WO2020078425A1 - Network access method, terminal, and computer storage medium - Google Patents

Network access method, terminal, and computer storage medium Download PDF

Info

Publication number
WO2020078425A1
WO2020078425A1 PCT/CN2019/111684 CN2019111684W WO2020078425A1 WO 2020078425 A1 WO2020078425 A1 WO 2020078425A1 CN 2019111684 W CN2019111684 W CN 2019111684W WO 2020078425 A1 WO2020078425 A1 WO 2020078425A1
Authority
WO
WIPO (PCT)
Prior art keywords
target network
network
parameters
terminal
operator
Prior art date
Application number
PCT/CN2019/111684
Other languages
French (fr)
Chinese (zh)
Inventor
杨海城
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020078425A1 publication Critical patent/WO2020078425A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • This application relates to, but is not limited to, the communication field, and in particular, to a network access method, terminal, and computer storage medium.
  • the target network parameters are preset in the terminal device, so that the terminal realizes access to the target network according to the target network parameters.
  • the target network parameters such as Voice over LTE (VoLTE) parameters
  • VoIP Voice over LTE
  • the terminal will not be able to access the operator's network, resulting in network access failure, which will affect the terminal's function.
  • An embodiment of the present application provides a network access method, including: a terminal acquiring a target network parameter from a server through an identification card; and a terminal accessing a target network according to the target network parameter.
  • An embodiment of the present application further provides a terminal, including: an acquisition unit for acquiring a target network parameter from a server through an identification card; and an access unit for accessing a target network according to the target network parameter.
  • a terminal of the present application includes: a memory storing a computer program; and a processor configured to execute the computer program to implement the network access method according to the present application.
  • a computer storage medium of the present application has stored thereon a computer program, and when the computer program is executed by a processor, the processor implements the network access method according to the present application.
  • FIG. 1 is a schematic structural diagram of an application scenario according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of a hardware architecture of a terminal according to an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a network access method according to an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of another network access method according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another network access method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another network access method according to an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another network access method according to an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of another network access method according to an embodiment of the present application.
  • step 301 shown in FIG. 3 is a schematic diagram of an implementation process of step 301 shown in FIG. 3 according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of another implementation process of step 301 shown in FIG. 3 according to an embodiment of the present application;
  • step 301 is a schematic diagram of another implementation process of step 301 shown in FIG. 3 according to an embodiment of the present application;
  • FIG. 12 is a schematic diagram of the composition of a terminal unit according to an embodiment of the present application.
  • FIG. 13 is a schematic diagram of yet another composition of a terminal unit according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of module composition of a terminal according to an embodiment of the present application.
  • 15 is a schematic diagram of an interaction process between a terminal and a server according to an embodiment of the present application.
  • 16 is a schematic diagram of yet another interaction process between a terminal and a server according to an embodiment of the present application.
  • FIG. 17 is a schematic diagram of another interaction process between a terminal and a server according to an embodiment of the present application.
  • FIG. 18 is a schematic diagram of yet another interaction process between a terminal and a server according to an embodiment of the present application.
  • 19 is a schematic diagram of a flow of interaction between a terminal and a network element according to an embodiment of the present application.
  • the terms “include”, “include” or any other variants thereof are intended to cover non-exclusive inclusion, so that a method or device including a series of elements includes not only the explicitly recorded Elements, but also include other elements not explicitly listed, or include elements inherent to the implementation of the method or device.
  • the element defined by the sentence “include a " does not exclude that there are other relevant elements in the method or device including the element (such as the steps in the method or the unit in the device For example, the unit may be part of a circuit, part of a processor, part of a program or software, etc.).
  • the network access method provided by the embodiment of the present application includes a series of steps, but the network access method provided by the embodiment of the present application is not limited to the described steps.
  • the terminal provided by the embodiment of the present application includes A series of units, but the terminal provided in this embodiment of the present application is not limited to the units explicitly described, and may also include units that need to be set when acquiring related information or performing processing based on the information.
  • first ⁇ second involved in the embodiments of the present application is only to distinguish similar objects, and does not represent a specific order for objects. Understandably, “first ⁇ second” is allowed The specific order or sequence can be interchanged below. It should be understood that the objects distinguished by “first ⁇ second” may be interchanged as appropriate, so that the embodiments of the present application described herein can be implemented in an order other than those illustrated or described herein.
  • FIG. 1 is an architectural diagram of an application scenario for network access according to an embodiment of the present application.
  • FIG. 1 shows a terminal 1, a server 2, and a base station 3.
  • the terminal 1 can exchange information with the server 2 through a wired network or a wireless network.
  • the terminal 1 may be a mobile phone terminal or the like.
