WO2019141135A1 - 支持无线网络切换的可信服务管理方法以及装置 - Google Patents

支持无线网络切换的可信服务管理方法以及装置 Download PDF

Info

Publication number
WO2019141135A1
WO2019141135A1 PCT/CN2019/071359 CN2019071359W WO2019141135A1 WO 2019141135 A1 WO2019141135 A1 WO 2019141135A1 CN 2019071359 W CN2019071359 W CN 2019071359W WO 2019141135 A1 WO2019141135 A1 WO 2019141135A1
Authority
WO
WIPO (PCT)
Prior art keywords
access point
wireless access
switching
terminal device
wireless
Prior art date
Application number
PCT/CN2019/071359
Other languages
English (en)
French (fr)
Inventor
石飞
宋益楠
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2019141135A1 publication Critical patent/WO2019141135A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off

Definitions

  • the present application relates to the field of trusted service management, and in particular, to a trusted service management method for supporting wireless network handover.
  • the present application relates to a trusted service management device supporting wireless network handover, another trusted service management method and device supporting wireless network handover, and two types of electronic devices.
  • TSM Trusted Service Manager
  • TSM Trusted Service Manager
  • TSM is a system platform for space management, application management, and air card issuance for secure carriers with secure storage, computing, and anti-attack capabilities. It is offline for NFC and other technologies. Services such as payment and access control provide the basis for implementation.
  • TSM can realize reliable data transmission and air access of service applications. For example, according to the user's choice, the traffic chip of a certain city is loaded in the air through the security chip set in the mobile phone, and the traffic card is recharged.
  • TSM also acts as an intermediary between publishers and service providers, users, and other participants, making service applications faster and more secure.
  • the TSM server transmits the data message to the security chip in the Internet of Things (IoT) device through the wireless access point, and the terminal device passes the security chip to the data through the wireless access point.
  • the execution result of the packet is transmitted to the TSM server, and the data packet transmission is performed between the TSM server and the security chip in the terminal device repeatedly until all the data packets are completely transmitted, that is, the TSM server is in the terminal device.
  • the operation of the security chip is completed, for example, the TSM server completes the air card issuance in the security chip of the terminal device.
  • the terminal device in the actual application also shifts with the change of the location of the user. If the terminal device shifts during the transmission of multiple data packets, for example, from the wireless network coverage of a wireless access point to Roaming occurs within the wireless network coverage of another wireless access point. During roaming, the terminal device loses the connection of the old wireless access point and attempts to establish a connection with the new wireless access point, which is affected by many factors such as device performance, wireless access point performance, network conditions, etc., and because of authentication reasons. Switching from the old wireless access point to the new wireless access point will not only have a delay of 1 to 5 seconds, but may also cause the connection between the TSM server and the terminal device to be interrupted, or even the loss of data packets. Lead to the failure of card issuance in the air.
  • the present application provides a trusted service management method for supporting wireless network handover to solve the defects of the prior art.
  • the present application relates to a trusted service management device supporting wireless network handover, another trusted service management method and device supporting wireless network handover, and two types of electronic devices.
  • the application provides a trusted service management method for supporting wireless network switching, including:
  • the terminal device is in an overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point.
  • the authentication operation is performed by decomposing into multiple authentication phases, and the switching operation is performed at least once before, during, or after each authentication phase.
  • the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase;
  • the first authentication phase is implemented as follows:
  • the response frame includes identifier information corresponding to the terminal device.
  • the second authentication phase is implemented as follows:
  • the challenge message includes a key for encrypting the password information
  • the third authentication phase is implemented as follows:
  • the authentication pass message is sent by the trusted service management platform to the password information included in the response message, and then sent to the second Wireless access point
  • Determining whether the service request is completed if yes, performing the step of switching the terminal device from the first wireless access point to the second wireless access point; if not, performing the receiving based on the terminal device
  • the data packet step of the first wireless access point buffer if yes, performing the step of switching the terminal device from the first wireless access point to the second wireless access point; if not, performing the receiving based on the terminal device The data packet step of the first wireless access point buffer.
  • the initiating an authentication operation by using the second wireless access point to the trusted service management platform is implemented as follows:
  • the response frame includes identifier information corresponding to the terminal device
  • the challenge message includes a key for encrypting the password information
  • the authentication pass message is sent by the trusted service management platform to the password information included in the response message, and then sent to the second Wireless access point
  • the mode of the first wireless access point for the terminal device includes an operating mode and/or a sleep mode
  • the mode of the second wireless access point for the terminal device includes an operating mode and/or a sleeping mode.
  • the mode of the first wireless access point and/or the second wireless access point for the terminal device is a sleep mode
  • the first wireless access point and/or the second wireless access point The data packet sent by the terminal device is cached.
  • the switching by the terminal, from the second wireless access point to the first wireless access point, by setting the second wireless access point to the terminal device as the sleep mode, And setting the first wireless access point to the terminal device to be implemented in the working mode.
  • the switching the terminal device from the first wireless access point to the second wireless access point by setting the first wireless access point to the terminal device as the sleep mode, And setting the second wireless access point to the terminal device to be implemented in the working mode.
  • the terminal device includes: an Internet of Things device.
  • the service request includes: an air card issuance request.
  • the application also provides a trusted service management device supporting wireless network switching, including:
  • a data message buffering unit configured to notify the first wireless access point to buffer a data message returned by the trusted service management platform for the service request after the terminal device switches from the first wireless access point to the second wireless access point;
  • An authentication operation initiating unit configured to initiate an authentication operation to the trusted service management platform based on the second wireless access point
  • the first switching unit is configured to switch the terminal device from the second wireless access point to the first wireless access point.
  • the data packet receiving unit is configured to receive, according to the terminal device, the data packet buffered by the first wireless access point;
  • the second switching unit is configured to switch the terminal device from the first wireless access point to the second wireless access point.
  • the application further provides a trusted service management method for supporting wireless network switching, including:
  • the data packet is returned by the trusted service management platform for the service request.
  • the trusted service management method for supporting wireless network switching includes:
  • the service request includes: an air card issuance request.
  • the application further provides a trusted service management apparatus supporting wireless network switching, including:
  • a switching notification unit configured to switch from the first wireless access point to the second wireless access point, and send a notification of the buffered data message to the first wireless access point
  • the wireless access point switching unit is configured to switch from the second wireless access point to the first wireless access point
  • the buffered data packet receiving unit is configured to receive the cached data packet sent by the first wireless access point
  • the wireless access point secondary switching unit is configured to switch from the first wireless access point to the second wireless access point;
  • the data packet is returned by the trusted service management platform for the service request.
  • the application also provides an electronic device, including:
  • the memory is for storing computer executable instructions for executing the computer executable instructions:
  • the application further provides an electronic device, including:
  • the memory is for storing computer executable instructions for executing the computer executable instructions:
  • the data packet is returned by the trusted service management platform for the service request.
  • the method for managing a trusted service that supports the wireless network switching includes: after detecting that the terminal device switches from the first wireless access point to the second wireless access point, notifying the first wireless access point to cache the trusted service.
  • the management platform returns a data message for the service request; and initiates an authentication operation to the trusted service management platform based on the second wireless access point; and performs the following switching operation at least once during the execution of the authentication operation: Transmitting, by the terminal device, the first wireless access point from the second wireless access point; receiving, according to the terminal device, the data packet buffered by the first wireless access point; The first wireless access point switches to the second wireless access point.
  • the trusted service management method for supporting wireless network handover based on the second wireless access point, in the process of switching the terminal device from the first wireless access point to the second wireless access point Initiating an authentication operation to the trusted service management platform to establish a connection between the terminal device and the trusted service management platform, and during the execution of the authentication operation, by using the terminal device in the Switching between the two wireless access points and the first wireless access point to prevent data packet loss during the wireless network switching process from causing an error or failure, and also ensuring that the terminal device is switching to the second wireless access point
  • the trusted service management platform can also be accessed normally, which reduces the delay generated by the wireless network switching process.
  • FIG. 1 is a process flow diagram of an embodiment of a trusted service management method for supporting wireless network handover provided by the present application
  • FIG. 2 is a schematic diagram of a wireless network switching scenario provided by the present application.
  • FIG. 3 is a schematic diagram of a trusted service management installation process supporting wireless network handover provided by the present application
  • FIG. 4 is a schematic diagram of an embodiment of a trusted service management apparatus supporting wireless network handover provided by the present application
  • FIG. 5 is a process flowchart of another embodiment of a trusted service management method for supporting wireless network handover provided by the present application.
  • FIG. 6 is a schematic diagram of another embodiment of a trusted service management apparatus supporting wireless network handover provided by the present application.
  • FIG. 7 is a schematic diagram of an embodiment of an electronic device provided by the present application.
  • FIG. 8 is a schematic diagram of another embodiment of an electronic device provided by the present application.
  • the present application provides a trusted service management method for supporting wireless network handover, and further provides a trusted service management device supporting wireless network handover, another trusted service management method and device supporting wireless network handover, and Two electronic devices.
  • a trusted service management method for supporting wireless network handover and further provides a trusted service management device supporting wireless network handover, another trusted service management method and device supporting wireless network handover, and Two electronic devices.
  • the following is a detailed description of the embodiments of the embodiments provided herein, and the various steps of the method are explained.
  • FIG. 1 is a flowchart of a method for supporting a trusted service management method for supporting wireless network handover provided by the present application.
  • FIG. 2 a wireless network handover provided by the present application is shown.
  • a schematic diagram of a scenario, with reference to FIG. 3, is a schematic diagram of a trusted service management installation process supporting wireless network handover provided by the present application.
  • Step S101 After detecting that the terminal device switches from the first wireless access point to the second wireless access point, notify the first wireless access point to buffer the data message returned by the trusted service management platform for the service request.
  • the TSM server ie, the service management platform transmits data packets (APDU packets) through the wireless access point 1 (the first wireless access point, such as a Wi-Fi hotspot) and the terminal device.
  • Data packets often need to be sent to the security chip (SE) of the terminal device one by one or wholesale.
  • SE security chip
  • the terminal device may change the wireless access point of the connection due to the change of location, for example, the terminal device accesses from the wireless device.
  • the wireless network coverage of point 1 roams to the wireless network coverage of wireless access point 2 (second wireless access point).
  • the wireless network switching behavior before roaming occurs that is, the terminal device moves from the wireless access point.
  • 1 Switching to the wireless access point 2 depends on factors such as device performance, wireless access point performance, network conditions, etc. in the actual application scenario, and the wireless network switching behavior takes 1 to 5 seconds.
  • the terminal device loses the connection with the wireless access point 1 and attempts to establish a wireless connection with the wireless access point 2, and switching from the wireless access point 1 to the wireless access point 2 for authentication reasons, there is not only a delay It may also cause the connection between the TSM server and the terminal device to be interrupted, or even the loss of data packets, eventually leading to the failure of the trusted service management process.
  • the trusted service management method for supporting wireless network handover provided by the application provides a terminal device at the wireless access point 1 in order to ensure that data packets are not lost during the wireless network handover process and reduce the delay caused by the wireless network handover process.
  • Switching back and forth between the wireless access point 2 and the wireless access point 2 ensures that the terminal device can communicate with the TSM server through the wireless access point 1 to avoid data packet loss and ensure the normal operation of the trusted service management process.
  • the connection between access points 2 remains normal, reducing the delay caused by the wireless network switching process.
  • the terminal device may be based on A first wireless link established between the wireless access points 1 initiates a service request to the TSM server and receives a data message returned by the TSM server for the service request based on the first wireless link.
  • the service request refers to an air card issuance request
  • the terminal device refers to an Internet of Things device in a scenario of air card issuance.
  • the IoT device communicates with the TSM server through the wireless access point 1, specifically, the IoT device initiates an OTA (Over The Air) request through the TSM SDK, that is, An air card issuance request, such as a request to create a security domain in the SE, install an application in the SE, etc., and the wireless access point 1 forwards the OTA request to the TSM server.
