WO2019080062A1 - Procédé de détection d'authentification d'équipement utilisateur et produit associé - Google Patents

Procédé de détection d'authentification d'équipement utilisateur et produit associé

Info

Publication number
WO2019080062A1
WO2019080062A1 PCT/CN2017/107877 CN2017107877W WO2019080062A1 WO 2019080062 A1 WO2019080062 A1 WO 2019080062A1 CN 2017107877 W CN2017107877 W CN 2017107877W WO 2019080062 A1 WO2019080062 A1 WO 2019080062A1
Authority
WO
WIPO (PCT)
Prior art keywords
emulator
rrc
request
authentication
nth
Prior art date
Application number
PCT/CN2017/107877
Other languages
English (en)
Chinese (zh)
Inventor
史同井
Original Assignee
深圳市云中飞网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市云中飞网络科技有限公司 filed Critical 深圳市云中飞网络科技有限公司
Priority to PCT/CN2017/107877 priority Critical patent/WO2019080062A1/fr
Priority to CN201780091777.5A priority patent/CN110731094B/zh
Publication of WO2019080062A1 publication Critical patent/WO2019080062A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic

Definitions

  • the invention provides a user equipment authentication detection method and related products, and performs authentication detection on an existing terminal, so that the factory terminal does not affect the use due to the authentication failure, thereby improving the user experience.
  • an embodiment of the present invention provides a user equipment authentication detection method, which includes: an emulator receiving a random access preamble sent by a user equipment UE, and sending a random access response to the UE;
  • the emulator receives the first radio resource control RRC request sent by the UE, where the first RRC request includes: a first cell identifier, and sends a first authentication request to the UE, where the first authentication request includes: And the second RRC request is sent by the emulator, where the second RRC request includes: a second cell identifier, and the second authentication request is sent to the UE, where the second authentication request includes: And the emulator detects whether the Nth RRC request is received, and the Nth RRC request includes: an Nth cell identifier, and if the emulator does not receive the Nth RRC request, determining that the UE detection fails.
  • an authentication detection method comprising the following steps:
  • the user equipment UE sends a random access preamble to the emulator, and receives the random connection sent by the emulator. In response
  • the UE determines that the authentication information included in the first authentication information is incorrect, sending a second RRC request to the emulator, where the second RRC request includes a second cell identifier, and receiving the first sent by the emulator
  • the second authentication request includes the incorrect authentication information.
  • an emulator comprising:
  • a communication unit configured to send a random access preamble to the emulator, receive a random access response sent by the emulator, and send a first radio resource control RRC request to the emulator, where the first RRC request includes: a first cell identifier Receiving a first authentication request sent by the emulator, where the first authentication request includes: error authentication information;
  • a processing unit configured to: when the authentication information included in the first authentication information is incorrect, when the authentication information is incorrect, controlling the communication unit to send a second RRC request to the emulator, where The second RRC request includes a second cell identifier;
  • an emulator comprising one or more processors, a memory, a transceiver, a camera module, and one or more programs, the one or more programs being stored in the In memory, and configured to be executed by the one or more processors, the program comprising instructions for performing the steps of the method of the first aspect.
  • a smart device comprising one or more processors, a memory, a transceiver, a camera module, and one or more programs, the one or more programs being stored in the memory And configured to be executed by the one or more processors, the program comprising instructions for performing the steps in the method provided by the second aspect.
  • a computer readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method provided by the first aspect or the second aspect.
  • a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the first aspect or the second aspect method.
  • the detection in the abnormal network environment of the UE is implemented, that is, multiple cells, at least one LTE cell, at least one CDMA cell, and at least one GSM cell are simulated, and the UE is implemented differently.
  • the access between the system and the cell of the same standard determines whether the UE will re-initiate the RRC connection request when the authentication is incorrect, thereby preventing the UE from being unable to access other base stations due to the authentication error of one base station, thereby avoiding the UE being unable to access the UE.
  • FIG. 1 is a schematic diagram of the result of a user equipment.
  • FIG. 1A is a schematic diagram of a network architecture.
  • FIG. 2 is a schematic diagram of a terminal access procedure.
  • FIG. 3 is a schematic flowchart of a user equipment authentication detection method according to an embodiment of the present invention.
  • FIG. 4A is a schematic structural diagram of an emulator according to an embodiment of the present invention.
  • FIG. 4B is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
  • FIG. 5A is a schematic structural diagram of hardware of an emulator according to an embodiment of the present invention.
  • FIG. 5B is a schematic structural diagram of hardware of a smart device according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
  • references to "an embodiment” herein mean that a particular feature, result, or characteristic described in connection with the embodiments can be included in at least one embodiment of the invention.