  • the terminal can store the exclusive network parameters of each operator after leaving the factory, such as telecommunication network parameters, China Unicom network parameters, and mobile network parameters. After inserting a user identification card (for example, a Subscriber Identity Module (SIM) card) in the terminal, it can identify which operator's identification card, so as to call the network parameters of the appropriate operator previously stored in the terminal.
  • SIM Subscriber Identity Module
  • the terminal may obtain the target network parameter of the current operator network from the server through the identification card, and access the target network according to the target network parameter.
  • a virtual identification card or physical identification card may be used to dynamically download the target network parameters from the server, so the target network parameters are always the latest parameters, and access to the target network will not fail due to the network parameters.
  • a large number of network parameters need to be preset in the terminal in advance, which saves the storage space of the terminal.
  • FIG. 2 is a schematic diagram of a hardware entity of a terminal according to an embodiment of the present application.
  • the hardware structure of the mobile terminal of this embodiment will be described in detail with reference to FIG. 2. It can be understood that FIG. 2 only shows the exemplary structure of the mobile terminal according to the embodiment of the present application rather than the entire structure. Part or all of the structure.
  • the terminal 100 includes at least one processor 11 and memory 12, and may further include a user interface 13 and at least one network interface 14 (which may also be understood as a communication interface).
  • the various components in the terminal 100 are coupled together through the bus system 15. It can be understood that the bus system 15 is used to implement connection and communication between these components.
  • the bus system 15 also includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 15 in FIG. 2.
  • the network interface 14 is used to interact with other devices.
  • the user interface 13 may include a display, a keyboard, a mouse, a trackball, a click wheel, buttons, buttons, a touch panel, or a touch screen.
  • the memory 12 stores a computer program that can be run on the processor 11. It can be understood that the memory 12 may be a volatile memory or a non-volatile memory, and may also include both volatile and non-volatile memory.
  • Non-volatile memory can include ROM (Read Only Memory, Read Only Memory), PROM (Programmable Read-Only Memory, Programmable Read Only Memory), EPROM (Erasable Programmable Read-Only Memory, erasable programmable read only memory ), EEPROM (Electrically Erasable Programmable Read-Only Memory), FRAM (ferromagnetic random access memory), flash memory (Flash memory), magnetic surface memory, optical disc , Or CD-ROM (Compact Disc Read-Only Memory, read-only CD); magnetic surface storage can be disk storage or tape storage.
  • Volatile memory can include RAM (Random Access Memory), which is used as an external cache.
  • RAM Random Access Memory
  • SRAM Static Random Access Memory
  • SSRAM Synchronous Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • SDRAM Synchronous Dynamic Random Access, Synchronous Dynamic Random Access Memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory, Double Data Rate Synchronous Dynamic Random Access Memory
  • ESDRAM Enhanced Synchronous Dynamic Random Access Memory, enhanced synchronous dynamic random access memory
  • SLDRAM SynLink Dynamic Random Access Memory, synchronous connection dynamic random access memory
  • DRRAM Direct Rambus Random Access Memory, direct memory bus random access memory ).
  • the memory 12 described in the embodiments of the present application is intended to include but is not limited to these and any other suitable types of memories.
  • the memory 12 in the embodiment of the present application is used to store various types of data to support the operation of the terminal 100. Examples of these data include: any executable instructions for operating on the terminal 100, such as executable instructions 121.
  • the program for implementing network access of the terminal of the embodiment of the present application may be included in the executable instruction 121.
  • the method for the terminal to access the network disclosed in the embodiments of the present application may be applied to the processor 11 or implemented by the processor 11.
  • the processor 11 may be an integrated circuit chip and has signal processing capabilities. In the implementation process, each step of the system adaptation method of the mobile terminal may be completed by instructions in the form of hardware integrated logic circuits or software in the processor 11.
  • the processor 11 may be a general-purpose processor, a DSP (Digital Signal Processor, digital signal processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, and the like.
  • the processor 11 may implement or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or any conventional processor.
  • the steps of the method disclosed in the embodiments of the present application may be directly implemented and completed by a hardware decoding processor, or may be implemented and completed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a storage medium, where the storage medium is located in the memory 12, and the processor 11 reads the information in the memory 12 and completes the steps of the network access method provided in the embodiments of the present application in combination with its hardware.
  • the terminal may be implemented by one or more ASICs (Application Specific Integrated Circuits), DSPs (Digital Signal Processing), PLDs (Programmable Logic Devices), CPLDs (Programmable Logic Devices) Complex Programmable Logic Device, FPGA (Field-Programmable Gate Array) or other electronic components are used to implement the network access method provided by the embodiments of the present application.
  • ASICs Application Specific Integrated Circuits
  • DSPs Digital Signal Processing
  • PLDs Programmable Logic Devices
  • CPLDs Programmable Logic Devices
  • FPGA Field-Programmable Gate Array
  • the network access method according to an embodiment of the present application includes steps 301 and 302.