  • the TSM server processes the OTA request to generate a corresponding APDU command script, and sends the generated APDU command script to the wireless access point 1 in the form of APDU packets, or by wireless access point. 1 Forwarded to the TSM SDK on the IoT device side, the final APDU message is written to the SE for execution.
  • the IoT device in the process of switching the Internet of Things device from the wireless access point 1 to the wireless access point 2, the IoT device needs to be in the wireless network coverage range of both the wireless access point 1 and the wireless access point 2 in the process of the present application. Within the overlapping area. Preferably, before the IoT device switches from the wireless access point 1 to the wireless access point 2, it can also determine whether the signal strength of the wireless access point 2 wireless network is greater than the signal strength of the wireless access point 1 wireless network by the following determining operation.
  • the IoT device is switched from the wireless access point 1 to the wireless access point 2; if the signal strength of the wireless access point 2 wireless network is less than or equal to the signal strength of the wireless access point 1 wireless network, the specific time interval may be delayed. Then, the signal strengths of both the wireless access point 1 and the wireless access point 2 are re-detected and compared, and whether or not to perform switching is determined according to the comparison result.
  • This embodiment can utilize the IEEE 802.11 standard to support the characteristics of multi-channel communication to communicate with the wireless access point 1, and perform an authentication process at the wireless access point 2 to establish a connection between the IoT device and the TSM server through the wireless access point 2.
  • the two access modes (operating mode and sleep mode) of the Internet of Things device are used to switch between the wireless access point 1 and the wireless access point 2 by using a wireless access point. First, if the wireless access point 1 or the wireless access point 2 is in the sleep mode for the IoT device, the APDU packet is stopped after the wireless access point 1 or the wireless access point 2 receives the APDU packet sent by the TSM server.
  • the IoT device forwards, but the APDU is cached locally by the wireless access point 1 or the wireless access point 2, which requires the wireless access point 1 and the wireless access point 2 to have the function of buffering APDUs.
  • the wireless access point 1 or the wireless access point 2 receives the APDU message sent by the TSM server, and then sends the APDU message to the object. Networked devices can be forwarded normally.
  • the IoT device when the IoT device switches from the wireless access point 1 to the wireless access point 2, the IoT device authenticates with the wireless access point 2 to establish a connection. At this time, the wireless access point 1 is set to the mode of the Internet of Things device. In the sleep mode, the wireless access point 1 will locally buffer the APDUs after receiving the APDUs sent from the TSM server. When the IoT device is switched from the wireless access point 2 back to the wireless access point 1, the wireless access point 1 is switched from the sleep mode to the working mode for the mode of the Internet of Things device. On this basis, the wireless access point 1 will Forward the previously buffered APDU packets to the IoT device.
  • the wireless access point 1 is notified to buffer the data message returned by the TSM server for the OTA request.
  • the mode of the wireless access point 1 for the IoT device is switched from the working mode to the sleep mode, and the mode of the wireless access point 2 for the IoT device is switched from the sleep mode to the working mode, and after the mode switching, the TSM server is turned to the object.
  • the APDU message sent by the networked device is cached at the wireless access point 1.
  • the wireless access point 1 is sent to the Internet of Things device after the mode is restored to the mode of operation of the IoT device.
  • Step S102 Initiate an authentication operation to the trusted service management platform based on the second wireless access point.
  • the above step S101 switches the mode of the wireless access point 2 to the IoT device to the working mode.
  • the step initiates an authentication operation to the TSM server through the wireless access point 2, so as to establish the Internet of Things through the wireless access point 2.
  • the connection between the device and the TSM server ensures that after the IoT device finally switches to the wireless access point 2, the data message transmission between the device and the TSM server can be maintained through the wireless access point 2.
  • the method can be performed by decomposing the authentication operation into multiple authentication phases, and switching the IoT device from the wireless access point 2 at least once before, during, or after each authentication phase is executed. Switch back to wireless access point 1 switching operation.
  • the authentication phase after the authentication operation is decomposed includes a first authentication phase, a second authentication phase, and a third authentication phase, and in the first authentication phase, the first After the second authentication phase and the third authentication phase are executed, the switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed separately, and the specific execution sequence is as follows: the first authentication phase->the object Switching operation of the networked device switching back from the wireless access point 2 to the wireless access point 1 -> the second authentication phase -> switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 -> the third Authentication Phase -> Switching operation of the IoT device from wireless access point 2 back to wireless access point 1.
  • the first authentication phase is preferably implemented as follows:
  • the response frame includes identifier information corresponding to the Internet of Things device.
  • the wireless access point 1 in the first authentication phase, enters the sleep mode for the IoT device, and therefore, after the wireless access point 1 receives the APDU message sent by the TSM server, the wireless access point 1 is The APDU packet sent by the TSM server is cached locally.
  • the IoT device initiates a connection request to the wireless access point 2, thereby establishing a wireless connection between the IoT device and the wireless access point 2, because the initial state is not The authentication status, so no data packets can be received and sent between the wireless access point 2 and the IoT device except the IEEE 802.1x protocol packet.
  • the IoT device After the wireless connection between the IoT device and the wireless access point 2 is established, the IoT device sends an authentication request (EAPOL-Start) to the wireless access point 2 through the wireless connection to initiate the authentication process.
  • the wireless access point 2 After receiving the authentication request of the IoT device, the wireless access point 2 sends an Identity (Identification) type EAP request (EAP-Request/Identity) to the IoT device, and requests the IoT device to send its identifier to the wireless access point 2 .
  • the IoT device After receiving the EAP request (EAP-Request/Identity) of the wireless access point 2, the IoT device sends the identification information to the wireless access point 2 through the EAP response frame (EAP-Response/Identity) of the Identity type, and responds to the wireless access.
  • the EAP request (EAP-Request/Identity) sent by point 2 after which the EAP response frame (EAP-Response/Identity) is sent by the wireless
  • the second authentication phase is preferably implemented as follows:
  • the challenge message includes a key for encrypting the password information
  • the wireless access point 1 in the second authentication phase, enters the sleep mode for the IoT device, so after the wireless access point 1 receives the APDU message sent by the TSM server, the wireless access point 1 is The APDU packet sent by the TSM server is cached locally. After receiving the request sent by the wireless access point 2 (ie, the EAP response frame (EAP-Response/Identity)), the TSM server extracts the identification information corresponding to the Internet of Things device, and then lists the identification information and the identification information in the database.
  • EAP response frame EAP-Response/Identity
  • the password information corresponding to the identification information is found, and the password is encrypted by using a randomly generated MD5Challenge message, and then the MD5Challenge message is encapsulated in the EAPOR format and sent to the wireless access point 2 by using an Access-Challenge message.
  • the wireless access point 2 After receiving the Access-Challenge message in the EAPOR format from the TSM server, the wireless access point 2 forwards the MD5Challenge message to the Internet of Things device through decapsulation.
  • the IoT device After receiving the MD5Challenge message (ie, the challenge message) forwarded by the wireless access point 2, the IoT device encrypts the password part with the Challenge message, and then generates an EAP-Response/MD5Challenge message, and generates the generated EAP-Response
  • the /MD5Challenge message (ie, the reply message) is sent to the wireless access point 2.
  • the wireless access point 2 encapsulates the EAP-Response/MD5Challenge message in an EAPOR format in an Access-Request and sends it to the TSM server.
  • the third authentication phase is preferably implemented as follows:
  • the authentication pass message is sent by the TSM server to the wireless access point 2 after verifying the password information contained in the response message;
  • the wireless access point 1 in the third authentication phase, enters a sleep mode for the IoT device, so after the wireless access point 1 receives the APDU message sent by the TSM server, the wireless access point 1 is The APDU packet sent by the TSM server is cached locally. After receiving the Access-Request packet containing the encrypted password information sent by the wireless access point 2, the TSM server compares with the password information that has been encrypted locally, and if it is the same, it is considered to be legal and accesses the wireless device. Point 2 sends the authentication pass message (Access-Accept). After receiving the Access-Accept message, the wireless access point 2 sends the EAP-Success message to the IoT device after EAPOR decapsulation, and changes the port to the authorization state, allowing the IoT device to access through the port.
  • Access-Accept authentication pass message
  • the wireless access point 2 monitors the online status of the IoT device by periodically sending a Handshake Request to the IoT device. After receiving the Handshake Request, the IoT device sends a Handshake Response to the wireless access point 2, indicating that the connection between the IoT device and the wireless access point 2 is still online.
  • the authentication operation may be decomposed into one, two, four or more authentication stages. Execution, the specific implementation is similar to the manner provided above for decomposing the authentication operation into three authentication phases.
  • the decomposing the authentication operation into an authentication phase specifically includes: establishing a second wireless link between the IoT device and the wireless access point 2, and sending an authentication request to the wireless access point 2 based on the second wireless link.
  • Step S103 Switch the terminal device from the second wireless access point back to the first wireless access point.
  • this step and the following step S104 and the following step S105 together constitute a switching operation for switching the IoT device from the wireless access point 2 back to the wireless access point 1.
  • the Internet of Things device is The execution of the handover operation of switching back from the wireless access point 2 to the wireless access point 1 is performed after the execution of the first authentication phase, the second authentication phase, and the third authentication phase, respectively.
  • the switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed for the first time, after the execution of the first authentication phase, and the The second certification phase is performed before execution.
  • the switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed a second time, after the execution of the second authentication phase and before the execution of the third authentication phase.
  • the switching operation of switching the IoT device from the wireless access point 2 back to the wireless access point 1 is performed a third time, after the third authentication phase is executed.
  • the wireless access point 1 is provided with two modes of a sleep mode and an operation mode for the Internet of Things device and the wireless access point 2. Based on this, this step switches the IoT device from the wireless access point 2 back to the wireless access point 1, preferably. It is realized that the mode of the Internet of Things device is set to the sleep mode by the wireless access point 2, and the mode of the wireless access point 1 for the IoT device is set to the work mode.
  • Step S104 Receive, according to the terminal device, the data packet buffered by the first wireless access point.
  • the step is based on the IoT device receiving the data message buffered by the wireless access point 1 and transmitting the received data message to the data message.
  • the security chip set by the Internet of Things device performs execution, and returns the execution result of the security chip to the TSM server through the wireless access point 1 for the execution result of the data packet.
  • Step S105 Switch the terminal device from the first wireless access point to the second wireless access point.
  • the wireless access point 1 is provided with two modes of a sleep mode and an operation mode for the Internet of Things device and the wireless access point 2, and based on this, this step switches the Internet of Things device from the wireless access point 1 to the wireless access point 2, preferably. It is achieved by setting the mode of the wireless access point 1 to the IoT device to the sleep mode, and setting the wireless access point 2 to the mode of the IoT device to the working mode.
  • the following determining operation may also be performed. Determining whether the air card issuance request is completed, if the execution is completed, performing this step, switching the IoT device from the wireless access point 1 to the wireless access point 2, and the IoT device performs data packet with the TSM server through the wireless access point 2 If the air card issuance request has not been executed, the process returns to the above step S104, and the data packet sent by the TSM server buffered by the IoT device is received by the IoT device, and the security chip is set by the Internet of Things device. Data message.
  • the IoT device is completed.
  • the wireless access point 1 switches to the switching operation of the wireless access point 2, after which the data message transmission between the Internet of Things device and the TSM server is completed by the wireless access point 2, thereby implementing the wireless access of the Internet of Things device.
  • Point 1 to the "seamless handover" of the wireless access point 2 because during the above-mentioned handover operation, by switching the Internet of Things device back and forth between the wireless access point 1 and the wireless access point 2, on the one hand, the Internet of Things is avoided.
  • the data message transmitted between the device and the TSM server is lost, ensuring the normal operation of the air card issuance operation; on the other hand, the authentication operation of the IoT device is completed on the TSM server through the wireless access point 2, thereby finally switching the IoT device to the wireless device.
  • the IoT device can achieve normal access to the TSM server through the wireless access point 2, during this switching process, Both households imperceptible connection is interrupted, even imperceptible due to a delay certification produced, thus "seamless handover.”
  • the trusted service management method for supporting wireless network handover initiates authentication to the TSM server based on the wireless access point 2 in the process of switching the Internet of Things device from the wireless access point 1 to the wireless access point 2. Operation to establish a connection between the IoT device and the TSM server, while avoiding the wireless network switching process by switching the IoT device between the wireless access point 2 and the wireless access point 1 during the execution of the authentication operation.
  • the loss of the data packet causes the card to fail in the air, and also ensures that the IoT device can access the TSM server after switching to the wireless access point 2, which reduces the delay caused by the wireless network switching process.
  • a trusted service management device implementation supporting wireless network switching is as follows:
  • a trusted service management method for supporting wireless network handover is provided.
  • the present application further provides a trusted service management apparatus for supporting wireless network handover, which is described below with reference to the accompanying drawings. Be explained.