  • the appearances of the phrases in various places in the specification are not necessarily referring to the same embodiments, and are not exclusive or alternative embodiments that are mutually exclusive. Those skilled in the art will understand and implicitly understand that the embodiments described herein can be combined with other embodiments.
  • FIG. 1 is a schematic diagram of user equipment results.
  • the user equipment may include a smart phone (such as an Android mobile phone, an iOS mobile phone, a Windows Phone mobile phone, etc.), a tablet computer, a palm computer, a notebook computer,
  • the user equipment is only an example, and is not exhaustive, including but not limited to the above user equipment.
  • the user equipment is referred to in the following embodiments.
  • User device User Equipment, UE
  • the foregoing user equipment is not limited to the above-mentioned realized form, and may also include, for example, an intelligent vehicle-mounted terminal, a computer device, a smart watch, and the like.
  • the terminal includes: a processor 101, a display 102, a communication module 103, and a memory 104.
  • the communication module 103 can be a Long Term Evolution (LTE) communication module.
  • LTE Long Term Evolution
  • CDMA English: Code Division Multiple Access
  • CDMA Code Division Multiple Access
  • 2G communication module In practical applications, the LTE communication module can also be used.
  • the 2G communication module is integrated, and the specific embodiment of the present invention does not limit the specific expression form of the above communication module.
  • FIG. 1A is a schematic diagram of a network architecture. As shown in FIG. 1A, as shown in FIG. 1A, there is one MSC on the core network side.
  • FIG. 1A is a schematic diagram of a network architecture, including an LTE base station, ie, an eNB (Evolved Node B), a CDMA base station, that is, a Node B, and a 2G base station, that is, a GSM radio access network.
  • GSM EDGE Radio Access Network GERAN
  • the access mode of the network can be data service or voice service or data.
  • the specific embodiment of the present invention does not limit the implementation manner of the UE accessing the core network side device.
  • the eNB, the Node B, and the GERAN may be referred to as the core network side device.
  • the core network side device may also include other devices, which are not illustrated here.
  • the number of the foregoing LTE, 3G, and 2G base stations may be multiple, and the present invention does not limit the specific number of the foregoing base stations.
  • FIG. 2 is a schematic diagram of a terminal access process. As shown in FIG. 2, the process of the terminal access terminal includes the following steps:
  • Step S200 the UE sends a random access preamble (English: random access preamble) to the eNB;
  • Step S201 The eNB sends a random access response to the UE (English: Random Access Response);
  • Step S205 The eNB sends an RRC connection setup (English: RRC connection setup) to the UE.
  • RRC connection setup English: RRC connection setup
  • Step S206 The UE sends an RRC connection setup completion to the eNB (English: RRC connection setup complete).
  • an RRC connection is established, so that the data service can be provided to the UE through the established RRC connection.
  • the method may further include:
  • the emulator receives the detection failure response returned by the UE, where the detection failure response includes: a log of the UE, where the log includes: first sending the random access preamble to receiving the detection failure message between the UE Operational record.
  • the emulator extracts the content of the log, and performs data analysis on the content to obtain a preliminary failure result.
  • the method may further include:
  • the data analysis of the content to obtain preliminary failure results includes:
  • the method may further include:
  • the UE When the UE determines that the second authentication request includes incorrect authentication information, the UE sends an Nth RRC connection request to the emulator, where the Nth RRC connection request includes: an Nth cell identifier.
  • the method may further include:
  • the UE creates a log that records all operations of the UE between the UE sending a random access request and receiving a verification failure message.
  • the UE receives a detection failure message sent by the emulator, and sends a detection failure response to the emulator, where the detection failure response includes: a log of the UE.
  • the detecting the failure message includes: the Nth cell identifier
  • the method further includes: the UE parsing the detection failure message, determining the identifier of the Mth cell, and extracting from the log and the Mth
  • the record of all operations related to the identity of the cell will be marked with the Mth cell
  • a record of all relevant operations is sent to the emulator.
  • the method may further include:
  • the communication unit is further configured to receive a detection failure response returned by the UE, where the detection failure response includes: a log of the UE, where the log includes: sending a random access preamble to receiving a detection failure message for the first time All operational records between the UEs.
  • the processing unit may further include: the processing unit is further configured to extract the content of the log, and perform data analysis on the content to obtain a preliminary failure result.
  • the processing unit may further include: the processing unit, configured to extract a first quantity of the RRC connection request in the log, and obtain a second quantity of the base station simulated by the emulator, where the first quantity is not equal to the first quantity The second number determines the initial failure result as an RRC message error.
  • the user equipment provided in the fourth aspect may further include:
  • the processing unit is further configured to: when determining that the second authentication request includes incorrect authentication information, control the communication unit to send an Nth RRC connection request to the emulator, where the Nth RRC connection request includes: The Nth cell identifier.
