前, 还包 括:网络侧对替换终端进行鉴权, 如果鉴权通过, 则将备份信息发送给替换终端。 在本发明提供的一种实施例中, 在网络侧接收到原终端的备份信息之后, 在替换 终端向网络侧请求获取原终端的备份信息之前还包括: 网络侧依据原终端的用户身份 识别卡内配置信息生成第一用户认证密码, 并将第一用户认证密码发送给原终端; 在 网络侧接收替换终端发送的获取原终端的备份信息的请求时, 还包括: 网络侧获取替 换终端发送的第二用户认证密码; 网络侧对替换终端进行鉴权包括: 网络侧判断替换 终端发送的第二用户认证密码是否与第一用户认证密码相同, 如果相同,则鉴权通过。 在本发明提供的一种实施例中, 在网络侧对替换终端进行的鉴权通过之后, 在原 终端同意将备份信息发送给替换终端和 /或原终端在预设时间内没有回复网络侧的情 况下, 网络侧将备份信息发送给替换终端。 本发明实施例还提供了一种通信方法,包括:将原终端的备份信息发送给网络侧, 备份信息包括: 原终端的用户身份识别卡内配置信息; 网络侧接收并保存备份信息; 替换终端向网络侧请求获取原终端的备份信息; 网络侧接收并响应请求; 网络侧 将备份信息发送给替换终端; 替换终端接收备份信息, 并根据备份信息进行通信。 本发明实施例还提供了一种终端, 包括: 发送模块, 发送模块设置为将原终端的 包含原终端用户身份识别卡内配置信息的备份信息发送给网络侧。 本发明实施例还提供了一种终端, 包括: 请求模块、 接收模块和通信模块; 请求 模块设置为向网络侧请求获取原终端的包含用户身份识别卡内配置信息的备份信息; 接收模块设置为接收网络侧发送的备份信息; 通信模块设置为根据备份进行通信。 本发明实施例还提供了一种服务器, 位于网络侧, 包括: 存储模块和以收发模块; 存储模块设置为存储原终端的备份信息, 备份信息包括:用户身份识别卡内配置信息; 收发模块设置为接收替换终端发送的获取原终端的备份信息的请求; 收发模块还设置 为将备份信息发送给替换终端。 在本发明提供的一种实施例中, 该服务器还包括处理模块, 处理模块设置为在收 发模块接收到替换终端发送的获取原终端的备份信息的请求时,对替换终端进行鉴权, 如果鉴权通过, 则通知收发模块将备份信息发送给替换终端。 本发明实施例还提供了一种通信系统, 包括第一终端、 第二终端和服务器, 第一 终端将原终端的备份信息发送给服务器, 服务器保存该备份信息; 当服务器接收到第 二终端获取原终端的备份信息请求时, 将备份信息发送给第二终端。
本发明实施例的有益效果是: 本发明实施例提供的处理信息的方法、 终端、 处理器以及通信方法、 系统, 可解 决相关技术中当用户忘记携带或遗失原终端时, 无法使用原终端的电话号码与其他设 备建立通信的问题。 本发明实施例提供的终端处理信息的方法具体包括: 将原终端的 备份信息发送给网络侧供替换终端获取并根据备份信息进行通信, 备份信息包括: 用 户身份识别卡内配置信息。 该方法通过将原终端的用户识别卡的配置信息发送给网络 侧, 并存储在网络侧中, 当用户忘记携带终端或遗失终端的情况下, 可使用替换终端 向网络侧获取原终端的用户识别卡的配置信息, 替换终端可根据获取的配置信息与其 他终端建立通信, 由此实现了用原终端的电话号码与其他终端建立通信。 附图说明 图 1为本发明实施例一提供的处理信息的方法的示意图; 图 2为本发明实施例二提供的处理信息的方法的示意图; 图 3为本发明实施例三提供的处理信息的方法的示意图; 图 4为本发明实施例六提供的终端的结构示意图; 图 5为本发明实施例七提供的服务器的结构示意图; 图 6为本发明实施例八提供的通信系统的结构示意图。 具体实施方式 下面通过具体实施方式结合附图对本发明作进一步详细说明。 