  • FIG. 4 a schematic diagram of an embodiment of a trusted service management apparatus supporting wireless network handover provided by the present application is shown.
  • the application provides a trusted service management device supporting wireless network switching, including:
  • the data message buffering unit 401 is configured to notify the first wireless access point to buffer the data message returned by the trusted service management platform for the service request after the terminal device switches from the first wireless access point to the second wireless access point. ;
  • the authentication operation initiating unit 402 is configured to initiate an authentication operation to the trusted service management platform based on the second wireless access point;
  • first switching unit 403, the data message receiving unit 404, and the second switching unit 405 are operated at least once during the operation of the authentication operation initiating unit;
  • the first switching unit 403 is configured to switch the terminal device from the second wireless access point back to the first wireless access point.
  • the data packet receiving unit 404 is configured to receive, according to the terminal device, the data packet buffered by the first wireless access point;
  • the second switching unit 405 is configured to switch the terminal device from the first wireless access point to the second wireless access point.
  • the terminal device is in an overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point.
  • the authentication operation is performed by decomposing into multiple authentication phases, and the switching operation is performed at least once before, during, or after each authentication phase.
  • the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase;
  • the first authentication phase includes:
  • a second radio link establishing subunit configured to establish a second radio link between the terminal device and the second wireless access point
  • An authentication request sending subunit configured to send an authentication request to the second wireless access point based on the second wireless link
  • An identifier information obtaining request receiving subunit configured to receive an identifier information acquiring request returned by the second wireless access point for the authentication request
  • a response frame sending sub-unit configured to send a response frame to the second wireless access point for the identifier information obtaining request; the response frame includes identifier information corresponding to the terminal device.
  • the second authentication phase includes:
  • a challenge message receiving subunit configured to receive a challenge message sent by the second wireless access point; the challenge message includes a key for encrypting the password information;
  • an encryption subunit configured to encrypt the password information corresponding to the identifier information by using the key
  • a response message sending subunit configured to send, according to the second wireless link, a response message including the encrypted password information to the trusted service management platform.
  • the third authentication phase includes:
  • the authentication is received by the message receiving subunit, and is configured to receive the authentication pass message sent by the second wireless access point; the authentication pass message is used by the trusted service management platform to the password included in the response message After the information verification is passed, the information is sent to the second wireless access point;
  • a port authorization notification receiving subunit configured to receive a notification that the port sent by the second wireless access point authorizes access to the terminal device
  • a polling message receiving subunit configured to receive a polling message sent by the second wireless access point
  • the polling response message sending subunit is configured to send a corresponding polling response message to the second wireless access point for the polling message.
  • the authentication operation initiating unit 402 includes:
  • a determining subunit configured to determine whether the service request is completed, and if so, running the second switching unit 405; if not, running the data message receiving unit 404.
  • the authentication operation initiating unit 402 includes:
  • a first subunit configured to establish a second wireless link between the terminal device and the second wireless access point
  • a second subunit configured to send an authentication request to the second wireless access point based on the second wireless link
  • a third subunit configured to receive an identifier information acquisition request that is returned by the second wireless access point for the authentication request
  • a fourth subunit configured to send, to the second wireless access point, a response frame for the identifier information acquisition request; the response frame includes identifier information corresponding to the terminal device;
  • a fifth subunit configured to receive a challenge message sent by the second wireless access point;
  • the challenge message includes a key for encrypting the password information;
  • a sixth subunit configured to encrypt, by using the key, password information corresponding to the identifier information
  • a first subunit configured to send, according to the second wireless link, a response message that includes the encrypted password information to the trusted service management platform;
  • An eighth subunit configured to receive an authentication pass message sent by the second wireless access point, where the authentication pass message is verified by the trusted service management platform for the password information included in the response message And then sent to the second wireless access point;
  • a ninth subunit configured to receive a notification that the port sent by the second wireless access point authorizes access to the terminal device.
  • the mode of the first wireless access point for the terminal device includes an operating mode and/or a sleep mode
  • the mode of the second wireless access point for the terminal device includes an operating mode and/or a sleeping mode.
  • the mode of the first wireless access point and/or the second wireless access point for the terminal device is a sleep mode
  • the first wireless access point and/or the second wireless access point The data packet sent by the terminal device is cached.
  • the first switching unit 403 sets the second wireless access point to the sleep mode by using the second wireless access point, and sets the first wireless access point to the terminal device.
  • the working mode is implemented.
  • the second switching unit 405 sets the first wireless access point to the sleep mode by using the first wireless access point, and sets the second wireless access point to the terminal device.
  • the working mode is implemented.
  • the trusted service management device that supports wireless network switching includes:
  • a service request sending unit configured to initiate the service request to the trusted service management platform based on a first wireless link established between the terminal device and the first wireless access point;
  • a data packet receiving unit configured to receive, according to the first wireless link, the data packet returned by the trusted service management platform for the service request.
  • the trusted service management device that supports wireless network switching includes:
  • a signal strength determining unit configured to determine whether a signal strength of a wireless network of the second wireless access point is greater than a signal strength of the wireless network of the first wireless access point, and if yes, to use the terminal device from the first wireless access point Switching to the second wireless access point.
  • the terminal device includes: an Internet of Things device.
  • the service request includes: an air card issuance request.
  • Another implementation of the trusted service management method for supporting wireless network handover provided by the present application is as follows:
  • a trusted service management method for supporting wireless network handover is provided.
  • the present application further provides another trusted service management method for supporting wireless network handover, which is implemented based on the terminal device. Description will be made below with reference to the drawings.
  • FIG. 5 it is a flowchart of another embodiment of a trusted service management method for supporting wireless network handover provided by the present application.
  • the application provides a trusted service management method for supporting wireless network switching, including:
  • Step S501 switching from the first wireless access point to the second wireless access point, and sending a notification of the buffered data message to the first wireless access point;
  • Step S502 switching from the second wireless access point to the first wireless access point
  • Step S503 receiving the buffered data packet sent by the first wireless access point
  • Step S504 switching from the first wireless access point to the second wireless access point
  • the data packet is returned by the trusted service management platform for the service request.
  • the trusted service management method for supporting wireless network switching includes:
  • step S501 perform the following steps:
  • Step S501 Determining whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if yes, performing the above step S501, switching from the first wireless access point to the second wireless access point, and Sending a notification of the buffered data message to the first wireless access point.
  • the service request includes: an air card issuance request.
  • Another trusted service management device implementation supporting wireless network switching is as follows:
  • FIG. 6 a schematic diagram of another embodiment of a trusted service management apparatus supporting wireless network handover provided by the present application is shown.
  • the present application provides another trusted service management device that supports wireless network switching, including:
  • the switching notification unit 601 is configured to switch from the first wireless access point to the second wireless access point, and send a notification of the buffered data message to the first wireless access point;
  • the wireless access point switching unit 602 After running from the handover notification unit 601, the wireless access point switching unit 602, the buffered data message receiving unit 603, and the wireless access point secondary switching unit 604 are operated at least once;
  • the wireless access point switching unit 602 is configured to switch from the second wireless access point to the first wireless access point
  • the buffered data packet receiving unit 603 is configured to receive the cached data packet sent by the first wireless access point
  • the wireless access point secondary switching unit 604 is configured to switch from the first wireless access point to the second wireless access point;
  • the data packet is returned by the trusted service management platform for the service request.
  • An electronic device implementation provided by the present application is as follows:
  • a trusted service management method for supporting wireless network handover is provided.
  • the present application further provides an electronic device for implementing the trusted service management method for supporting wireless network handover. Description will be made below with reference to the drawings.
  • the embodiment of the electronic device provided by the present application is described in a relatively simple manner.
  • the embodiments described below are merely illustrative.
  • the application provides an electronic device, including:
  • Memory 701 and processor 702 are Memory 701 and processor 702;
  • the memory 701 is configured to store computer executable instructions
  • the processor 702 is configured to execute computer executable instructions as follows:
  • the terminal device is in an overlapping area of the wireless network coverage of the first wireless access point and the second wireless access point.
  • the authentication operation is performed by decomposing into multiple authentication phases, and the switching operation is performed at least once before, during, or after each authentication phase.
  • the authentication phase after the authentication operation is decomposed includes: a first authentication phase, a second authentication phase, and a third authentication phase;
  • the first authentication phase is implemented as follows:
  • the response frame includes identifier information corresponding to the terminal device.
  • the second authentication phase is implemented as follows:
  • the challenge message includes a key for encrypting the password information
  • the third authentication phase is implemented as follows:
  • the authentication pass message is sent by the trusted service management platform to the password information included in the response message, and then sent to the second Wireless access point
  • the processor 702 further uses the performing, after the performing, that, the performing, switching, the terminal device, from the first wireless access point to the second wireless access point, Execute the following computer executable instructions:
  • Determining whether the service request is completed if yes, performing the switching of the terminal device from the first wireless access point to the second wireless access point instruction; if not, performing the receiving based on the terminal device The data message instruction buffered by the first wireless access point.
  • the initiating an authentication operation by using the second wireless access point to the trusted service management platform is implemented as follows:
  • the response frame includes identifier information corresponding to the terminal device
  • the challenge message includes a key for encrypting the password information
  • the authentication pass message is sent by the trusted service management platform to the password information included in the response message, and then sent to the second Wireless access point
  • the mode of the first wireless access point for the terminal device includes an operating mode and/or a sleep mode
  • the mode of the second wireless access point for the terminal device includes an operating mode and/or a sleeping mode.
  • the mode of the first wireless access point and/or the second wireless access point for the terminal device is a sleep mode
  • the first wireless access point and/or the second wireless access point The data packet sent by the terminal device is cached. .
  • the switching by the terminal, from the second wireless access point to the first wireless access point, by setting the second wireless access point to the terminal device as the sleep mode, And setting the first wireless access point to the terminal device to be implemented in the working mode.
  • the switching the terminal device from the first wireless access point to the second wireless access point by setting the first wireless access point to the terminal device as the sleep mode, And setting the second wireless access point to the terminal device to be implemented in the working mode.
  • the processor 702 is further configured to execute the following computer executable instructions:
  • the processor 702 is further configured to execute the following computer executable instructions:
  • the terminal device includes: an Internet of Things device.
  • the service request includes: an air card issuance request.
  • Another electronic device implementation provided by the present application is as follows:
  • FIG. 8 a schematic diagram of another electronic device provided by the embodiment is shown.
  • the embodiment of the electronic device provided by the present application is described in a relatively simple manner.
  • the embodiments described below are merely illustrative.
  • the application provides another electronic device, including:
  • Memory 801 and processor 802 are Memory 801 and processor 802;
  • the memory 801 is configured to store computer executable instructions, and the processor 802 is configured to execute the computer executable instructions:
  • the data packet is returned by the trusted service management platform for the service request.
  • processor 802 is further configured to execute the computer executable instructions:
  • the processor 802 is further configured to execute before the notification instruction that is used to switch from the first wireless access point to the second wireless access point and send the buffered data message to the first wireless access point is executed.
  • the first wireless access point Determining whether the signal strength of the wireless network of the second wireless access point is greater than the signal strength of the wireless network of the first wireless access point, and if so, performing the switching from the first wireless access point to the second wireless access point, and The first wireless access point sends a notification instruction for buffering the data message.
  • the service request includes: an air card issuance request.
  • a computing device includes one or more processors, input/output interfaces, network interfaces, and memory.
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include non-transitory computer readable media, such as modulated data signals and carrier waves.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Hardware Redundancy (AREA)