  • step 301 the terminal acquires the target network parameters from the server through the identification card.
  • step 302 the terminal accesses the target network according to the target network parameters.
  • the identification card may be a virtual identification card or a physical identification card.
  • the virtual identification card includes but is not limited to: VSIM (Virtual Subscriber Identification Module, virtual SIM) card, eSIM (Embedded SIM, embedded SIM) card, SoftSIM (Soft Subscriber Identification, Module), soft customer identification module) At least one of a card and a UICC (Universal Integrated Circuit Card, virtual universal integrated circuit) card.
  • VSIM Virtual Subscriber Identification Module
  • eSIM embedded SIM, embedded SIM
  • SoftSIM Soft Subscriber Identification, Module
  • UICC Universal Integrated Circuit Card, virtual universal integrated circuit
  • the eSIM card is essentially a SIM card, but it is directly embedded in the circuit board of the terminal device, and its size is much smaller than the smallest Nano currently.
  • eSIM can support different operators through remote programming, and can switch between different operator networks.
  • SoftSIM is a pure software solution for traditional physical SIM cards. It has the advantages of no hardware cost and can dynamically update SIM card parameters to support different operators.
  • VSIM is an evolved version of SoftSIM, with higher security. It does not download authentication parameters such as Key (Key, Identifier) to the local, but performs authentication on the server.
  • the operator of the identification card and the operator of the target network may be the same or different.
  • the target network parameter directly downloaded by default through the identification card (virtual identification card or physical identification card)
  • the default direct download is the network parameters of the same operator's network as the operator of the identification card, thereby eliminating the need to store the operator list in the stored operator list according to the identification card's operator attributes in related technologies. The process of finding the appropriate operator.
  • the identification card virtual identification card or physical identification card
  • the target network can be in various forms, such as a VoLTE network, a VoWiFi (Voice over WiFi, WiFi-based voice) network, a 5G network, or an RCS (Rich Communication, Suite, converged communication) network, etc.
  • VoLTE Voice over WiFi
  • WiFi-based voice Voice over WiFi
  • 5G Fifth Generation
  • RCS Radio Service, Suite, converged communication
  • the target network parameters obtained from the server are VoLTE parameters.
  • the target network parameters obtained from the server are WiFi parameters.
  • the target network parameter obtained from the server is the VoNR (Voice Over New Radio) parameter.
  • the target network parameters acquired from the server include at least one of VoLTE parameters, WiFi parameters, and VoNR parameters.
  • the RCS network is an application scenario that can integrate the above-mentioned VoLTE, VoWiFi, 5G network and other scenarios. Its biggest feature is the realization of service integration, that is, the integration of many services such as SMS, voice, call, MMS, and video sharing.
  • a protocol framework (such as based on IMS (IP Multimedia Subsystem, IP Multimedia Subsystem)) performs transmission and communication, and at the same time realizes business expansion.
  • the terminal needs to apply for card information from the operator in order to be able to access the network and perform various network services through the identification card.
  • the method may further include steps 300 to 302.
  • step 300 the terminal applies to the first operator network for a virtual identification card.
  • the terminal After the terminal successfully applies for the virtual identification card from the first operator's network, it can obtain card parameters (which can also be understood as card information) so that it can access the network through the virtual identification card.
  • card parameters which can also be understood as card information
  • the VSIM card is a commonly used virtual identification card.
  • the virtual identification card is a VSIM card, the following two situations will occur: in the first case, the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are the same operator; in the second case, the virtual The first operator to which the SIM card belongs and the second operator to which the target network belongs are different operators.
  • the process for the terminal to access the network includes steps 501 to 503.
  • step 501 the terminal obtains the target network parameters from the server through the VSIM identification card.
  • step 502 it is determined that the operator to which the VSIM card belongs and the operator to which the target network belongs are the same target operator.
  • step 503 the target network is accessed according to the target network parameters acquired from the server through the VSIM card.
  • VoLTE parameters are preset on the terminal side before leaving the factory.
  • the terminal applies to the operator ’s network for the operator ’s VSIM card, and uses the VSIM card from the server (
  • the server can be an operator ’s server or a third-party server that has purchased multiple operators ’number segments) Download the operator ’s VoLTE parameters to adaptively access the operator ’s VoLTE network .
  • VoLTE parameters come from the terminal's local database.
  • the VoLTE parameters are provided by the server, and may be delivered to the terminal along with the VSIM card parameters.
  • VoLTE parameters refer to the parameters that the terminal needs to use when performing the VoLTE service, and are generally provided by the operator. For example, voice coding method, IPSec encryption algorithm, whether to support VoLTE, etc.