实施例一: 本实施例提供了一种处理信息的方法, 请参见图 1, 该方法的核心是: 将原终端 的备份信息发送给网络侧供替换终端获取并根据备份信息进行通信, 备份信息包括: 用户身份识别卡内配置信息。 在本实施例中, 原终端为用户在使用替换终端之前用 sim卡配置信息进行通信的 终端。 原终端可以是手机、 平板电脑等终端, 用户身份识别卡包括 SIM卡、 USIM卡 (Universal Subscriber Identity Module, 全球用户 i只另 ll卡)、 UICC卡 (Universal Integrated Circuit Card, 通用集成电路卡)、 UIM卡 (User Identity Module, 用户识别模块) 以及 存储在终端设备内标识用户身份的信息等。 在本实施例中, 发送原终端的备份信息的发送方可以是原终端自身, 也可以是其 他终端, 例如运营商的电脑, 当用户办理了新 SIM卡时, 工作人员可直接将用户的新 SIM卡的配置信息发送给网络侧。 在本实施例中,用户身份识别卡内配置信息包括运营商名称,优选 PLMN列表等, 但是不含安全信息。 备份信息除了包括用户身份识别卡内配置信息之外, 还可包括用 户使用替换终端时会用到的信息, 例如用户通讯录信息、 安装常用软件列表、 常用软 件账号备份等信息, 便于用户使用新手机来开展工作。 在本实施例中, 网络侧可以在接收原终端的备份信息时获取原终端中的用户身份 识别卡对应的电话号码或者用户的姓名等能唯一标识该备份信息的信息作为备份信息 的标识。 在替换终端向网络侧请求获取原终端的备份信息时, 网络侧可通过替换终端 发送的请求中获取替换终端需要获取的备份信息的标识对备份信息进行查找。 在本实施例中, 在将原终端的备份信息发送给网络侧之后, 还包括: 原终端接收 网络侧反馈的第一用户认证密码。 第一用户认证密码可以是网络侧随机产生的密码, 也可以是网络侧根据用户身份识别卡内配置信息生成的密码, 例如根据配置信息计算 的 MD5 值。 原终端接收到第一用户认证密码之后, 用户便获知了第一用户认证密码 的内容, 在用户使用替换终端向网络侧获取备份信息时, 网络侧可通过判断用户输入 的密码是否与第一用户认证密码相同来判断用户是否为合法用户, 防止不法分子盗用 原终端的备份信息, 提高了通信的安全性。 在本实施例中, 当原终端被网络侧询问是否同意将备份信息发送给替换终端时, 还包括: 同意或者拒绝将备份信息发送给替换终端。 当用户忘记携带原终端或遗失原 终端时, 在使用替换手机时, 会向网络侧获取原终端存储在网络侧上的备份信息, 这 时, 网络侧会询问原终端是否同意将备份信息发送给替换终端, 如果原终端同意或超 过规定时间没有回应网络侧, 则网络侧就将所述备份信息发送给替换终端。
实施例二 本实施例提供一种处理信息的方法, 请参见图 2, 该方法具体包括: 替换终端向 服务端请求获取原终端的备份信息; 备份信息包括: 原终端的用户身份识别卡内配置 信息; 替换终端接收网络侧发送的备份信息; 替换终端根据备份信息进行通信。 在本实施例中, 替换终端可以是手机、 平板电脑、 电脑等可以根据用户身份识别 卡内配置信息进行通信的终端。 替换终端向网络侧请求获取备份信息的方式有多种, 例如在网络中进行注册, 一旦注册成功, 网络侧就获知替换终端获取原终端的备份信 息的请求。 在本实施例中, 在替换终端向网络侧请求获取原终端的备份信息时, 替换终端向 网络侧发送第二用户认证密码供网络侧对替换终端进行鉴权。 下面以两个例子说明网 络侧如何通过第二用户认证密码对替换终端进行鉴权: ( 1 )用户在将备份信息发送给网络侧之后, 网络侧根据用户身份识别卡内配置信 息生成了第一用户认证密码, 并告知用户。 用户在使用替换终端向网络侧获取备份信 息时, 输入第二用户认证密码, 网络侧通过判定用户输入的第二用户认证密码是否同 第一用户认证密码相同, 如果相同, 则鉴权通过。