Abstract

本申请公开了一种支持无线网络切换的可信服务管理方法,包括:检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;基于所述第二无线访问点向所述可信服务管理平台发起认证操作;以及,在所述认证操作执行过程中至少一次执行如下切换操作:将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。所述方法避免了无线网络切换过程中数据报文丢失导致出错或者失败,同时降低了无线网络切换过程产生的延迟。

Description

支持无线网络切换的可信服务管理方法以及装置
本申请要求2018年01月18日递交的申请号为201810048658.8、发明名称为“支持无线网络切换的可信服务管理方法以及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及可信服务管理领域,具体涉及一种支持无线网络切换的可信服务管理方法。本申请同时涉及一种支持无线网络切换的可信服务管理装置,另一种支持无线网络切换的可信服务管理方法以及装置,以及两种电子设备。
背景技术
TSM(Trusted Service Manager,可信服务管理平台)是实现对具备安全存储、运算、防攻击等能力的安全载体进行空间管理、应用管理和空中发卡的系统平台,为线下通过NFC等技术进行移动支付、门禁等服务提供了实施基础。TSM能够实现可靠的数据传输与服务应用的空中接入,比如根据用户的选择,通过手机中设置的安全芯片空中加载某一个城市的交通卡,并进行交通卡的充值等操作。同时,在NFC生态中,TSM还扮演着发行商与服务提供商、用户、其他参与者之间的中间人角色,使得服务应用的开展更加快速和安全。
目前的可信服务管理平台中,由TSM服务器通过无线访问点将数据报文传递给物联网(Internet of Things,IoT)设备中的安全芯片,终端设备再通过无线访问点,将安全芯片对数据报文的执行结果传递给TSM服务器,如此重复多次在TSM服务器与终端设备中的安全芯片之间进行数据报文传输,直到所有的数据报文全部传输完毕,即:TSM服务器对终端设备中安全芯片的操作执行完成,比如,TSM服务器在终端设备的安全芯片中完成空中发卡。
然而,实际应用中的终端设备随用户所处位置的变化同样会发生位移,如果终端设备在多次数据报文的传输过程中发生位移行为,比如从一无线访问点的无线网络覆盖范围移动至另一无线访问点的无线网络覆盖范围内,即发生漫游。在漫游期间,终端设备会失去旧的无线访问点的连接,同时会尝试与新的无线访问点建立连接,受到设备性能、无线访问点性能、网络情况等诸多因素的影响,并且因为认证的原因,从旧的无线访问 点切换到新的无线访问点,不仅会存在1至5秒的延迟,此外还可能导致TSM服务器与终端设备之间的连接处于中断状态,甚至数据报文的丢失,最终导致空中发卡的失败。
发明内容
本申请提供一种支持无线网络切换的可信服务管理方法,以解决现有技术存在的缺陷。本申请同时涉及一种支持无线网络切换的可信服务管理装置,另一种支持无线网络切换的可信服务管理方法以及装置,以及两种电子设备。
本申请提供一种支持无线网络切换的可信服务管理方法,包括:
检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
以及,在所述认证操作执行过程中至少一次执行如下切换操作:
将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
可选的,所述终端设备处于所述第一无线访问点和所述第二无线访问点二者无线网络覆盖范围的重叠区域内。
可选的,所述认证操作通过分解为多个认证阶段的方式进行执行,并在每个认证阶段执行前、执行过程中或者执行后,至少一次执行所述切换操作。
可选的,所述认证操作分解后的认证阶段包括:第一认证阶段、第二认证阶段和第三认证阶段;
以及,在所述第一认证阶段、所述第二认证阶段和/或所述第三认证阶段执行后,分别执行所述切换操作,并按照所述第一认证阶段、所述切换操作、所述第二认证阶段、所述切换操作、所述第三认证阶段至所述切换操作的顺序执行。
可选的,所述第一认证阶段,采用如下方式实现:
建立所述终端设备与所述第二无线访问点之间的第二无线链路;
基于所述第二无线链路向所述第二无线访问点发送认证请求;
接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息。
可选的,所述第二认证阶段,采用如下方式实现:
接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
利用所述密钥对所述标识信息对应的密码信息进行加密;
基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息。
可选的,所述第三认证阶段,采用如下方式实现:
接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知;
接收所述第二无线访问点发送的轮询报文;
针对所述轮询报文向所述第二无线访问点发送相应的轮询应答报文。
可选的,所述第三认证阶段执行后,在执行所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点步骤前,执行如下操作:
判断所述服务请求是否执行完毕,若是,执行所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点步骤;若否,执行所述基于所述终端设备接收所述第一无线访问点缓存的所述数据报文步骤。
可选的,所述基于所述第二无线访问点向所述可信服务管理平台发起认证操作,采用如下方式实现:
建立所述终端设备与所述第二无线访问点之间的第二无线链路;
基于所述第二无线链路向所述第二无线访问点发送认证请求;
接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息;
接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
利用所述密钥对所述标识信息对应的密码信息进行加密;
基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息;
接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知。
可选的,所述第一无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式,且所述第二无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式;
其中,若所述第一无线访问点和/或所述第二无线访问点针对所述终端设备的模式为休眠模式,所述第一无线访问点和/或所述第二无线访问点将向所述终端设备发送的数据报文缓存。
可选的,所述将所述终端设备从所述第二无线访问点切换回所述第一无线访问点,通过将所述第二无线访问点对于所述终端设备设置为所述休眠模式,并将所述第一无线访问点对于所述终端设备设置为所述工作模式实现。
可选的,所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点,通过将所述第一无线访问点对于所述终端设备设置为所述休眠模式,并将所述第二无线访问点对于所述终端设备设置为所述工作模式实现。
可选的,所述检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文步骤执行前,执行如下操作:
基于所述终端设备与所述第一无线访问点之间建立的第一无线链路,向所述可信服务管理平台发起所述服务请求;
基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
可选的,所述检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文步骤执行前,执行如下操作:
判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
可选的,所述终端设备包括:物联网设备。
可选的,所述服务请求包括:空中发卡请求。
本申请还提供一种支持无线网络切换的可信服务管理装置,包括:
数据报文缓存单元,用于检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
认证操作发起单元,用于基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
以及,在所述认证操作发起单元运行过程中至少一次运行第一切换单元、数据报文接收单元和第二切换单元;
其中,所述第一切换单元,用于将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
所述数据报文接收单元,用于基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
所述第二切换单元,用于将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
本申请另外提供一种支持无线网络切换的可信服务管理方法,包括:
从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
以及,在从所述第一无线访问点切换到所述第二无线访问点后,执行如下至少一次切换操作:
从所述第二无线访问点切换到所述第一无线访问点;
接收所述第一无线访问点发送的其缓存的所述数据报文;
从所述第一无线访问点切换到所述第二无线访问点;
其中,所述数据报文由可信服务管理平台针对服务请求返回。
可选的,所述支持无线网络切换的可信服务管理方法,包括:
建立与所述第一无线访问点的第一无线链路;
基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
可选的,所述从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知步骤执行前,执行如下步骤:
判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,执行所述从第一无线访问点切换到第二无线访问点,并向所述第 一无线访问点发送缓存数据报文的通知步骤。
可选的,所述服务请求包括:空中发卡请求。
本申请另外提供一种支持无线网络切换的可信服务管理装置,包括:
切换通知单元,用于从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
以及,在从所述切换通知单元运行后,至少一次运行无线访问点切换单元、缓存数据报文接收单元以及无线访问点二次切换单元;
所述无线访问点切换单元,用于从所述第二无线访问点切换到所述第一无线访问点;
所述缓存数据报文接收单元,用于接收所述第一无线访问点发送的其缓存的所述数据报文;
所述无线访问点二次切换单元,用于从所述第一无线访问点切换到所述第二无线访问点;
其中,所述数据报文由可信服务管理平台针对服务请求返回。
本申请还提供一种电子设备,包括:
存储器和处理器;
所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令:
检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
以及,在所述认证操作执行过程中至少一次执行如下切换操作:
将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
本申请另外提供一种电子设备,包括:
存储器和处理器;
所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令:
从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
以及,在从所述第一无线访问点切换到所述第二无线访问点后,执行如下至少一次切换操作:
从所述第二无线访问点切换到所述第一无线访问点;
接收所述第一无线访问点发送的其缓存的所述数据报文;
从所述第一无线访问点切换到所述第二无线访问点;
其中,所述数据报文由可信服务管理平台针对服务请求返回。