  • VSIM card parameters refer to those parameters that were originally stored in the physical SIM card, including but not limited to MCC (Mobile Country Code), MNC (Mobile Network Code, mobile network number), IMSI (International Mobile Subscriber Identity) , International Mobile Subscriber Identification Number), ICCID (Integrate Circuit Card Identity, integrated circuit card identification code), Ki, FPLMN (Forbidden PLMN, Forbidden Home Network), HPLMN (Encrypted Data Transfer between SIM Card and Operator) Home PLMN, the public land mobile network to which the end user belongs), etc.
  • MCC Mobile Country Code
  • MNC Mobile Network Code, mobile network number
  • IMSI International Mobile Subscriber Identity
  • ICCID Intelligent Circuit Card Identity
  • Ki Ki
  • FPLMN Formbidden PLMN, Forbidden Home Network
  • HPLMN Encrypted Data Transfer between SIM Card and Operator
  • the solution of the embodiment of the present application can be used to eliminate The operator attribute matches the process of searching for a suitable operator in the stored operator list, which simplifies the processing process and greatly accelerates the processing speed.
  • the method flow of the terminal accessing the network according to the embodiment of the present application includes steps 601 to 603.
  • step 601 the terminal applies to the first operator network for a VSIM card.
  • step 602 the terminal obtains the VoLTE parameters of the VoLTE network of the first operator through the VSIM card.
  • step 603 the terminal accesses the VoLTE network according to the VoLTE parameters.
  • the terminal may obtain a random number after applying for the VSIM card from the first operator network.
  • the terminal may send the random number to the first operator network, and after the identity verification performed by the first operator network according to the random number, obtain the VoLTE parameters of the VoLTE network through the VSIM card.
  • the method for the terminal to access the network includes steps 701 to 704.
  • step 701 the terminal applies to the first operator network for a VSIM card and obtains a random number.
  • an end user can obtain a random number from the server after applying for a VSIM card to complete payment.
  • step 702 the terminal sends the random number to the first operator network.
  • step 703 the first operator network compares the random number stored locally on the network side with the random number received from the terminal. If the two random numbers are consistent, the identity verification is successful.
  • step 704 after the identity verification is successful, the terminal obtains the VoLTE parameters of the VoLTE network of the first operator through the VSIM card.
  • Another security mechanism is encryption, that is, the terminal applies for a VSIM card from the operator's network, the terminal obtains the encrypted "SIM card parameters and VoLTE parameters" from the server through the VSIM card, and the terminal uses the encrypted "SIM card parameters and VoLTE parameters" "Stored on the terminal side, and after decrypting it, get" SIM card parameters and VoLTE parameters ", and then access the target network according to" SIM card parameters and VoLTE parameters ".
  • the terminal side does not preset any operator's VoLTE parameters in the software version.
  • the terminal applies for the target operator's VSIM card, downloads the encrypted VSIM card parameters and the operator's VoLTE parameters from the server, and decrypts Therefore, when it is determined that the operator to which the VSIM card belongs and the operator to which the VoLTE network belongs are the same target operator according to the VSIM card parameters, the terminal uses the VoLTE parameters provided by the server to successfully access the VoLTE network of the operator.
  • the VoLTE parameters are the latest VoLTE parameters of the target operator that are dynamically acquired.
  • the first operator to which the VSIM card belongs is different from the second operator to which the target network belongs.
  • it is necessary to perform authorization judgment before accessing the target network If it is authorized, the target network can be accessed according to the parameters of the target network; otherwise, it means that unauthorized access to the target network fails.
  • the authorization judgment can be performed with the help of the VSIM card identifier in the VSIM card parameters.
  • the card parameters of the virtual SIM card applied to the first operator at least include the SIM card identification
  • the terminal sends the SIM card identification to the target network and receives a feedback message from the target network, the feedback message is used to indicate
  • the virtual SIM card of the terminal obtains the target network access authorization, and then the terminal accesses the target network according to the feedback message and the target network parameters.
  • the specific process of the terminal accessing the network includes steps 801 to 805.
  • step 801 the terminal obtains the target network parameters from the server through the VSIM card.
  • step 802 it is determined that the operator to which the VSIM card belongs and the operator to which the target network parameter belongs are different target operators.
  • step 803 the target network side performs authorization judgment before accessing the target network. If it is authorized, step 804 is performed; otherwise, it indicates that it is not authorized, and step 805 is performed.
  • step 804 the terminal accesses the target network according to the target network parameters acquired from the server through the VSIM card.
  • step 805 the terminal fails to access the target network.
  • the target network when judging whether to authorize, can use the VSIM card identifier to obtain whether the terminal's contract information has authorization information, based on which it can be judged between the operator to which the VSIM card belongs and the operator to which the target network parameters belong Whether there is authorization for network access.