(2)用户在网络中进行注册,设置了用户名和用户密码,用户名以电话号码为例, 注册成功之后, 将备份信息发送给网络, 保存在网络侧中。 当用户使用替换终端向网 络侧请求获取备份信息时, 需要登录网络, 登录网络时, 需要用户名和用户密码, 用 户输入用户名 (即注册时的电话号码) 和用户密码, 这里的用户密码就是第二用户认 证密码, 网络侧对该第二用户认证密码进行认证, 判断用户输入的第二用户认证密码 是否同用户在注册时使用的用户密码相同, 如果相同, 则鉴权通过。 如果网络侧对替换终端的鉴权通过, 则判断替换终端是合法的终端, 可以将备份 信息发送给替换终端, 如果鉴权没有通过, 则判定替换终端不是合法的终端, 不将备 份信息发送给替换终端。 进一步地, 如果用户连续输入几次的第二用户认证密码都是 错误的, 则向原终端发出警告告知合法用户。 由此可见, 通过向网络侧发送第二用户 认证密码可以有效地防止非法人员盗用原终端的备份信息。 在替换终端在通信网络中正常工作的任何时间, 一旦有其他终端向网络侧发起获 取备份信息的请求, 网络侧在对该终端的鉴权通过的时候, 都应该将原替换终端中的 备份信息删除, 保证网络中仅有一个替换终端驻留。
实施例三 本实施例提供了一种处理信息的方法, 请参见图 3, 该方法具体包括: 网络侧接 收并保存原终端的备份信息, 备份信息包括: 用户身份识别卡内配置信息; 网络侧接 收替换终端发送的获取原终端的备份信息的请求;网络侧将备份信息发送给替换终端。 在本实施例中, 网络侧将备份信息发送给替换终端之前, 还包括:网络侧对替换终 端进行鉴权, 如果鉴权通过, 则将备份信息发送给替换终端。 网络侧对替换终端进行 鉴权主要是为了判断替换终端是否有权限获取原终端的备份信息。 常见的鉴权方式就 是通过密码的方式。 下面举两个例子对鉴权进行进一步的说明:
( 1 )在网络侧接收到原终端发送的备份信息之后,获取备份信息中的用户身份识 别卡内配置信息, 并依据用户身份识别卡内配置信息生成第一用户认证密码, 将第一 用户认证密码发送给原终端; 在网络侧接收替换终端发送的获取所述原终端的备份信 息的请求之后, 还包括: 网络侧获取替换终端发送的第二用户认证密码; 网络侧对替 换终端进行鉴权包括: 网络侧判断替换终端发送的第二用户认证密码是否与第一用户 认证密码相同, 如果相同, 则鉴权通过。
(2)用户在网络中进行注册,设置了用户名和用户密码,用户名以电话号码为例, 注册成功之后, 将备份信息发送给网络, 保存在网络侧中。 当用户使用替换终端向网 络侧请求获取备份信息时, 需要登录网络, 登录网络时, 需要用户名和用户密码, 用 户输入用户名 (即注册时的电话号码) 和用户密码, 这里的用户密码就是第二用户认 证密码, 网络侧对该第二用户认证密码进行认证, 判断用户输入的第二用户认证密码 是否同用户在注册时使用的用户密码相同, 如果相同, 则鉴权通过。 如果网络侧对替换终端的鉴权通过, 则判断替换终端是合法的终端, 可以将备份 信息发送给替换终端, 如果鉴权没有通过, 则判定替换终端不是合法的终端, 不将备 份信息发送给替换终端。 进一步地, 如果用户连续输入几次的第二用户认证密码都是 错误的, 则向原终端发出警告告知合法用户。 由此可见, 通过向网络侧发送第二用户 认证密码可以有效地防止非法人员盗用原终端的备份信息。 在本实施例中, 在网络侧对替换终端进行的鉴权通过之后, 原终端同意将备份信 息发送给替换终端和 /或原终端在预设时间内没有回复网络侧的情况下, 网络侧将配置 信息发送给替换终端。 当用户忘记携带原终端或遗失原终端时, 在使用替换手机时, 会向网络侧获取原终端存储在网络侧上的备份信息, 这时, 网络侧会询问原终端是否 同意将备份信息发送给替换终端, 如果原终端同意或则网络侧就将备份信息发送给替 换终端。 