  • the method may further include: the processing unit, further configured to create a log, where the log records all the UEs between the UE sending a random access request and receiving a verification failure message operating.
  • the communication unit may further include: receiving, by the emulating unit, a detection failure message sent by the emulator, and sending a detection failure response to the emulator, where the detection failure response includes: The log of the UE.
  • Step S300 The UE sends a random access preamble (English: random access preamble) to the emulator;
  • Step S301 The emulator sends a random access response to the UE (English: Random Access Response);
  • Step S302 The UE sends a first RRC request to the emulator, where the first RRC request may include: a first cell identifier (which may be an LTE cell identifier).
  • Step S303 The emulator receives the first RRC request sent by the UE, and sends a first authentication request (authentication request) to the UE, where the first authentication request includes: incorrect authentication information.
  • Step S304 the UE determines that the authentication information included in the first authentication information is incorrect, and sends a second RRC request to the emulator, where the second RRC request includes: a second cell identifier (which may be a CDMA cell identifier);
  • Step S305 The emulator receives the second RRC request, and sends a second authentication request to the UE, where the second authentication request includes: incorrect authentication information (may be the same as the first authentication request, and may also be The error authentication information contained in the first authentication request is different).
  • Step S306 The emulator detects whether the Nth RRC request is received, where the Nth RRC request includes: an Nth cell identifier (which may be a GSM cell identifier), and if the emulator does not receive the Nth RRC request, determine the UE. The detection fails, and the detection failure message is sent to the UE, where the detection failure message includes: an Nth cell identifier.
  • Nth cell identifier which may be a GSM cell identifier
  • the technical solution provided by the present invention implements detection in an abnormal network environment of the UE, that is, simulates multiple cells, at least one LTE cell, at least one CDMA cell, and at least one GSM cell, and realizes that the UE is in different standards and the same.
  • the access between the cells of the system determines whether the UE will re-initiate the RRC connection request when the authentication is incorrect, and prevents the UE from being unable to access other base stations due to the authentication error of one base station, thereby avoiding that the factory UE cannot provide the user with the UE.
  • the service improves the reliability of the UE, and has the advantages of high reliability and good user experience.
  • the steps of the method provided by the embodiment shown in FIG. 3 have different technical solutions in different combinations.
  • the combination of the foregoing steps S300 and S302 may be a user equipment authentication detection method on the user equipment side, and the foregoing step S301.
  • Step S303, step S304, step S305, and step S306 are combined to be a user equipment authentication detection method on the emulator side.
  • the foregoing method may further include:
  • the foregoing detection failure message includes: an identifier of the Nth cell.
  • the UE may send a detection failure response to the emulator, and the detection
  • the test failure response may include a log of the UE.
  • the identifier of the Nth cell may be a specific identifier, and a general identifier may be used in the actual application.
  • the specific implementation manner of the present invention does not limit the specific expression of the identifier of the Nth cell, and the method will fail here.
  • the reason is returned to the UE, which enables the UE to adjust the content of the log, so that the debugger can more accurately obtain the reason why the UE fails to access the Nth cell.
  • the identifier of the Nth cell may also be the name or location of the Nth cell, and the like.
  • the detection failure message may be represented by a plurality of methods.
  • the detection failure message may be a NACK message.
  • the NACK message carries a contiguous number, such as 10 consecutive 1s or 11 consecutive zeros, and so on.
  • the above detection failure message may also be a newly set message.
  • the foregoing method further includes:
  • a log is recorded, and the log includes all operation records of the UE between the first time the random access preamble is sent and the detection failure message is received.
  • the foregoing method further includes:
  • the record of the operation includes but is not limited to: one of the received, sent message, the number of frequency sweeps, the error authentication information included in the authentication request, the frequency sweep result, or the execution command. .
  • the foregoing method may further include:
  • the emulator extracts the contents of the log, and performs data analysis on the contents of the log to obtain a preliminary failure result.
  • the emulator extracts the first number of RRC connection requests in the log, and obtains the second number of base stations simulated by the emulator. If the first quantity is not equal to the second quantity, the initial failure result is determined to be an RRC message error.
  • the reason for this preliminary failure result may be that for the UE, the number of RRC requests it sends The quantity is generally not greater than the second number of base stations simulated by the emulator. If the UE is normal, the first quantity is not greater than the second quantity, and the first quantity and the second quantity must be equal, so if the first quantity If the second number is not equal, the RRC message of the UE must have an error, so it is determined that the initial failure result of the UE is an RRC message error.
  • the simulator extracts the first group of cell identifiers of the RRC connection request, and the first group of cell identifiers and the second group of cell identifiers of the base station simulated by the emulator