本申请提供的所述支持无线网络切换的可信服务管理方法,包括:检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;基于所述第二无线访问点向所述可信服务管理平台发起认证操作;以及,在所述认证操作执行过程中至少一次执行如下切换操作:将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
所述支持无线网络切换的可信服务管理方法,在将所述终端设备从所述第一无线访问点切换到所述第二无线访问点的过程中,一方面基于所述第二无线访问点向所述可信服务管理平台发起认证操作,以便建立所述终端设备与所述可信服务管理平台的连接,同时在所述认证操作的执行过程中,通过将所述终端设备在所述第二无线访问点和所述第一无线访问点之间进行来回切换,避免无线网络切换过程中数据报文丢失导致出错或者失败,同时也确保所述终端设备在切换到所述第二无线访问点后也能正常访问所述可信服务管理平台,降低了无线网络切换过程产生的延迟。
附图说明
附图1是本申请提供的一种支持无线网络切换的可信服务管理方法实施例的处理流程图;
附图2是本申请提供的一种无线网络切换场景的示意图;
附图3是本申请提供的一种支持无线网络切换的可信服务管理装过程的示意图;
附图4是本申请提供的一种支持无线网络切换的可信服务管理装置实施例的示意图;
附图5是本申请提供的另一种支持无线网络切换的可信服务管理方法实施例的处理流程图;
附图6是本申请提供的另一种支持无线网络切换的可信服务管理装置实施例的示意图;
附图7是本申请提供的一种电子设备实施例的示意图;
附图8是本申请提供的另一种电子设备实施例的示意图。
具体实施方式
在下面的描述中阐述了很多具体细节以便于充分理解本申请。但是本申请能够以很多不同于在此描述的其他方式来实施,本领域技术人员可以在不违背本申请内涵的情况下做类似推广,因此本申请不受下面公开的具体实施的限制。
本申请提供一种支持无线网络切换的可信服务管理方法,本申请还提供一种支持无线网络切换的可信服务管理装置,另一种支持无线网络切换的可信服务管理方法以及装置,以及两种电子设备。以下分别结合本申请提供的实施例的附图逐一进行详细说明,并且对方法的各个步骤进行说明。
本申请提供的一种支持无线网络切换的可信服务管理方法实施例如下:
参照附图1,其示出了本申请提供的一种支持无线网络切换的可信服务管理方法实施例的处理流程图,参照附图2,其示出了本申请提供的一种无线网络切换场景的示意图,参照附图3,其示出了本申请提供的一种支持无线网络切换的可信服务管理装过程的示意图。
步骤S101,检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文。
如图2所示,TSM服务器(即可信服务管理平台)通过无线访问点1(第一无线访问点,比如Wi-Fi热点)与终端设备进行数据报文(APDU报文)传输的过程中,数据报文往往需要逐条或者分批发送给终端设备的安全芯片(SE)进行执行,在执行过程中,终端设备由于位置的变化可能引起连接的无线访问点发生变化,比如终端设备从无线访问点1的无线网络覆盖范围漫游至无线访问点2(第二无线访问点)的无线网络覆盖范围。在这一漫游过程中,当终端设备移动到无线访问点1和无线访问点2二者无线网络覆盖范围的重叠区域内时,会发生漫游前的无线网络切换行为,即终端设备从无线访问点1切换到无线访问点2,取决于实际应用场景中设备性能、无线访问点性能、网络情况等诸多因素,这一无线网络切换行为需要耗时1至5秒。在无线网络切换期间,终端设备会失去与无线访问点1的连接,并尝试与无线访问点2建立无线连接,并且因为认 证的原因,从无线访问点1切换到无线访问点2,不仅存在延迟,还可能导致TSM服务器与终端设备之间的连接处于中断状态,甚至数据报文的丢失,最终导致可信服务管理过程的失败。本申请提供的所述支持无线网络切换的可信服务管理方法,为了确保无线网络切换过程中数据报文不会丢失,同时降低无线网络切换过程产生的延迟,通过将终端设备在无线访问点1和无线访问点2之间进行来回切换,既保证终端设备通过无线访问点1与TSM服务器之间的连接,避免数据报文丢失,保障可信服务管理过程正常进行;同时也确保终端设备与无线访问点2之间的连接保持正常,降低无线网络切换过程产生的延迟。
本申请实施例以可信服务管理过程中的应用空中下载或者在SE中创建安全域(即空中发卡)为例进行说明,如附图3所示,在无线网络切换之前,可基于终端设备与无线访问点1之间建立的第一无线链路,向TSM服务器发起服务请求并基于该第一无线链路接收TSM服务器针对服务请求返回的数据报文。优选的,所述服务请求是指空中发卡请求,所述终端设备是指空中发卡这一场景中的物联网设备。即:物联网设备从无线访问点1切换到无线访问点2之前,物联网设备通过无线访问点1与TSM服务器进行通信,具体是指物联网设备通过TSM SDK发起OTA(Over The Air)请求,即空中发卡请求,比如用于在SE中创建安全域、在SE中空中安装应用等请求,无线访问点1将该OTA请求转发给TSM服务器。TSM服务器收到OTA请求后,对OTA请求进行处理后生成对应的APDU指令脚本,并将生成的APDU指令脚本以APDU报文的形式逐条或者分批发送给无线访问点1,再由无线访问点1转发到物联网设备端的TSM SDK,最终APDU报文被写入SE中进行执行。
需要说明的是,本申请实施例在将物联网设备从无线访问点1切换到无线访问点2的过程中,物联网设备需处于无线访问点1和无线访问点2二者无线网络覆盖范围的重叠区域内。优选的,物联网设备在从无线访问点1切换到无线访问点2之前,还可以通过如下判断操作,来判断无线访问点2无线网络的信号强度是否大于无线访问点1无线网络的信号强度,若大于,则将物联网设备从无线访问点1切换到无线访问点2;若无线访问点2无线网络的信号强度小于或者等于无线访问点1无线网络的信号强度,可在延时特定时间间隔后重新检测、对比无线访问点1与无线访问点2二者的信号强度,并根据比较结果确定是否进行切换。
本实施例可利用IEEE802.11标准支持多频道通信的特性与无线访问点1进行通信,并在无线访问点2执行认证过程,以便通过无线访问点2建立物联网设备与TSM服务器 的连接。本申请实施例提供的一种优选实施方式中,利用无线访问点对于物联网设备的两种模式(工作模式和休眠模式)在无线访问点1和无线访问点2之间进行切换。其一,如果无线访问点1或者无线访问点2对于物联网设备处于休眠模式下,则无线访问点1或者无线访问点2接收到TSM服务器下发的APDU报文后,APDU报文被停止向物联网设备转发,而是由无线访问点1或者无线访问点2在本地缓存APDU报文,这就要求无线访问点1和无线访问点2具备缓存APDU报文的功能。其二,如果无线访问点1或者无线访问点2对于物联网设备处于工作模式下,则无线访问点1或者无线访问点2接收到TSM服务器下发的APDU报文后,将APDU报文向物联网设备正常转发即可。
比如,当物联网设备从无线访问点1切换到无线访问点2的过程中,物联网设备与无线访问点2进行认证以建立连接,此时,将无线访问点1对于物联网设备的模式设置为休眠模式,则无线访问点1收到从TSM服务器下发的APDU报文后会在本地缓存APDU报文。当物联网设备从无线访问点2被切换回无线访问点1的过程中,将无线访问点1对于物联网设备的模式从休眠模式切回到工作模式,在此基础上,无线访问点1会将之前缓存的APDU报文转发给物联网设备。
本步骤中,检测到物联网设备从无线访问点1切换到无线访问点2后,通知无线访问点1缓存TSM服务器针对OTA请求返回的数据报文。比如将无线访问点1对于物联网设备的模式从工作模式切换为休眠模式,并且将无线访问点2对于物联网设备的模式从休眠模式切换为工作模式,在进行模式切换之后,TSM服务器向物联网设备下发的APDU报文被缓存在无线访问点1处,待无线访问点1对于物联网设备的模式恢复工作模式后向物联网设备下发。
步骤S102,基于所述第二无线访问点向所述可信服务管理平台发起认证操作。
如上所述,上述步骤S101将无线访问点2对于物联网设备的模式切换为工作模式,本步骤在此基础上通过无线访问点2向TSM服务器发起认证操作,以便通过无线访问点2建立物联网设备与TSM服务器之间的连接,确保物联网设备最终切换到无线访问点2之后,能够通过无线访问点2保持与TSM服务器之间的数据报文传输。优选的,可通过将所述认证操作分解为多个认证阶段的方式进行执行,并在每个认证阶段执行前、执行过程中或者执行后,至少一次执行将物联网设备从无线访问点2切换回无线访问点1的切换操作。
本申请实施例提供的一种优选实施方式中,所述认证操作分解后的认证阶段包括第一认证阶段、第二认证阶段和第三认证阶段,并且在所述第一认证阶段、所述第二认证 阶段和所述第三认证阶段执行后,分别执行一次将物联网设备从无线访问点2切换回无线访问点1的切换操作,具体执行顺序如下:所述第一认证阶段->将物联网设备从无线访问点2切换回无线访问点1的切换操作->所述第二认证阶段->将物联网设备从无线访问点2切换回无线访问点1的切换操作->所述第三认证阶段->将物联网设备从无线访问点2切换回无线访问点1的切换操作。
(1)所述第一认证阶段,优选采用如下方式实现:
建立物联网设备与无线访问点2之间的第二无线链路;
基于所述第二无线链路向无线访问点2发送认证请求;
接收无线访问点2针对所述认证请求返回的标识信息获取请求;
针对所述标识信息获取请求向无线访问点2发送响应帧;所述响应帧中包含所述物联网设备对应的标识信息。
例如,如附图3所示,在第一认证阶段,无线访问点1对于物联网设备进入睡眠模式,因此无线访问点1在接收到TSM服务器下发的APDU报文后,无线访问点1在本地缓存TSM服务器下发的APDU报文。同时,无线访问点2对于物联网设备进入工作模式,则由物联网设备向无线访问点2发起连接请求,从而建立物联网设备与无线访问点2之间的无线连接,因为最初的状态是未认证状态,所以此时无线访问点2与物联网设备之间除了IEEE 802.1x协议包外不能接收和发送任何数据包。
建立物联网设备与无线访问点2之间的无线连接后,物联网设备通过该无线连接向无线访问点2发出认证请求(EAPOL-Start),启动认证过程。无线访问点2在收到物联网设备的认证请求后,向物联网设备发出一个Identity(标识)类型的EAP请求(EAP-Request/Identity),要求物联网设备将其标识发送给无线访问点2。物联网设备端在收到无线访问点2的EAP请求(EAP-Request/Identity)后,将标识信息通过Identity类型的EAP响应帧(EAP-Response/Identity)发送给无线访问点2,响应无线访问点2发出的EAP请求(EAP-Request/Identity),此后,由无线访问点2将该EAP响应帧(EAP-Response/Identity)发送给TSM服务器进行处理。
如附图3所示,上述第一认证阶段执行完成后,执行一次将物联网设备从无线访问点2切换回无线访问点1的切换操作,具体参见下述步骤S103至S105对所述切换操作的详细说明。
(2)所述第二认证阶段,优选采用如下方式实现:
接收无线访问点2发送的质询消息;所述质询消息中包含对密码信息进行加密的密 钥;
利用所述密钥对所述标识信息对应的密码信息进行加密;
基于所述第二无线链路向TSM服务器发送包含加密后的所述密码信息的应答消息。
例如,如附图3所示,在第二认证阶段,无线访问点1对于物联网设备进入睡眠模式,因此无线访问点1在接收到TSM服务器下发的APDU报文后,无线访问点1在本地缓存TSM服务器下发的APDU报文。TSM服务器收到无线访问点2发来的请求(即EAP响应帧(EAP-Response/Identity))后,从中提取出物联网设备对应的标识信息后,将该标识信息与数据库中的标识信息列表中对比,找到该标识信息对应的密码信息,并用随机生成的一个MD5Challenge消息对密码进行加密处理,然后将此MD5Challenge消息通过EAPOR格式封装以Access-Challenge报文发送给无线访问点2。无线访问点2在收到来自TSM服务器的EAPOR格式的Access-Challenge报文后,通过解封装,将其中的MD5Challenge消息转发给物联网设备。物联网设备在收到由无线访问点2转发的MD5Challenge消息(即质询消息)后,用该Challenge消息对密码部分进行加密处理,然后生成EAP-Response/MD5Challenge报文,并将生成的EAP-Response/MD5Challenge报文(即应答消息)发送给无线访问点2。无线访问点2又将此EAP-Response/MD5Challenge报文以EAPOR格式封装在报文(Access-Request)中发送给TSM服务器。