因为本实施例主要是为了方便用户在忘记携带原终端的情况下仍可使用替换 终端进行通信, 所以在网络侧向原终端询问是否同意将所述备份信息发送给替换终端 时, 原终端通常不会应答, 所以, 如果原终端在预设时间内没有回应网络侧, 则网络 侧也将备份信息发送给替换终端。 为防止不法分子盗用密码获取原终端的备份信息, 网络侧在询问原终端时, 如果原终端在用户身边, 而用户又没有使用其他的替换终端 获取备份信息, 则可判断是不法分子在获取, 则可以向网络侧回复不同意将备份信息 发送给替换终端, 则网络侧就不把备份信息发送给替换终端。
实施例四: 本实施例提供了一种通信方法, 该方法具体包括: 将原终端的备份信息发送给网 络侧, 备份信息包括: 用户身份识别卡内配置信息; 网络侧接收并保存备份信息; 替 换终端向网络侧请求获取原终端的备份信息; 网络侧接收并响应请求; 网络侧将备份 信息发送给替换终端; 替换终端接收备份信息, 并根据备份信息进行通信。 在本实施例中, 网络侧将备份信息发送给替换终端之前, 还包括:网络侧对替换终 端进行鉴权, 如果鉴权通过, 则将备份信息发送给替换终端。 网络侧对替换终端进行 鉴权主要是为了判断替换是否有权限获取原终端的备份信息。 在本实施例中, 在网络侧对替换终端进行的鉴权通过之后, 原终端同意将备份信 息发送给替换终端和 /或原终端在预设时间内没有回复网络侧的情况下, 网络侧将配置 信息发送给替换终端。 为进一步说明本实施例提供的方法, 下面以一个具体的实施例进行说明: 在用户使用自己的手机 (原手机) 进行日常通信和工作过程中, 为了以防万一以 后没带手机, 主动向网络发起请求, 开通临时替代手机的功能。 功能开通以后, 原手 机可以在网络上保存原终端的备份信息和备份信息的标识,备份信息中包括电话号码, SIM卡内配置信息及网络认证码, 备份信息的标识是电话号码。 其中电话号码用于标 记相关信息集合的归属者, sim卡内配置信息用于提供给没有 sim卡的临时新手机注 册成功以后下载使用, 网络认证码用于提供给临时新手机确认网络的合法性。 用户也 可以保存其他更多认为有用的信息。 网络收到用户提供的信息以后, 根据这些信息计算其 MD5 值, 生成与这些信息 相关的用户认证密码, 保证该密码其他人无法仿造。 网络将该用户认证密码发送给原 手机。 使用原手机的用户接收到该密码后, 可以记录并保存在安全的地方。 当某次, 用户发现自己忘带了常用的原手机, 无法进行正常的通信和工作了。 用 户首先可以找到一个此前替换的手机, 或者借用其他人暂时不用的手机, 或者新购买 一个手机。 获取了替换的手机以后, 此时还是没有 SIM卡。 用户在手机开机以后, 输 入自己的手机号以及用户认证密码, 并手动搜索有覆盖的网络, 从其中选择自己的运 营商的网络。 新的手机将用户输入的手机号以及用户认证密码携带在注册消息中, 向 用户选定的网络发起注册请求。 网络侧接收到新手机发送的注册请求以后, 根据其中携带的手机号找到该手机号 此前预存的信息, 并计算这些信息的 MD5 值, 与用户提供的用户认证密码比较。 如 果比较结果不同, 说明用户不是合法用户, 拒绝该用户的注册请求。 如果新手机连续 多次尝试注册均为非法用户, 可以禁止该手机在一段时间之内发起新的注册尝试。 如果网络比较新手机发送的用户认证密码与计算出的 MD5 值相同, 则可以认为 该新手机是合法用户。 网络会向原手机发起寻呼, 告知原手机新手机的注册信息, 并 询问原手机是否允许新手机进行注册。 如果原手机用户发现自己没有使用其他手机发 起该注册请求, 则可以回复网络一个拒绝新手机注册的回复, 并在后续可以发起修改 备份信息的操作, 该操作可以保证用户验证密码更新, 更新前的用户验证密码不再可 用。 