  • Card identification includes but is not limited to IMSI. IMSI is a mark to distinguish mobile users. Its total length does not exceed 15 digits. You can use 0-9 to represent valid information (valid information for distinguishing mobile users).
  • step 302 may include steps 901 to 903.
  • step 901 a list of target networks to which the identification card is authorized is displayed.
  • step 902 the target network to be accessed is selected from the target network list.
  • step 903 the target network parameters of the target network to be accessed are acquired from the server.
  • a process for a terminal to acquire target network parameters from a server through an identification card includes steps 1001 to 1002.
  • step 1001 a list of target networks that can be authorized to access the network matching the VSIM card is displayed on the terminal.
  • step 1002 the user selects a target network from the target network list, and after receiving the user's selection operation, the terminal acquires target network parameters corresponding to the target network.
  • this is a way to present authorization information through the interface.
  • a Unicom ’s VSIM card has obtained the network access authorization, and the current terminal is under the coverage of the mobile network, and needs to access the mobile network.
  • the target network parameters of the corresponding mobile network are downloaded from the server in order to Access the mobile network according to the downloaded target network parameters.
  • the operator information to be accessed can be obtained from the base station of the roaming place, so that the target network parameters can be quickly obtained from the server.
  • the process for the terminal to obtain the target network parameters from the server through the identification card, as shown in FIG. 11, includes steps 1101 to 1103.
  • step 1101 the current location information of the terminal is acquired.
  • step 1102 the operator information of the accessible target network is acquired from the base station within the network coverage distance corresponding to the location information.
  • step 1103 the target network parameters corresponding to the operator information are obtained from the server through the VSIM card.
  • the location information can be obtained through the positioning system. After the location information is obtained, information of nearby base stations can be obtained according to the location information, so that operator information can be obtained from the base station.
  • operator information refers to information that can identify an operator, such as MCC and MNC.
  • the terminal can compare the MCC and MNC in the parameters of the VSIM card with the MCC and MNC obtained from the base station, so that it can know whether the terminal is roaming.
  • the terminal can dynamically obtain the target network parameters from the server according to the identification card.
  • the target network parameters do not need to be preset in advance on the terminal side and pre-binding with the identification card, which saves Storage space on the terminal side.
  • the target network parameters obtained from the server are always the latest parameters, so access to the target network will not fail due to the network parameters, which ensures that the terminal successfully accesses the network.
  • An embodiment of the present application further provides a terminal for implementing the above network access method, and the content that has been described will not be described in detail.
  • the term "module” may be implemented as a combination of software and / or hardware with predetermined functions. Although the devices described in the following embodiments are preferably implemented in software, implementation of hardware or a combination of software and hardware is also possible and conceived.
  • the terminal according to an embodiment of the present application includes an acquiring unit 121 and an access unit 122.
  • the obtaining unit 121 is used to obtain the target network parameters from the server through the identification card.
  • the access unit 122 is used to access the target network according to the target network parameter.
  • the identification card may be a virtual identification card or a physical identification card. Taking a virtual identification card as an example, the virtual identification number includes but is not limited to at least one of eSIM, SoftSIM, VSIM, and virtual UICC card.
  • the first operator to which the VSIM card belongs may be the same operator as the second operator to which the target network belongs.
  • the first operator to which the VSIM card belongs may be a different operator from the second operator to which the target network belongs.
  • the terminal may further include an application unit 123 for applying for a VSIM card from the first operator network.
  • the card parameters of the VSIM card applied to the first operator at least include the SIM card identifier.
  • the obtaining unit 121 is further used to send the SIM card identification to the target network and receive the feedback message of the target network.
  • the feedback message is used to instruct the virtual SIM card to obtain the target network access authorization.
  • the access unit 122 is configured to access the target network according to the feedback message and target network parameters.
  • the acquiring unit 121 is used to display a list of target networks authorized by the identification card, select a target network to be accessed from the list of target networks, and acquire target network parameters of the target network to be accessed from the server.
  • the obtaining unit 121 is used to obtain the current location information of the terminal, from the network corresponding to the location information
  • the base station within the coverage distance obtains the operator information of the accessible target network, and obtains the target network parameters corresponding to the operator information from the server through the VSIM card.
  • the obtaining unit 121 is configured to obtain the VoLTE parameters of the VoLTE network of the first operator through the VSIM card.
  • the obtaining unit 121 is used to apply for a VSIM card from the first operator network and obtain a random number, send the random number to the first operator network, and perform identity verification based on the random number through the first operator network After that, the VoLTE parameters of the VoLTE network of the first operator are obtained through the virtual SIM card.