  • the specific identifier is determined by the comparison, and the unique identifier may be attributed to the second group of cell identifiers but not to the first group of cell identifiers, and the unique identifier is identified to determine the type of the cell to which the cell belongs, for example, the type of the cell is an LTE cell, and the identifier is determined.
  • the initial failure result is an LTE cell RRC message error.
  • the initial failure result is determined to be an RRC message error of the CDMA cell. If the type of the cell is a GSM cell, the initial failure result is determined as an RRC message of the GSM cell. error.
  • the number of the second group of cell identifiers may be multiple, and the number of the first group of cell identifiers may be at least one.
  • the specific implementation manner of the present application does not limit the specific value of the foregoing quantity, and only the number of the second group of cell identifiers is not the number of the first group of cell identifiers.
  • the data analysis of the content of the log to obtain the preliminary failure result may specifically include:
  • the emulator extracts all the messages in the log, and queries whether all the messages have an authentication response. If the log has a sound response, the Mth cell identifier included in the sound response, such as the Mth cell identifier, is extracted. In the second group of cell identifiers (ie, the cell identifiers simulated by the emulator), it is determined that the preliminary failure result is an error authentication information configuration error or a base station authentication error.
  • the principle of the technical solution is that, for the UE, because the authentication request sent by the emulator is carried in the error authentication information, the UE cannot be authenticated successfully, that is, the authentication response message is not generated. If an authentication response is generated and the authentication response is also within the cell identifier simulated by the emulator, there are only two cases in which the analysis error may be generated. In the first case, the error authentication information is configured incorrectly into the correct authentication information. In the second case, the authentication of the base station base station on the UE side is incorrect, and the error authentication information is authenticated, so that the preliminary failure result can be determined by the analysis, thereby providing a corresponding basis for the modification of the research and development personnel.
  • FIG. 4A provides an emulator, as shown in FIG. 4A, the emulator includes:
  • the communication unit 401 is configured to receive a random access preamble sent by the user equipment UE, send a random access response to the UE, and receive a first radio resource control RRC request sent by the UE, where the first RRC request includes: the first cell And sending a first authentication request to the UE, where the first authentication request includes: incorrect authentication information; receiving a second RRC request sent by the UE, where the second RRC request includes: a second cell Identifying, sending, to the UE, a second authentication request, where the second authentication request includes: incorrect authentication information;
  • the processing unit 402 is configured to detect whether the Nth RRC request is received, where the Nth RRC request includes: an Nth RRC request, if the Nth RRC request is not received, determine that the UE fails to detect, and send a detection failure to the UE.
  • the message, the detection failure message includes: an Nth cell identifier.
  • the communication unit 401 is further configured to receive a detection failure response that is returned by the UE, where the detection failure response includes: a log of the UE, where the log includes: sending a random access preamble to the first time to receive Detecting all operation records of the UE between the failure messages.
  • the processing unit is further configured to extract content of the log, and perform data analysis on the content to obtain a preliminary failure result error.
  • the processing unit is further configured to: collect a first quantity of the RRC connection request in the log, and obtain a second quantity of the base station simulated by the emulator, if the first quantity is not equal to the second quantity, determine that the initial failure result is The RRC message is incorrect.
  • the processing unit 402 is further configured to: extract a first group of cell identifiers of the RRC connection request, and determine a unique identifier by comparing the first group of cell identifiers with a second group of cell identifiers of the base station simulated by the emulator, where the unique identifier may belong to The second group of cell identifiers are not attributed to the first group of cell identifiers, and the unique identifier is identified to determine the type of the cell to which the cell belongs. For example, if the type of the cell is an LTE cell, the initial failure result is determined to be an LTE cell RRC message error, such as The type of the cell is a CDMA cell, and the initial failure result is determined to be an RRC message error of the CDMA cell. If the type of the cell is a GSM cell, the initial failure result is determined to be an RRC message error of the GSM cell.
  • the processing unit 402 is specifically configured to use the emulator to extract all messages in the log and query all messages. Whether there is an authentication response, if the log has a sound response, and extracts the Mth cell identifier included in the sound response, for example, the Mth cell identifier is in the second group of cell identifiers (ie, the simulator simulates Within the cell identifier, the initial failure result is determined to be an error authentication information configuration error or a base station authentication error.
  • FIG. 4B provides a user equipment, where the user equipment includes:
  • the communication unit 406 is configured to send a random access preamble to the emulator, receive a random access response sent by the emulator, and send a first radio resource control RRC request to the emulator, where the first RRC request includes: the first cell Identifying, receiving, by the first authentication request sent by the emulator, the first authentication request includes: error authentication information;
  • the processing unit 407 is configured to: when it is determined that the authentication information included in the first authentication information is incorrect, when the authentication information is incorrect, control the communication unit to send a second RRC request to the emulator, where The second RRC request includes a second cell identifier;
  • the communication unit 406 is further configured to receive a second authentication request sent by the emulator, where the second authentication request includes incorrect authentication information.
  • FIG. 5A provides an emulator comprising one or more processors 501, a memory 502, a transceiver 503, a detection module 504, and one or more programs, the one or more programs being Stored in the memory and configured to be executed by the one or more processors, the program including instructions for performing steps on the emulator side of the user equipment authentication detection method.
  • FIG. 5B provides a smart device including one or more processors 506, a memory 507, a transceiver 508, and one or more programs, the one or more programs being stored in the memory And configured to be executed by the one or more processors, the program comprising instructions for performing steps in a UE side method in a user equipment authentication detection method.
  • FIG. 6 is a block diagram showing a partial result of a mobile phone related to a user equipment provided by an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a sensor 950, an audio circuit 960, a wireless fidelity (WiFi) module 970, an application processor AP980, and a communication module. 991 and power supply 990 and other components.
  • RF radio frequency
  • the handset results shown in FIG. 6 do not constitute a limitation to the handset, and may include more or fewer components than those illustrated, or some components may be combined, or different component arrangements.
  • the foregoing communication module 991 may specifically be an LTE communication module.
  • the input unit 930 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 930 can include a touch display screen 933, a fingerprint recognition device 931, and other input devices 932.
  • the fingerprint recognition device 931 is coupled to the touch display screen 933.
  • the input unit 930 can also include other input devices 932.
  • other input devices 932 may include, but are not limited to, one or more of physical buttons, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the touch display screen 933 is configured to collect a touch parameter set when the user performs a sliding operation on the touch display screen 933, and notify the fingerprint identification device 931 to perform fingerprint collection, and The touch parameter set is sent to the AP 980; the fingerprint identification device 931 is configured to collect a fingerprint image, and send the fingerprint image to the AP 980; the AP 980 is configured to respectively perform the touch parameter The set and the fingerprint image are verified.
  • the AP 980 is the control center of the handset, which utilizes various interfaces and lines to connect various portions of the entire handset, and executes the handset by running or executing software programs and/or modules stored in the memory 920, as well as invoking data stored in the memory 920. A variety of functions and processing data to monitor the phone as a whole.
  • the AP 980 may include one or more processing units; optionally, the AP 980 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like, and the modulation solution The processor mainly handles wireless communication. It can be understood that the above modem processor may not be integrated into the AP 980.
  • memory 920 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the RF circuit 910 can be used for receiving and transmitting information.
  • RF circuit 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 910 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 960, a speaker 961, and a microphone 962 can provide an audio interface between the user and the handset.
  • the audio circuit 960 can transmit the converted electrical data of the received audio data to the speaker 961 for conversion to the sound signal by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal by the audio circuit 960. After receiving, it is converted into audio data, and then the audio data is played by the AP 980, sent to the other mobile phone via the RF circuit 910, or the audio data is played to the memory 920 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 970, which provides users with wireless broadband Internet access.
  • FIG. 6 shows the WiFi module 970, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the mobile phone also includes a power supply 990 (such as a battery) that supplies power to various components.
  • a power supply 990 (such as a battery) that supplies power to various components.
  • the power supply can be logically connected to the AP980 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, a fill light device, a light sensor, etc., and details are not described herein.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium is stored
  • a computer program for electronic data exchange the computer program causing a computer to perform some or all of the steps of any one of the user equipment authentication detection methods described in the above method embodiments.
  • Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the operations as recited in the above method embodiments Any or all of the steps of any user equipment authentication detection method.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software program module.
  • the integrated unit if implemented in the form of a software program module and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.