网络如果在规定时间内接收到了原用户的拒绝新手机注册的回复, 则会拒绝新手 机的注册, 并告知新手机。 如果原手机回复允许新手机注册, 或者在规定的时间长度内没有任何回复, 则网 络认为新手机可以注册网络。 此时, 网络会发送注册成功的消息给新手机, 其中会携 带用户此前保存的网络验证码。 新手机将该网络验证码显示给用户, 用户如果对比发 现该网络验证码与此前保存的值不同, 则认为该网络为非法网络, 可以控制新手机断 开该网络, 重新搜索网络尝试注册。 如果该网络验证码正确, 则用户可以使用新手机 在该网络中正常注册, 下载此前保存的 sim卡中信息并保存在手机中, 保证新手机后 续可以正常使用, 进行通信及各项工作。 在新手机在通信网络中正常工作的任何时间,一旦带有 SIM卡的原手机向网络发 起注册请求,网络在认证原手机通过的时候,都应该注销没有 SIM卡的新手机的注册, 保证原手机可以正常工作。 在新手机在通信网络中正常工作的任何时间, 一旦有其他新手机向网络发起注册 请求, 网络在认证该新手机通过的时候, 都应该注销此前的新手机的注册, 保证网络 中仅有一个新手机驻留。 在原手机向网络发起信息备份的时候, 可选的, 可以备份通讯录、 原手机的常用 软件信息、 常用账号等信息, 以便新手机下载以后进行对应配置, 方便用户使用。
实施例五: 本实施例提供了一种终端, 该终端包括: 发送模块, 发送模块设置为将原终端的 包含用户身份识别卡内配置信息的备份信息发送给网络侧。
实施例六: 本实施例提供了一种终端, 请参见图 4, 包括: 请求模块、 接收模块和通信模块; 请求模块设置为向网络侧请求获取原终端的包含用户身份识别卡内配置信息的备份信 息; 接收模块设置为接收网络侧发送的备份信息;通信模块设置为根据备份进行通信。
实施例七: 本实施例提供了一种服务器, 位于网络侧, 请参见图 5, 包括: 存储模块、 收发 模块; 存储模块设置为存储原终端的备份信息, 备份信息包括: 用户身份识别卡内配 置信息; 收发模块设置为接收替换终端发送的获取原终端的备份信息的请求; 收发模 块还设置为将备份信息发送给替换终端。 在本实施例中, 收发模块可以是以太网口等 物理接口。 在本实施例中, 该服务器还包括处理模块, 处理模块设置为在收发模块接收到替 换终端发送的获取原终端的备份信息的请求时,对替换终端进行鉴权,如果鉴权通过, 则通知收发模块将备份信息发送给替换终端。
实施例八: 本实施例提供一种通信系统, 请参见图 6, 该系统包括: 第一终端、 第二终端和 服务器, 第一终端是实施例五提供的终端, 第二终端是实施例六提供的终端, 服务器 是实施例七提供的服务器。 第一终端将原终端的备份信息发送给服务器, 服务器保存 备份信息; 当服务器接收到第二终端获取原终端的备份信息请求时, 将备份信息发送 给第二终端。
以上内容是结合具体的实施方式对本发明所作的进一步详细说明, 不能认定本发 明的具体实施只局限于这些说明。 对于本发明所属技术领域的普通技术人员来说, 在 不脱离本发明构思的前提下, 还可以做出若干简单推演或替换, 都应当视为属于本发 明的保护范围。 工业实用性 本发明实施例提供的技术方案可以应用于通信领域, 可解决相关技术中当用户忘 记携带或遗失原终端时, 无法使用原终端的电话号码与其他设备建立通信的问题。 本 发明实施例提供的终端处理信息的方法具体包括: 将原终端的备份信息发送给网络侧 供替换终端获取并根据备份信息进行通信, 备份信息包括: 用户身份识别卡内配置信 息。该方法通过将原终端的用户识别卡的配置信息发送给网络侧, 并存储在网络侧中, 当用户忘记携带终端或遗失终端的情况下, 可使用替换终端向网络侧获取原终端的用 户识别卡的配置信息, 替换终端可根据获取的配置信息与其他终端建立通信, 由此实 现了用原终端的电话号码与其他终端建立通信。