如附图3所示,上述第二认证阶段执行完成后,执行一次将物联网设备从无线访问点2切换回无线访问点1的切换操作,具体参见下述步骤S103至S105对所述切换操作的详细说明。
(3)所述第三认证阶段,优选采用如下方式实现:
接收无线访问点2发送的认证通过报文;所述认证通过报文由TSM服务器对所述应答消息中包含的所述密码信息验证通过后发送至无线访问点2;
接收无线访问点2发送的其端口针对所述物联网设备授权访问的通知;
接收无线访问点2发送的轮询报文;
针对所述轮询报文向无线访问点2发送相应的轮询应答报文。
例如,如附图3所示,在第三认证阶段,无线访问点1对于物联网设备进入睡眠模式,因此无线访问点1在接收到TSM服务器下发的APDU报文后,无线访问点1在本地缓存TSM服务器下发的APDU报文。TSM服务器收到由无线访问点2传来的包含已加密的密码信息的Access-Request报文后,与在本地经过加密运算后的密码信息进行对比,如果相同则认为为合法,并向无线访问点2发送认证通过报文(Access-Accept)。 无线访问点2收到Access-Accept报文后,经过EAPOR解封装再以EAP-Success报文向物联网设备发送,并将端口改为授权状态,允许物联网设备通过端口进行访问。
此外,物联网设备与无线访问点2的连接处于在线期间,无线访问点2会通过向物联网设备定期发送Handshake Request(轮询报文),对物联网设备的在线情况进行监测。物联网设备收到Handshake Request(轮询报文)后向无线访问点2发送Handshake Response(轮询应答报文),表示物联网设备与无线访问点2的连接仍然在线。
如附图3所示,上述第一认证阶段执行完成后,执行一次将物联网设备从无线访问点2切换回无线访问点1的切换操作,具体参见下述步骤S103至S105对所述切换操作的详细说明。
在具体实施时,除上述提供的将所述认证操作分解为3个认证阶段的方式进行执行,还可以将所述认证操作分解为1个、2个、4个甚至更多认证阶段的方式进行执行,具体实现方式与上述提供的将所述认证操作分解为3个认证阶段的方式类似。比如,将所述认证操作分解为一个认证阶段,具体包括:建立物联网设备与无线访问点2之间的第二无线链路,基于所述第二无线链路向无线访问点2发送认证请求,接收无线访问点2针对所述认证请求返回的标识信息获取请求,针对所述标识信息获取请求向无线访问点2发送响应帧,所述响应帧中包含所述物联网设备对应的标识信息;接收无线访问点2发送的质询消息,所述质询消息中包含对密码信息进行加密的密钥,利用所述密钥对所述标识信息对应的密码信息进行加密,基于所述第二无线链路向TSM服务器发送包含加密后的所述密码信息的应答消息;接收无线访问点2发送的认证通过报文,所述认证通过报文由TSM服务器对所述应答消息中包含的所述密码信息验证通过后发送至无线访问点2,接收无线访问点2发送的其端口针对所述物联网设备授权访问的通知。
步骤S103,将所述终端设备从所述第二无线访问点切换回所述第一无线访问点。
需要说明的是,本步骤和下述步骤S104以及下述步骤S105共同组成将物联网设备从无线访问点2切换回无线访问点1的切换操作,本申请实施例中,所述将物联网设备从无线访问点2切换回无线访问点1的切换操作的执行前提是分别在上述第一认证阶段、第二认证阶段和第三认证阶段执行之后。具体的,如附图3所示,所述将物联网设备从无线访问点2切换回无线访问点1的切换操作第一次被执行,是在所述第一认证阶段执行后、且所述第二认证阶段执行前进行。所述将物联网设备从无线访问点2切换回无线访问点1的切换操作第二次被执行,是在所述第二认证阶段执行后、且所述第三认证阶段执行前进行。所述将物联网设备从无线访问点2切换回无线访问点1的切换操作第三 次被执行,是在所述第三认证阶段执行后进行。
如上所述,无线访问点1对于物联网设备、无线访问点2设置有休眠模式和工作模式两种模式,基于此,本步骤将物联网设备从无线访问点2切换回无线访问点1,优选是通过无线访问点2对于物联网设备的模式设置为休眠模式,并将无线访问点1对于物联网设备的模式设置为工作模式来实现。
步骤S104,基于所述终端设备接收所述第一无线访问点缓存的所述数据报文。
在上述步骤S103将物联网设备从无线访问点2切换回无线访问点1之后,本步骤基于物联网设备接收无线访问点1缓存的数据报文,并将接收到的所述数据报文传输给物联网设备设置的安全芯片进行执行,并将安全芯片针对所述数据报文的执行结果通过无线访问点1返回给TSM服务器。
步骤S105,将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
如上所述,无线访问点1对于物联网设备、无线访问点2设置有休眠模式和工作模式两种模式,基于此,本步骤将物联网设备从无线访问点1切换到无线访问点2,优选是通过无线访问点1对于物联网设备的模式设置为休眠模式,并将无线访问点2对于物联网设备的模式设置为工作模式来实现。
本申请实施例提供的一种优选实施方式中,在上述第三认证阶段执行后,在执行本步骤将物联网设备从无线访问点1切换到无线访问点2之前,还可以执行如下判断操作,判断所述空中发卡请求是否执行完毕,如果执行完毕,则执行本步骤,将物联网设备从无线访问点1切换到无线访问点2,物联网设备通过无线访问点2与TSM服务器进行数据报文传输;如果所述空中发卡请求尚未执行完毕,则返回执行上述步骤S104,基于物联网设备接收无线访问点1缓存的TSM服务器下发的数据报文,并由物联网设备设置的安全芯片执行所述数据报文。
如附图3所示,在上述认证操作的3个认证阶段全部被执行后,并且由上述步骤S103至步骤S105共同组成的所述切换操作第三次被执行后,则完成将物联网设备从无线访问点1切换到无线访问点2的切换操作,在此切换操作后,物联网设备与TSM服务器之间进行的数据报文传输通过无线访问点2来完成,从而实现物联网设备从无线访问点1到无线访问点2的“无缝切换”,因为在上述切换操作的进行过程中,通过将物联网设备在无线访问点1和无线访问点2之间进行来回切换,一方面避免物联网设备与TSM服务器之间传输的数据报文丢失,确保空中发卡操作的正常进行;另一方面通过无线访问点2在TSM服务器完成物联网设备的认证操作,从而在最终将物联网设备切换到无线访问 点2之后,物联网设备能够通过无线访问点2实现对TSM服务器的正常访问,在这一切换过程中,用户既感知不到连接中断,甚至感知不到由于认证产生的延迟,因此是“无缝切换”。
综上所述,所述支持无线网络切换的可信服务管理方法,在将物联网设备从无线访问点1切换到无线访问点2的过程中,一方面基于无线访问点2向TSM服务器发起认证操作,以便建立物联网设备与TSM服务器的连接,同时在所述认证操作的执行过程中,通过将物联网设备在无线访问点2和无线访问点1之间进行来回切换,避免无线网络切换过程中数据报文丢失导致空中发卡失败,同时也确保物联网设备在切换到无线访问点2后也能正常访问TSM服务器,降低了无线网络切换过程产生的延迟。
本申请提供的一种支持无线网络切换的可信服务管理装置实施例如下:
在上述的实施例中,提供了一种支持无线网络切换的可信服务管理方法,与之相对应的,本申请还提供了一种支持无线网络切换的可信服务管理装置,下面结合附图进行说明。
参照附图4,其示出了本申请提供的一种支持无线网络切换的可信服务管理装置实施例的示意图。
由于装置实施例基本相似于方法实施例,所以描述得比较简单,相关的部分请参见上述提供的方法实施例的对应说明即可。下述描述的装置实施例仅仅是示意性的。
本申请提供一种支持无线网络切换的可信服务管理装置,包括:
数据报文缓存单元401,用于检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
认证操作发起单元402,用于基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
以及,在所述认证操作发起单元运行过程中至少一次运行第一切换单元403、数据报文接收单元404和第二切换单元405;
其中,所述第一切换单元403,用于将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
所述数据报文接收单元404,用于基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
所述第二切换单元405,用于将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
可选的,所述终端设备处于所述第一无线访问点和所述第二无线访问点二者无线网络覆盖范围的重叠区域内。
可选的,所述认证操作通过分解为多个认证阶段的方式进行执行,并在每个认证阶段执行前、执行过程中或者执行后,至少一次执行所述切换操作。
可选的,所述认证操作分解后的认证阶段包括:第一认证阶段、第二认证阶段和第三认证阶段;
以及,在所述第一认证阶段、所述第二认证阶段和/或所述第三认证阶段执行后,分别执行所述切换操作,并按照所述第一认证阶段、所述切换操作、所述第二认证阶段、所述切换操作、所述第三认证阶段至所述切换操作的顺序执行。
可选的,所述第一认证阶段,包括:
第二无线链路建立子单元,用于建立所述终端设备与所述第二无线访问点之间的第二无线链路;
认证请求发送子单元,用于基于所述第二无线链路向所述第二无线访问点发送认证请求;
标识信息获取请求接收子单元,用于接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
响应帧发送子单元,用于针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息。
可选的,所述第二认证阶段,包括:
质询消息接收子单元,用于接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
加密子单元,用于利用所述密钥对所述标识信息对应的密码信息进行加密;
应答消息发送子单元,用于基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息。
可选的,所述第三认证阶段,包括:
认证通过报文接收子单元,用于接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
端口授权通知接收子单元,用于接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知;
轮询报文接收子单元,用于接收所述第二无线访问点发送的轮询报文;
轮询应答报文发送子单元,用于针对所述轮询报文向所述第二无线访问点发送相应的轮询应答报文。
可选的,所述认证操作发起单元402,包括:
判断子单元,用于判断所述服务请求是否执行完毕,若是,运行所述第二切换单元405;若否,运行所述数据报文接收单元404。
可选的,所述认证操作发起单元402,包括:
第一子单元,用于建立所述终端设备与所述第二无线访问点之间的第二无线链路;
第二子单元,用于基于所述第二无线链路向所述第二无线访问点发送认证请求;
第三子单元,用于接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
第四子单元,用于针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息;
第五子单元,用于接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
第六子单元,用于利用所述密钥对所述标识信息对应的密码信息进行加密;
第期子单元,用于基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息;
第八子单元,用于接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
第九子单元,用于接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知。
可选的,所述第一无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式,且所述第二无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式;
其中,若所述第一无线访问点和/或所述第二无线访问点针对所述终端设备的模式为休眠模式,所述第一无线访问点和/或所述第二无线访问点将向所述终端设备发送的数据报文缓存。