  • the target network parameter obtained from the server when the target network to be accessed is a VoLTE network, the target network parameter obtained from the server is the VoLTE parameter; when the target network to be accessed is the VoWiFi network, the target network parameter obtained from the server is WiFi parameters; when the target network to be accessed is a 5G network, the target network parameters obtained from the server are VoNR parameters; when the target network to be accessed is RCS, the target network parameters obtained from the server include VoLTE parameters, WiFi parameters , At least one of the VoNR parameters.
  • the terminal provided in the above embodiment performs network access
  • only the above division of the program modules is used as an example for illustration.
  • the above processing may be allocated by different program modules according to needs. That is, the internal structure of the device is divided into different program modules to complete all or part of the processing described above.
  • the terminal and the network access method embodiment provided in the foregoing embodiments belong to the same concept. For the specific implementation process, see the method embodiment, and details are not described here.
  • An embodiment of the present application further provides a computer-readable storage medium for storing a computer program to implement the steps of the foregoing network access method.
  • the computer readable storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash, magnetic surface memory, optical disk, or CD-ROM; it may also be various devices including one or any combination of the above memories.
  • a method of dynamically acquiring VoLTE parameters of a server through a VSIM card is implemented, so as to adaptively access a VoLTE network.
  • the terminal side no longer presets VoLTE parameters of any operator before leaving the factory, but after applying for a VSIM card, downloads the VoLTE parameters of the operator from the server through the VSIM card to access the VoLTE network.
  • FIG. 14 is a schematic diagram of an optional structure of a terminal applying the method of the foregoing embodiment.
  • the terminal of the present application includes a detection module 141, an application module 142, a download module 143, a storage module 144, a configuration module 145, and a query module 146.
  • the detection module 141 is used to detect whether the VSIM card parameters and VoLTE parameters of a certain operator are stored locally within the validity period.
  • the application module 142 is used to apply for the VSIM card number and VoLTE parameters of an operator from the server.
  • the download module 143 is used to download the VSIM card parameters provided by the server and the VoLTE parameters of the operator.
  • the storage module 144 is used to save the downloaded VSIM card parameters and VoLTE parameters locally, and based on the consideration of information security, the encryption mode is used.
  • the configuration module 145 is used to parse and save the local VoLTE parameters and write them into the NV or file actually used by the terminal.
  • the query module 146 is used to query whether the VoLTE switch of the terminal is turned on.
  • VoLTE parameters read by the configuration module 145 are as follows:
  • the configuration module 145 analyzes and learns that the operator's VoLTE network requires the terminal to turn on adaptive AMR-WB (Adaptive Multi-Rate Wideband, multi-rate wideband coding) voice coding, and turn off IPSec (IP Security, IP security) authentication and ViLTE Video over LTE, LTE-based video calling). Therefore, the configuration module 145 modifies the NV or file corresponding to the above function points.
  • AMR-WB Adaptive Multi-Rate Wideband, multi-rate wideband coding
  • IPSec IP Security, IP security
  • FIG. 15 is a procedure for adaptively accessing a VoLTE network based on a VSIM card using this embodiment.
  • the procedure includes the following steps 1501 to 1509.
  • step 1501 the terminal successfully accesses the LTE network.
  • step 1502 the notification detection module 141 detects whether the virtual SIM card parameters and VoLTE parameters of the operator's validity period are stored locally.
  • step 1503 is continued; otherwise, step 1507 is executed.
  • step 1503 the notification application module 142 applies to the server for the operator's VSIM card number and VoLTE parameters.
  • step 1504 the download module 143 is notified to download the VSIM card parameters provided by the server and the VoLTE parameters of the operator.
  • step 1505 the storage module 144 is notified to save the downloaded parameters locally.
  • step 1506 the notification configuration module 145 parses and saves the local VoLTE parameters and writes them to the NV or file actually used by the terminal.
  • step 1507 the notification query module 146 queries whether the VoLTE switch of the terminal is turned on.
  • step 1508 is continued; otherwise, step 1509 is executed.
  • VoLTE registration is initiated.
  • the detection module 141 is used to detect whether the virtual SIM card parameters and VoLTE parameters of a certain operator are stored locally. From the current development trend of smart terminals, the existence of physical SIM cards partially limits the evolution of mobile terminals, limits the space and design of devices, and increases the process difficulty and manufacturing costs of devices. Therefore, the major smart terminal manufacturers began to resolve to vigorously promote the virtual SIM technology.
  • VoLTE parameters refer to the parameters that the terminal needs to use when performing the VoLTE service, and are generally provided by the operator. For example, voice coding method, IPSec encryption algorithm, whether to support ViLTE, etc.
  • this refers to the VSIM card parameters and VoLTE parameters of the same operator.
  • the terminal downloads the SIM card parameters of the number and the VoLTE parameters of China Unicom from the server.
  • the embodiment of the present application omits the process of matching VoLTE parameters of the operator in the software version according to the PLMN of the physical SIM card in the related art.