Claims

权 利 要 求 书
1. 一种处理信息的方法, 包括: 将原终端的备份信息发送给网络侧供替换终端获取并根据所述备份信息进 行通信, 所述备份信息包括: 用户身份识别卡内配置信息。
2. 如权利要求 1所述的处理信息的方法, 其中, 在将所述原终端的备份信息发送 给网络侧之后, 还包括: 原终端接收网络侧反馈的第一用户认证密码。
3. 如权利要求 1或 2所述的处理信息的方法, 其中, 当原终端被网络侧询问是否 同意将所述备份信息发送给替换终端时, 还包括: 同意或者拒绝将所述备份信 息发送给所述替换终端。
4. 一种处理信息的方法, 包括:
替换终端向网络侧请求获取原终端的备份信息; 所述备份信息包括: 用户 身份识别卡内配置信息; 所述替换终端接收所述网络侧发送的备份信息;
所述替换终端根据所述备份信息进行通信。
5. 如权利要求 4所述的处理信息的方法, 其中, 还包括: 在所述替换终端向网络 侧请求获取原终端的备份信息时, 所述替换终端向所述网络侧发送第二用户认 证密码供所述网络侧对所述替换终端进行鉴权。
6. 如权利要求 4所述的处理信息的方法, 其中, 所述替换终端和原终端为手机, 所述方法还包括: 所述替换终端向网络侧请求获取原终端的备份信息包括: 在替换手机开机后, 输入原终端的用户手机号和第二用户认证密码; 在覆盖网络中选择与用户手机号匹配的网络; 将输入的用户手机号以及第二用户认证密码携带在注册消息中, 向选定的 网络发起请求。
7. —种处理信息的方法, 包括: 网络侧接收并保存原终端的备份信息, 所述备份信息包括: 所述用户身份 识别卡内配置信息; 所述网络侧接收替换终端发送的获取所述原终端的备份信息的请求; 所述网络侧将所述备份信息发送给所述替换终端。
8. 如权利要求 7所述的处理信息的方法, 其中, 在所述网络侧将所述备份信息发 送给所述替换终端之前, 还包括:所述网络侧对替换终端进行鉴权, 如果鉴权通 过, 则将所述备份信息发送给所述替换终端。
9. 如权利要求 8所述的处理信息的方法, 其中, 在所述网络侧接收到所述原终端的备份信息之后, 在所述替换终端向所述 网络侧请求获取原终端的备份信息之前还包括: 所述网络侧依据原终端的用户 身份识别卡内配置信息生成第一用户认证密码, 并将所述第一用户认证密码发 送给所述原终端;
在所述网络侧接收替换终端发送的获取所述原终端的备份信息的请求时, 还包括: 所述网络侧获取所述替换终端发送的第二用户认证密码; 所述网络侧对替换终端进行鉴权包括: 所述网络侧判断所述替换终端发送 的第二用户认证密码是否与所述第一用户认证密码相同, 如果相同, 则鉴权通 过。
10. 如权利要求 8或 9所述的处理信息的方法, 其中, 在所述网络侧对替换终端进 行的鉴权通过之后,在所述原终端同意将备份信息发送给替换终端和 /或所述原 终端在预设时间内没有回复所述网络侧的情况下, 所述网络侧将所述备份信息 发送给所述替换终端。
11. 一种通信方法, 包括:
将原终端的备份信息发送给网络侧, 所述备份信息包括: 所述原终端的用 户身份识别卡内配置信息; 网络侧接收并保存所述备份信息;
替换终端向网络侧请求获取原终端的备份信息; 所述网络侧接收并响应所述请求;
所述网络侧将所述备份信息发送给所述替换终端; 所述替换终端接收所述备份信息, 并根据所述备份信息进行通信。
12. 一种终端, 包括: 发送模块, 所述发送模块设置为将原终端的包含用户身份识 别卡内配置信息的备份信息发送给网络侧。
13. 一种终端, 包括: 请求模块、 接收模块和通信模块; 所述请求模块设置为向网络侧请求获取原终端的包含用户身份识别卡内配 置信息的备份信息; 所述接收模块设置为接收所述网络侧发送的所述备份信息; 所述通信模块设置为根据所述备份进行通信。
14. 一种服务器, 位于网络侧, 包括: 存储模块和以收发模块; 所述存储模块设置为存储原终端的备份信息, 所述备份信息包括: 用户身 份识别卡内配置信息;
所述收发模块设置为接收替换终端发送的获取所述原终端的备份信息的请 求;
所述收发模块还设置为将所述备份信息发送给所述替换终端。
15. 如权利要求 14所述的服务器, 其中, 还包括处理模块, 所述处理模块设置为在 收发模块接收到所述替换终端发送的获取所述原终端的备份信息的请求时, 对 所述替换终端进行鉴权, 如果鉴权通过, 则通知收发模块将所述备份信息发送 给替换终端。
16. 一种通信系统, 包括第一终端、 第二终端和服务器, 所述第一终端为如权利要 求 12所述的终端, 所述第二终端为如权利要求 13所述终端, 所述服务器为如 权利要求 14所述的服务器;所述第一终端将原终端的备份信息发送给所述服务 器, 所述服务器保存所述备份信息; 当所述服务器接收到所述第二终端获取所 述原终端的备份信息请求时, 将所述备份信息发送给所述第二终端。
PCT/CN2014/077817 2014-01-28 2014-05-19 处理信息的方法、终端、服务器以及通信方法、系统 WO2015113351A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US15/115,127 US9883402B2 (en) 2014-01-28 2014-05-19 Method, terminal and server for processing information, and communication method and system
JP2016549060A JP6383795B2 (ja) 2014-01-28 2014-05-19 情報の処理方法、端末、サーバ及び通信方法、システム
EP14880956.9A EP3101929A4 (en) 2014-01-28 2014-05-19 METHOD, TERMINAL AND INFORMATION PROCESSING SERVER, AND COMMUNICATION METHOD AND SYSTEM