Abstract

La présente invention concerne un procédé de détection d'authentification d'équipement utilisateur et un produit associé. Le procédé comprend les opérations suivantes : un préambule d'accès aléatoire transmis par un équipement utilisateur (UE) est reçu et une réponse d'accès aléatoire est transmise à l'UE; un émulateur reçoit une première requête RRC transmise par l'UE et transmet une première requête d'authentification à l'UE, la première requête d'authentification comprenant : des informations d'authentification erronées; l'émulateur reçoit une seconde requête RRC transmise par l'UE et transmet une seconde requête d'authentification à l'UE, la seconde requête d'authentification comprenant : des informations d'authentification erronées; une détection est effectuée sur le point de savoir si une N-ième requête RRC est ou non reçue, la N-ième requête RRC comprenant : un N-ième identificateur de cellule; si l'émulateur ne reçoit pas la N-ième requête RRC, celui-ci détermine que la détection d'UE a échoué, et transmet un message d'échec de détection à l'UE, le message d'échec de détection comprenant : le N-ième identificateur de cellule. La présente invention offre l'avantage d'une expérience d'utilisateur améliorée.
PCT/CN2017/107877 2017-10-26 2017-10-26 Procédé de détection d'authentification d'équipement utilisateur et produit associé WO2019080062A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/107877 WO2019080062A1 (fr) 2017-10-26 2017-10-26 Procédé de détection d'authentification d'équipement utilisateur et produit associé
CN201780091777.5A CN110731094B (zh) 2017-10-26 2017-10-26 一种用户设备鉴权检测方法及相关产品

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/107877 WO2019080062A1 (fr) 2017-10-26 2017-10-26 Procédé de détection d'authentification d'équipement utilisateur et produit associé

Publications (1)

Publication Number Publication Date
WO2019080062A1 true WO2019080062A1 (fr) 2019-05-02

Family

ID=66247687

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/107877 WO2019080062A1 (fr) 2017-10-26 2017-10-26 Procédé de détection d'authentification d'équipement utilisateur et produit associé