可选的,所述第一切换单元403,通过将所述第二无线访问点对于所述终端设备设置为所述休眠模式,并将所述第一无线访问点对于所述终端设备设置为所述工作模式实 现。
可选的,所述第二切换单元405,通过将所述第一无线访问点对于所述终端设备设置为所述休眠模式,并将所述第二无线访问点对于所述终端设备设置为所述工作模式实现。
可选的,所述支持无线网络切换的可信服务管理装置,包括:
服务请求发送单元,用于基于所述终端设备与所述第一无线访问点之间建立的第一无线链路,向所述可信服务管理平台发起所述服务请求;
数据报文接收单元,用于基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
可选的,所述支持无线网络切换的可信服务管理装置,包括:
信号强度判断单元,用于判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
可选的,所述终端设备包括:物联网设备。
可选的,所述服务请求包括:空中发卡请求。
本申请提供的另一种支持无线网络切换的可信服务管理方法实施例如下:
在上述的实施例中,提供了一种支持无线网络切换的可信服务管理方法,与之配合,本申请还提供了另一种支持无线网络切换的可信服务管理方法,基于终端设备实现,下面结合附图进行说明。
参照附图5,其示出了本申请提供的另一种支持无线网络切换的可信服务管理方法实施例的处理流程图。
由于该方法实施例与上述提供的方法实施例相互对应,所以描述得比较简单,相关的部分请参见上述提供的方法实施例的对应说明即可。下述描述的方法实施例仅仅是示意性的。
本申请提供一种支持无线网络切换的可信服务管理方法,包括:
步骤S501,从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
以及,在从所述第一无线访问点切换到所述第二无线访问点后,执行如下至少一次切换操作:
步骤S502,从所述第二无线访问点切换到所述第一无线访问点;
步骤S503,接收所述第一无线访问点发送的其缓存的所述数据报文;
步骤S504,从所述第一无线访问点切换到所述第二无线访问点;
其中,所述数据报文由可信服务管理平台针对服务请求返回。
可选的,所述支持无线网络切换的可信服务管理方法,包括:
建立与所述第一无线访问点的第一无线链路;
基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
可选的,上述步骤S501执行前,执行如下步骤:
判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,执行上述步骤S501,从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知。
可选的,所述服务请求包括:空中发卡请求。
本申请提供的另一种支持无线网络切换的可信服务管理装置实施例如下:
在上述的实施例中,提供了另一种支持无线网络切换的可信服务管理方法,与之相对应的,本申请还提供了另一种支持无线网络切换的可信服务管理装置,下面结合附图进行说明。
参照附图6,其示出了本申请提供的另一种支持无线网络切换的可信服务管理装置实施例的示意图。
由于装置实施例基本相似于方法实施例,所以描述得比较简单,相关的部分请参见上述提供的方法实施例的对应说明即可。下述描述的装置实施例仅仅是示意性的。
本申请提供另一种支持无线网络切换的可信服务管理装置,包括:
切换通知单元601,用于从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
以及,在从所述切换通知单元601运行后,至少一次运行无线访问点切换单元602、缓存数据报文接收单元603以及无线访问点二次切换单元604;
所述无线访问点切换单元602,用于从所述第二无线访问点切换到所述第一无线访问点;
所述缓存数据报文接收单元603,用于接收所述第一无线访问点发送的其缓存的所述数据报文;
所述无线访问点二次切换单元604,用于从所述第一无线访问点切换到所述第二无 线访问点;
其中,所述数据报文由可信服务管理平台针对服务请求返回。
本申请提供的一种电子设备实施例如下:
在上述的实施例中,提供了一种支持无线网络切换的可信服务管理方法,此外,本申请还提供了一种用于实现所述支持无线网络切换的可信服务管理方法的电子设备,下面结合附图进行说明。
参照附图7,其示出了本实施例提供的一种电子设备的示意图。
本申请提供的所述电子设备实施例描述得比较简单,相关的部分请参见上述提供的所述支持无线网络切换的可信服务管理方法实施例的对应说明即可。下述描述的实施例仅仅是示意性的。
本申请提供一种电子设备,包括:
存储器701和处理器702;
所述存储器701用于存储计算机可执行指令,所述处理器702用于执行如下计算机可执行指令:
检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
以及,在所述认证操作执行过程中至少一次执行如下切换操作:
将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
可选的,所述终端设备处于所述第一无线访问点和所述第二无线访问点二者无线网络覆盖范围的重叠区域内。
可选的,所述认证操作通过分解为多个认证阶段的方式进行执行,并在每个认证阶段执行前、执行过程中或者执行后,至少一次执行所述切换操作。
可选的,所述认证操作分解后的认证阶段包括:第一认证阶段、第二认证阶段和第三认证阶段;
以及,在所述第一认证阶段、所述第二认证阶段和/或所述第三认证阶段执行后,分别执行所述切换操作,并按照所述第一认证阶段、所述切换操作、所述第二认证阶段、所述切换操作、所述第三认证阶段至所述切换操作的顺序执行。
可选的,所述第一认证阶段,采用如下方式实现:
建立所述终端设备与所述第二无线访问点之间的第二无线链路;
基于所述第二无线链路向所述第二无线访问点发送认证请求;
接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息。
可选的,所述第二认证阶段,采用如下方式实现:
接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
利用所述密钥对所述标识信息对应的密码信息进行加密;
基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息。
可选的,所述第三认证阶段,采用如下方式实现:
接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知;
接收所述第二无线访问点发送的轮询报文;
针对所述轮询报文向所述第二无线访问点发送相应的轮询应答报文。
可选的,所述第三认证阶段执行后,在执行所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点指令执行前,所述处理器702还用于执行如下计算机可执行指令:
判断所述服务请求是否执行完毕,若是,执行所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点指令;若否,执行所述基于所述终端设备接收所述第一无线访问点缓存的所述数据报文指令。
可选的,所述基于所述第二无线访问点向所述可信服务管理平台发起认证操作,采用如下方式实现:
建立所述终端设备与所述第二无线访问点之间的第二无线链路;
基于所述第二无线链路向所述第二无线访问点发送认证请求;
接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息;
接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
利用所述密钥对所述标识信息对应的密码信息进行加密;
基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息;
接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知。
可选的,所述第一无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式,且所述第二无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式;
其中,若所述第一无线访问点和/或所述第二无线访问点针对所述终端设备的模式为休眠模式,所述第一无线访问点和/或所述第二无线访问点将向所述终端设备发送的数据报文缓存。。
可选的,所述将所述终端设备从所述第二无线访问点切换回所述第一无线访问点,通过将所述第二无线访问点对于所述终端设备设置为所述休眠模式,并将所述第一无线访问点对于所述终端设备设置为所述工作模式实现。
可选的,所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点,通过将所述第一无线访问点对于所述终端设备设置为所述休眠模式,并将所述第二无线访问点对于所述终端设备设置为所述工作模式实现。
可选的,所述检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文指令执行前,所述处理器702还用于执行如下计算机可执行指令:
基于所述终端设备与所述第一无线访问点之间建立的第一无线链路,向所述可信服务管理平台发起所述服务请求;
基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
可选的,所述检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所 述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文指令执行前,所述处理器702还用于执行如下计算机可执行指令:
判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
可选的,所述终端设备包括:物联网设备。
可选的,所述服务请求包括:空中发卡请求。
本申请提供的另一种电子设备实施例如下:
在上述的实施例中,提供了另一种支持无线网络切换的可信服务管理方法,此外,本申请还提供了一种用于实现该方法的电子设备,下面结合附图进行说明。
参照附图8,其示出了本实施例提供的另一种电子设备的示意图。
本申请提供的所述电子设备实施例描述得比较简单,相关的部分请参见上述提供的另一种支持无线网络切换的可信服务管理方法实施例的对应说明即可。下述描述的实施例仅仅是示意性的。
本申请提供另一种电子设备,包括:
存储器801和处理器802;
所述存储器801用于存储计算机可执行指令,所述处理器802用于执行所述计算机可执行指令:
从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
以及,在从所述第一无线访问点切换到所述第二无线访问点后,执行如下至少一次切换操作:
从所述第二无线访问点切换到所述第一无线访问点;
接收所述第一无线访问点发送的其缓存的所述数据报文;
从所述第一无线访问点切换到所述第二无线访问点;
其中,所述数据报文由可信服务管理平台针对服务请求返回。
可选的,所述处理器802还用于执行所述计算机可执行指令:
建立与所述第一无线访问点的第一无线链路;
基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
可选的,所述从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知指令执行前,所述处理器802还用于执行所述计算机可执行指令:
判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,执行所述从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知指令。
可选的,所述服务请求包括:空中发卡请求。
本申请虽然以较佳实施例公开如上,但其并不是用来限定本申请,任何本领域技术人员在不脱离本申请的精神和范围内,都可以做出可能的变动和修改,因此本申请的保护范围应当以本申请权利要求所界定的范围为准。
在一个典型的配置中,计算设备包括一个或多个处理器、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。