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410040901.3 2014-01-28
CN201410040901.3A CN104811927A (zh) 2014-01-28 2014-01-28 处理信息的方法、终端、服务器以及通信方法、系统

Publications (1)

Publication Number Publication Date
WO2015113351A1 true WO2015113351A1 (zh) 2015-08-06

Family

ID=53696322

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/077817 WO2015113351A1 (zh) 2014-01-28 2014-05-19 处理信息的方法、终端、服务器以及通信方法、系统

Country Status (5)

Country Link
US (1) US9883402B2 (zh)
EP (1) EP3101929A4 (zh)
JP (1) JP6383795B2 (zh)
CN (1) CN104811927A (zh)
WO (1) WO2015113351A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941668A (zh) * 2016-01-05 2017-07-11 中兴通讯股份有限公司 身份识别模块切换方法、第一设备、第二设备及系统
CN105898733A (zh) * 2016-04-01 2016-08-24 宇龙计算机通信科技(深圳)有限公司 基于eSIM卡的换机方法、装置、移动终端和服务器
CN105959936B (zh) * 2016-06-24 2023-10-27 郑州信大捷安信息技术股份有限公司 用于恢复移动终端云数据的系统及数据恢复方法
CN107613485A (zh) * 2016-07-11 2018-01-19 中兴通讯股份有限公司 一种通讯方法及终端
CN108834127B (zh) * 2018-06-06 2021-08-17 中国联合网络通信集团有限公司 终端挂失方法、装置、终端及系统
CN109600685A (zh) * 2019-02-19 2019-04-09 上海闻泰信息技术有限公司 远程控制方法和装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047920A (zh) * 2007-04-12 2007-10-03 华为技术有限公司 防止手机被盗的方法、系统以及防盗手机和网络侧实体
WO2013066114A1 (ko) * 2011-11-04 2013-05-10 주식회사 케이티 내장 uicc 내 프로파일 백업 방법, 내장 uicc, 외부 개체 및 백업 장치
CN103237064A (zh) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 终端的远程锁定方法、系统、云端服务器和终端