  • VoLTE is used as an example, but actual applications include, but are not limited to, parameters related to operators such as VoLTE, VoWiFi, RCS, and 5G services.
  • the application module 142 is used to apply for VSIM card parameters and VoLTE parameters to the server.
  • the server may be a server of an operator, or a third-party server that has purchased a number segment of multiple operators.
  • the flow chart of the interaction between the application module 142 and the server is shown in FIG. 16, and the process includes the following steps 1601 to 1604.
  • step 1601 the terminal applies to the server for the VSIM card and VoLTE parameters of an operator.
  • step 1602 the terminal receives an instruction from the server requesting "identity verification”.
  • step 1603 the terminal sends the device identification of the terminal to the server, requesting verification of the identity of the terminal.
  • the device identification of the terminal is used for identity verification when downloading the SIM card parameters and VoLTE parameters to determine that the terminal has applied for the above-mentioned virtual SIM card, so as to ensure the security of the SIM card parameters and VoLTE parameter download corresponding to the SIM card Sex.
  • the device identification of the terminal can also be used as an encryption factor for these SIM card parameters and VoLTE parameters.
  • step 1604 after the identity verification of the terminal by the server is passed, the terminal receives the "successful application" message returned by the server, and the application obtains the VSIM card and VoLTE parameters.
  • the download module 143 is used to download the virtual SIM card parameters and VoLTE parameters provided by the server, and send a "download complete message" to the server after the download is completed.
  • these parameters are encrypted, the VSIM card parameters and VoLTE parameters are obtained after the download is completed and decrypted.
  • step 1701 the terminal applies to the server for the VSIM card of an operator.
  • step 1702 the terminal receives an instruction from the server requesting "identity verification”.
  • step 1703 the terminal sends the device identification of the terminal to the server, requesting verification of the identity of the terminal.
  • step 1704 after the identity verification of the terminal by the server is passed, the VSIM card is applied for and the random number sent together.
  • the random number can be used for identity verification when downloading the SIM card parameters and VoLTE parameters to determine whether it is the terminal that owns the virtual SIM card to download the SIM card parameters and VoLTE parameters, so as to ensure the SIM card parameters and VoLTE corresponding to the SIM card Parameter download security. Random numbers can also be used as encryption factors for these SIM card parameters and VoLTE parameters.
  • the terminal receives the "successful application" message returned by the server and applies for a virtual SIM card so that subsequent terminals can download the SIM card parameters and VoLTE parameters from the server through the virtual SIM card.
  • a random number is further added.
  • the interaction process between the application module 142, the download module 143 and the server is shown in FIG. 18, and the process includes the following steps 1801 to 1805.
  • step 1801 the terminal (application module 142) requests the server to download the VSIM card parameters and VoLTE parameters of an operator.
  • step 1802 the terminal (application module 142) receives an instruction from the server requesting "identity verification”.
  • step 1803 the terminal (application module 142) sends the device identification and random number of the terminal to the server to request identity verification.
  • the terminal sends the device identification and random number of the terminal to the server, or the terminal only sends the random number to the server, to verify the identity when downloading the SIM card parameters and VoLTE parameters, to determine that the terminal applied for the virtual SIM card, thus Ensure the security of the SIM card parameters and VoLTE parameter download corresponding to the SIM card.
  • step 1804 the terminal (download module 143) receives the VSIM card parameters and VoLTE parameters sent by the server.
  • step 1805 the terminal (download module 143) sends a "download complete” message to the server.
  • the authorization judgment process before accessing the network is shown in FIG. 19, and the process includes the following steps 1901 to 1904.
  • step 1901 the terminal sends a VoLTE registration message to the P-CSCF (Proxy-Call Session Control Function) network element.
  • P-CSCF Proxy-Call Session Control Function
  • the P-CSCF network element queries the HSS (Home Subscriber Server, Home Subscriber Server) server where the SIM card is located according to the IMSI in the SIM card to obtain the VoLTE authorization.
  • HSS Home Subscriber Server, Home Subscriber Server
  • P-CSCF network element and HSS network element belong to the same operator; or P-CSCF network element and HSS network element do not belong to the same operator.
  • the IMSI is stored in the SIM card and is the unique identifier of the SIM card (including the virtual SIM card and the physical SIM card).
  • the P-CSCF is a network element on the network side, and the VoLTE signaling interaction between the terminal and the SIP server must pass through the P-CSCF.
  • the HSS is also a network element on the network side and is used to store user subscription information.
  • the HSS network element queries the authorization information according to the stored user subscription information and then instructs the P-CSCF network element through instructions, so that the P-CSCF inquires that the SIM card has obtained the VoLTE authorization.
  • step 1904 the terminal successfully registers with the VoLTE network.