Claims (24)

  1. 一种支持无线网络切换的可信服务管理方法,其特征在于,包括:
    检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
    基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
    以及,在所述认证操作执行过程中至少一次执行如下切换操作:
    将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
    基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
    将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
  2. 根据权利要求1所述的支持无线网络切换的可信服务管理方法,其特征在于,所述终端设备处于所述第一无线访问点和所述第二无线访问点二者无线网络覆盖范围的重叠区域内。
  3. 根据权利要求2所述的支持无线网络切换的可信服务管理方法,其特征在于,所述认证操作通过分解为多个认证阶段的方式进行执行,并在每个认证阶段执行前、执行过程中或者执行后,至少一次执行所述切换操作。
  4. 根据权利要求3所述的支持无线网络切换的可信服务管理方法,其特征在于,所述认证操作分解后的认证阶段包括:第一认证阶段、第二认证阶段和第三认证阶段;
    以及,在所述第一认证阶段、所述第二认证阶段和/或所述第三认证阶段执行后,分别执行所述切换操作,并按照所述第一认证阶段、所述切换操作、所述第二认证阶段、所述切换操作、所述第三认证阶段至所述切换操作的顺序执行。
  5. 根据权利要求4所述的支持无线网络切换的可信服务管理方法,其特征在于,所述第一认证阶段,采用如下方式实现:
    建立所述终端设备与所述第二无线访问点之间的第二无线链路;
    基于所述第二无线链路向所述第二无线访问点发送认证请求;
    接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
    针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息。
  6. 根据权利要求5所述的支持无线网络切换的可信服务管理方法,其特征在于,所述第二认证阶段,采用如下方式实现:
    接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加 密的密钥;
    利用所述密钥对所述标识信息对应的密码信息进行加密;
    基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息的应答消息。
  7. 根据权利要求6所述的支持无线网络切换的可信服务管理方法,其特征在于,所述第三认证阶段,采用如下方式实现:
    接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
    接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知;
    接收所述第二无线访问点发送的轮询报文;
    针对所述轮询报文向所述第二无线访问点发送相应的轮询应答报文。
  8. 根据权利要求7所述的支持无线网络切换的可信服务管理方法,其特征在于,所述第三认证阶段执行后,在执行所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点步骤前,执行如下操作:
    判断所述服务请求是否执行完毕,若是,执行所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点步骤;若否,执行所述基于所述终端设备接收所述第一无线访问点缓存的所述数据报文步骤。
  9. 根据权利要求3所述的支持无线网络切换的可信服务管理方法,其特征在于,所述基于所述第二无线访问点向所述可信服务管理平台发起认证操作,采用如下方式实现:
    建立所述终端设备与所述第二无线访问点之间的第二无线链路;
    基于所述第二无线链路向所述第二无线访问点发送认证请求;
    接收所述第二无线访问点针对所述认证请求返回的标识信息获取请求;
    针对所述标识信息获取请求向所述第二无线访问点发送响应帧;所述响应帧中包含所述终端设备对应的标识信息;
    接收所述第二无线访问点发送的质询消息;所述质询消息中包含对密码信息进行加密的密钥;
    利用所述密钥对所述标识信息对应的密码信息进行加密;
    基于所述第二无线链路向所述可信服务管理平台发送包含加密后的所述密码信息 的应答消息;
    接收所述第二无线访问点发送的认证通过报文;所述认证通过报文由所述可信服务管理平台对所述应答消息中包含的所述密码信息验证通过后发送至所述第二无线访问点;
    接收所述第二无线访问点发送的其端口针对所述终端设备授权访问的通知。
  10. 根据权利要求1至9任意一项所述的支持无线网络切换的可信服务管理方法,其特征在于,所述第一无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式,且所述第二无线访问点针对所述终端设备的模式包括工作模式和/或休眠模式;
    其中,若所述第一无线访问点和/或所述第二无线访问点针对所述终端设备的模式为休眠模式,所述第一无线访问点和/或所述第二无线访问点将向所述终端设备发送的数据报文缓存。
  11. 根据权利要求10所述的支持无线网络切换的可信服务管理方法,其特征在于,所述将所述终端设备从所述第二无线访问点切换回所述第一无线访问点,通过将所述第二无线访问点对于所述终端设备设置为所述休眠模式,并将所述第一无线访问点对于所述终端设备设置为所述工作模式实现。
  12. 根据权利要求10所述的支持无线网络切换的可信服务管理方法,其特征在于,所述将所述终端设备从所述第一无线访问点切换到所述第二无线访问点,通过将所述第一无线访问点对于所述终端设备设置为所述休眠模式,并将所述第二无线访问点对于所述终端设备设置为所述工作模式实现。
  13. 根据权利要求2至9任意一项所述的支持无线网络切换的可信服务管理方法,其特征在于,所述检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文步骤执行前,执行如下操作:
    基于所述终端设备与所述第一无线访问点之间建立的第一无线链路,向所述可信服务管理平台发起所述服务请求;
    基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
  14. 根据权利要求13所述的支持无线网络切换的可信服务管理方法,其特征在于,所述检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文步骤执行前,执行如下操作:
    判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
  15. 根据权利要求1至9任意一项所述的支持无线网络切换的可信服务管理方法,其特征在于,所述终端设备包括:物联网设备。
  16. 根据权利要求1至9任意一项所述的支持无线网络切换的可信服务管理方法,其特征在于,所述服务请求包括:空中发卡请求。
  17. 一种支持无线网络切换的可信服务管理装置,其特征在于,包括:
    数据报文缓存单元,用于检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
    认证操作发起单元,用于基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
    以及,在所述认证操作发起单元运行过程中至少一次运行第一切换单元、数据报文接收单元和第二切换单元;
    其中,所述第一切换单元,用于将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
    所述数据报文接收单元,用于基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
    所述第二切换单元,用于将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
  18. 一种支持无线网络切换的可信服务管理方法,其特征在于,包括:
    从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
    以及,在从所述第一无线访问点切换到所述第二无线访问点后,执行如下至少一次切换操作:
    从所述第二无线访问点切换到所述第一无线访问点;
    接收所述第一无线访问点发送的其缓存的所述数据报文;
    从所述第一无线访问点切换到所述第二无线访问点;
    其中,所述数据报文由可信服务管理平台针对服务请求返回。
  19. 根据权利要求18所述的支持无线网络切换的可信服务管理方法,其特征在于, 包括:
    建立与所述第一无线访问点的第一无线链路;
    基于所述第一无线链路接收所述可信服务管理平台针对所述服务请求返回的所述数据报文。
  20. 根据权利要求19所述的支持无线网络切换的可信服务管理方法,其特征在于,所述从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知步骤执行前,执行如下步骤:
    判断第二无线访问点的无线网络的信号强度是否大于所述第一无线访问点的无线网络的信号强度,若是,执行所述从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知步骤。
  21. 根据权利要求18至20任意一项所述的支持无线网络切换的可信服务管理方法,其特征在于,所述服务请求包括:空中发卡请求。
  22. 一种支持无线网络切换的可信服务管理装置,其特征在于,包括:
    切换通知单元,用于从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
    以及,在从所述切换通知单元运行后,至少一次运行无线访问点切换单元、缓存数据报文接收单元以及无线访问点二次切换单元;
    所述无线访问点切换单元,用于从所述第二无线访问点切换到所述第一无线访问点;
    所述缓存数据报文接收单元,用于接收所述第一无线访问点发送的其缓存的所述数据报文;
    所述无线访问点二次切换单元,用于从所述第一无线访问点切换到所述第二无线访问点;
    其中,所述数据报文由可信服务管理平台针对服务请求返回。
  23. 一种电子设备,其特征在于,包括:
    存储器和处理器;
    所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令:
    检测到终端设备从第一无线访问点切换到第二无线访问点后,通知所述第一无线访问点缓存可信服务管理平台针对服务请求返回的数据报文;
    基于所述第二无线访问点向所述可信服务管理平台发起认证操作;
    以及,在所述认证操作执行过程中至少一次执行如下切换操作:
    将所述终端设备从所述第二无线访问点切换回所述第一无线访问点;
    基于所述终端设备接收所述第一无线访问点缓存的所述数据报文;
    将所述终端设备从所述第一无线访问点切换到所述第二无线访问点。
  24. 一种电子设备,其特征在于,包括:
    存储器和处理器;
    所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令:
    从第一无线访问点切换到第二无线访问点,并向所述第一无线访问点发送缓存数据报文的通知;
    以及,在从所述第一无线访问点切换到所述第二无线访问点后,执行如下至少一次切换操作:
    从所述第二无线访问点切换到所述第一无线访问点;
    接收所述第一无线访问点发送的其缓存的所述数据报文;
    从所述第一无线访问点切换到所述第二无线访问点;
    其中,所述数据报文由可信服务管理平台针对服务请求返回。
PCT/CN2019/071359 2018-01-18 2019-01-11 支持无线网络切换的可信服务管理方法以及装置 WO2019141135A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810048658.8 2018-01-18
CN201810048658.8A CN110062427B (zh) 2018-01-18 2018-01-18 支持无线网络切换的可信服务管理方法、装置及电子设备

Publications (1)

Publication Number Publication Date
WO2019141135A1 true WO2019141135A1 (zh) 2019-07-25

Family

ID=67301955

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/071359 WO2019141135A1 (zh) 2018-01-18 2019-01-11 支持无线网络切换的可信服务管理方法以及装置

Country Status (3)

Country Link
CN (1) CN110062427B (zh)
TW (1) TWI776982B (zh)
WO (1) WO2019141135A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741439A (zh) * 2020-06-22 2020-10-02 河北远东通信系统工程有限公司 一种B-Trunc系统的集群组播切换方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631371A (zh) * 2009-08-27 2010-01-20 上海交通大学 无线访问接入点零延时切换方法
CN101848514A (zh) * 2009-03-23 2010-09-29 华为技术有限公司 WiMAX接入网切换到WiFi接入网的方法及相关设备
CN102006646A (zh) * 2009-08-28 2011-04-06 华为终端有限公司 一种切换方法和切换设备
US20140317721A1 (en) * 2013-04-17 2014-10-23 Oberthur Technologies Secure element for a telecommunications terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7792527B2 (en) * 2002-11-08 2010-09-07 Ntt Docomo, Inc. Wireless network handoff key
US9516553B2 (en) * 2008-12-23 2016-12-06 Qualcomm Incorporated Handover control based on closed subscriber group subscription information
US9723481B2 (en) * 2010-10-29 2017-08-01 Apple Inc. Access data provisioning apparatus and methods
US20140031772A1 (en) * 2012-07-30 2014-01-30 Next Healthcare, Inc. System and method for collecting stem cells
US11748746B2 (en) * 2013-09-30 2023-09-05 Apple Inc. Multi-path communication of electronic device secure element data for online payments

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848514A (zh) * 2009-03-23 2010-09-29 华为技术有限公司 WiMAX接入网切换到WiFi接入网的方法及相关设备
CN101631371A (zh) * 2009-08-27 2010-01-20 上海交通大学 无线访问接入点零延时切换方法
CN102006646A (zh) * 2009-08-28 2011-04-06 华为终端有限公司 一种切换方法和切换设备
US20140317721A1 (en) * 2013-04-17 2014-10-23 Oberthur Technologies Secure element for a telecommunications terminal

Also Published As

Publication number Publication date
TW201933904A (zh) 2019-08-16
CN110062427A (zh) 2019-07-26
CN110062427B (zh) 2020-10-20
TWI776982B (zh) 2022-09-11

Similar Documents

Publication Publication Date Title
US20240064144A1 (en) Security lifecycle management of devices in a communications network
US11463874B2 (en) User profile, policy, and PMIP key distribution in a wireless communication network
JP5199405B2 (ja) 通信システムにおける認証
US7631186B2 (en) Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofing
US8385549B2 (en) Fast authentication between heterogeneous wireless networks
JP5237440B2 (ja) 移動先ネットワークにおいて無線デバイスを認証すること
US9918353B2 (en) 802.1X access session keepalive method, device, and system
US10764066B2 (en) EUICC secure timing and certificate revocation
CN109922474B (zh) 触发网络鉴权的方法及相关设备
CN104982053B (zh) 用于获得认证无线设备的永久身份的方法和网络节点
EP2229018B1 (en) Method and system for authenticating in a communication system
CN109891921B (zh) 下一代系统的认证的方法、装置和计算机可读存储介质
KR100863135B1 (ko) 이동환경에서의 듀얼 인증 방법
WO2019196766A1 (zh) 通信方法和装置
US20230035970A1 (en) Method for Protecting Terminal Parameter Update and Communication Apparatus
CN113543121A (zh) 一种终端参数更新的保护方法和通信装置
US9532218B2 (en) Implementing a security association during the attachment of a terminal to an access network
WO2019141135A1 (zh) 支持无线网络切换的可信服务管理方法以及装置
US10834063B2 (en) Facilitating provisioning of an out-of-band pseudonym over a secure communication channel
JP2020505845A (ja) 緊急アクセス中のパラメータ交換のための方法およびデバイス
WO2023142102A1 (en) Security configuration update in communication networks
JP4371249B1 (ja) 通信システム、サーバ装置、情報通知方法、プログラム
CN116530119A (zh) 保护无线网络中序列号的方法、设备和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19741398

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19741398

Country of ref document: EP

Kind code of ref document: A1