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0000478L (sv) 2000-02-15 2001-08-16 Johan Sarskog Förfarande för säkerhetslagring av information
CA2361183C (en) * 2000-11-10 2006-01-03 Ntt Docomo, Inc. Mobile communication method and mobile communication system
GB2375261B (en) * 2001-04-30 2004-10-13 Nokia Corp Radiotelephone system
JP4141145B2 (ja) * 2002-01-29 2008-08-27 株式会社エヌ・ティ・ティ・ドコモ データダウンロード方法
JP2005275467A (ja) * 2004-03-22 2005-10-06 Sharp Corp バックアップ装置、被バックアップ装置、バックアップ媒介装置、バックアップシステム、バックアップ方法、データ復元方法、プログラム及び記録媒体
SE532862C2 (sv) * 2004-12-08 2010-04-27 Smarttrust Ab Backup-system och förfarande i ett mobilt telekommunikationsverk
US8712474B2 (en) * 2007-04-20 2014-04-29 Telefonaktiebolaget L M Ericsson (Publ) Secure soft SIM credential transfer
US8200736B2 (en) * 2007-12-24 2012-06-12 Qualcomm Incorporated Virtual SIM card for mobile handsets
US8811969B2 (en) * 2009-06-08 2014-08-19 Qualcomm Incorporated Virtual SIM card for mobile handsets
US8606232B2 (en) * 2009-06-08 2013-12-10 Qualcomm Incorporated Method and system for performing multi-stage virtual SIM provisioning and setup on mobile devices
CN101626571A (zh) * 2009-08-05 2010-01-13 中兴通讯股份有限公司 一种用户识别卡的卡信息备份方法及其系统
CN101883142A (zh) * 2010-06-22 2010-11-10 中兴通讯股份有限公司 一种终端用户信息备份方法
WO2012136160A2 (zh) * 2012-06-01 2012-10-11 华为终端有限公司 实现WiFi通信的方法、用户设备和无线路由设备
US9306914B2 (en) * 2012-06-15 2016-04-05 Kt Corporation Method and system for backing up profiles of authentication module

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047920A (zh) * 2007-04-12 2007-10-03 华为技术有限公司 防止手机被盗的方法、系统以及防盗手机和网络侧实体
WO2013066114A1 (ko) * 2011-11-04 2013-05-10 주식회사 케이티 내장 uicc 내 프로파일 백업 방법, 내장 uicc, 외부 개체 및 백업 장치
CN103237064A (zh) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 终端的远程锁定方法、系统、云端服务器和终端

Also Published As

Publication number Publication date
EP3101929A1 (en) 2016-12-07
JP6383795B2 (ja) 2018-08-29
US20160353285A1 (en) 2016-12-01
US9883402B2 (en) 2018-01-30
JP2017513085A (ja) 2017-05-25
EP3101929A4 (en) 2016-12-07
CN104811927A (zh) 2015-07-29

Similar Documents

Publication Publication Date Title
US20200007676A1 (en) Device locator disable authentication
US11863543B2 (en) Network device proximity-based authentication
WO2015113351A1 (zh) 处理信息的方法、终端、服务器以及通信方法、系统
RU2418387C2 (ru) Способ для вывода из работы мобильного устройства
US20060195694A1 (en) Method and apparatus for authenticated dial-up access to command controllable equipment
JP5571854B2 (ja) ユーザアカウント回復
US20050138394A1 (en) Biometric access control using a mobile telephone terminal
JP2000003336A (ja) 携帯型データ通信端末装置におけるユーザ認証方法及びユーザ認証システム
KR20160077071A (ko) 애플리케이션의 인증
US10321319B2 (en) Securing access to vehicles
AU2017285865B2 (en) Mobile authentication method and system therefor
CN105450629A (zh) 基于生物信息验证的路由器连接方法及装置和路由器
JP2002101091A (ja) ユーザ認証方法およびユーザ認証プログラム
JP2002229951A (ja) 本人認証システム
WO2018137309A1 (zh) 一种无线通信处理方法及装置
CN109379388B (zh) 一种身份识别方法、终端及可穿戴设备
CN110517372B (zh) 一种生物特征信息处理方法及装置
KR20120058199A (ko) 위치정보를 이용한 사용자 인증방법
JP4020520B2 (ja) 接続装置
WO2011097849A1 (zh) 鉴权方法及系统、终端、服务器与数据下载方法及装置
CN105072084B (zh) 移动终端与外接设备数据连接的建立方法
JP2007053454A (ja) 認証デバイスおよび認証方法
KR20080040859A (ko) 인체통신을 이용한 사용자 인증 시스템
WO2018047203A1 (en) A system and a method for locking a lost portable communication device
US11849326B2 (en) Authentication of a user of a software application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14880956

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016549060

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 15115127

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2014880956

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014880956

Country of ref document: EP