Country Status (2)

Country Link
CN (1) CN110731094B (fr)
WO (1) WO2019080062A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459927A (zh) * 2008-12-19 2009-06-17 中国移动通信集团浙江有限公司 一种用模拟手机终端进行业务测试的方法
CN102421127A (zh) * 2010-09-28 2012-04-18 飞思达技术(北京)有限公司 一种通过信令仿真对核心网数据业务性能进行测试的方法
CN102468985A (zh) * 2010-11-01 2012-05-23 北京神州绿盟信息安全科技股份有限公司 针对网络安全设备进行渗透测试的方法和系统
CN103078740A (zh) * 2012-12-28 2013-05-01 广州中大微电子有限公司 Rfid智能卡数字基带验证系统
US20170064406A1 (en) * 2009-12-11 2017-03-02 At&T Intellectual Property I, L.P. Remote control via local area network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105813072B (zh) * 2014-12-29 2019-10-18 中国移动通信集团公司 一种终端鉴权方法、系统及云端服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459927A (zh) * 2008-12-19 2009-06-17 中国移动通信集团浙江有限公司 一种用模拟手机终端进行业务测试的方法
US20170064406A1 (en) * 2009-12-11 2017-03-02 At&T Intellectual Property I, L.P. Remote control via local area network
CN102421127A (zh) * 2010-09-28 2012-04-18 飞思达技术(北京)有限公司 一种通过信令仿真对核心网数据业务性能进行测试的方法
CN102468985A (zh) * 2010-11-01 2012-05-23 北京神州绿盟信息安全科技股份有限公司 针对网络安全设备进行渗透测试的方法和系统
CN103078740A (zh) * 2012-12-28 2013-05-01 广州中大微电子有限公司 Rfid智能卡数字基带验证系统

Also Published As

Publication number Publication date
CN110731094B (zh) 2023-02-24
CN110731094A (zh) 2020-01-24

Similar Documents

Publication Publication Date Title
WO2017140276A1 (fr) Procédé et appareil de connexion de réseau, et support de stockage informatique
CN106912048B (zh) 接入点信息分享方法和装置
CN105100213B (zh) 设备绑定方法及装置
CN104852885B (zh) 一种进行验证码验证的方法、装置和系统
US20190349202A1 (en) Protection method and protection system of system partition key data and terminal
EP3179693B1 (fr) Procédé, dispositif, support de stockage et et produit programme informatique destinés à établir une connexion de données
CN106375478B (zh) 一种移动终端数据的同步方法、装置及系统
CN108572908B (zh) 信息反馈方法及装置
WO2018161540A1 (fr) Procédé d'enregistrement d'empreintes digitales et produit associé
WO2018049970A1 (fr) Procédé de commutation de réseau à point d'accès sans fil et terminal
CN107743108B (zh) 一种介质访问控制地址识别方法及装置
CN112328492A (zh) 一种主播间的互动控制方法、装置和电子设备
CN111475359A (zh) 多消息交互场景下的系统测试方法、装置和存储介质
CN107635289B (zh) 检测终端通话的方法及相关产品
WO2017000495A1 (fr) Procédé et dispositif d'ajout de contacts
WO2018049968A1 (fr) Procédé d'établissement de zone d'accès sans fil et terminaux
WO2015062400A1 (fr) Procédé de gestion d'attribution de canal vidéo, dispositif associé, et système de communication
CN107529171B (zh) 检测终端接入伪基站的方法及相关产品
CN108304369B (zh) 一种文件类型的识别方法和装置
CN107864487B (zh) 检测终端通话的方法及相关产品
WO2019080062A1 (fr) Procédé de détection d'authentification d'équipement utilisateur et produit associé
CN112667868B (zh) 一种数据检测方法以及装置
CN110800334B (zh) 一种用户设备通话检测方法及相关产品
CN112788640A (zh) 通信设备测试方法、装置、存储介质及终端
CN113961380A (zh) 一种跨应用修复的方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17929913

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17929913

Country of ref document: EP

Kind code of ref document: A1