  • operators can flexibly configure different network service parameters according to user categories, terminal categories, and service categories.

Abstract

Disclosed are a network access method, a terminal, and a computer storage medium. The terminal obtains a target network parameter from a server by means of an identification card; and the terminal accesses a target network according to the target network parameter.

Description

网络接入方法、终端及计算机存储介质Network access method, terminal and computer storage medium 技术领域Technical field
本申请涉及但不限于通信领域,尤其涉及一种网络接入方法、终端及计算机存储介质。This application relates to, but is not limited to, the communication field, and in particular, to a network access method, terminal, and computer storage medium.
背景技术Background technique
相关技术中,目标网络参数在终端设备中是预置的,以便使得终端根据目标网络参数实现目标网络的接入。然而,目标网络参数(如基于LTE的语音(Voice over LTE,VoLTE)参数)会发生变化,例如,运营商对网络参数进行了调整,或者在国际漫游状态下原有的网络参数不可用,由或者原有授权接入的运营商与用户当前想要接入的运营商不同,等等。目标网络参数一旦发生变化,会使得终端无法接入运营商的网络,导致网络接入失败,使得终端的功能受到影响。In the related art, the target network parameters are preset in the terminal device, so that the terminal realizes access to the target network according to the target network parameters. However, the target network parameters (such as Voice over LTE (VoLTE) parameters) will change, for example, the operator adjusts the network parameters, or the original network parameters are not available in the international roaming state, by Or the original authorized access operator is different from the operator that the user currently wants to access, and so on. Once the target network parameters change, the terminal will not be able to access the operator's network, resulting in network access failure, which will affect the terminal's function.
发明内容Summary of the invention
本申请实施例提供一种网络接入方法,包括:终端通过识别卡从服务器获取目标网络参数;以及终端根据所述目标网络参数接入目标网络。An embodiment of the present application provides a network access method, including: a terminal acquiring a target network parameter from a server through an identification card; and a terminal accessing a target network according to the target network parameter.
本申请实施例还提供了一种终端,包括:获取单元,用于通过识别卡从服务器获取目标网络参数;以及接入单元,用于根据所述目标网络参数接入目标网络。An embodiment of the present application further provides a terminal, including: an acquisition unit for acquiring a target network parameter from a server through an identification card; and an access unit for accessing a target network according to the target network parameter.
本申请的一种终端,所述终端包括:存储有计算机程序的存储器;以及处理器,配置为执行所述计算机程序,以实现根据本申请的网络接入方法。A terminal of the present application, the terminal includes: a memory storing a computer program; and a processor configured to execute the computer program to implement the network access method according to the present application.
本申请的一种计算机存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时,所述处理器实现根据本申请的网络接入方法。A computer storage medium of the present application has stored thereon a computer program, and when the computer program is executed by a processor, the processor implements the network access method according to the present application.
附图说明BRIEF DESCRIPTION
图1为根据本申请实施例的应用场景的架构示意图图;FIG. 1 is a schematic structural diagram of an application scenario according to an embodiment of the present application;
图2为根据本申请实施例的终端的硬件架构示意图;2 is a schematic diagram of a hardware architecture of a terminal according to an embodiment of the present application;
图3为根据本申请实施例的网络接入方法的流程示意图;3 is a schematic flowchart of a network access method according to an embodiment of the present application;
图4为根据本申请实施例的又一种网络接入方法的流程示意图;4 is a schematic flowchart of another network access method according to an embodiment of the present application;
图5为根据本申请实施例的又一种网络接入方法的流程示意图;5 is a schematic flowchart of another network access method according to an embodiment of the present application;
图6为根据本申请实施例的又一种网络接入方法的流程示意图;6 is a schematic flowchart of another network access method according to an embodiment of the present application;
图7为根据本申请实施例的又一种网络接入方法的流程示意图;7 is a schematic flowchart of another network access method according to an embodiment of the present application;
图8为根据本申请实施例的又一种网络接入方法的流程示意图;8 is a schematic flowchart of another network access method according to an embodiment of the present application;
图9为根据本申请实施例的图3所示的步骤301的实现流程示意图;9 is a schematic diagram of an implementation process of step 301 shown in FIG. 3 according to an embodiment of the present application;
图10为根据本申请实施例的图3所示的步骤301的又一种实现流程示意图;10 is a schematic diagram of another implementation process of step 301 shown in FIG. 3 according to an embodiment of the present application;
图11为根据本申请实施例的图3所示的步骤301的又一种实现流程示意图;11 is a schematic diagram of another implementation process of step 301 shown in FIG. 3 according to an embodiment of the present application;
图12为根据本申请实施例的终端单元组成示意图;12 is a schematic diagram of the composition of a terminal unit according to an embodiment of the present application;
图13为根据本申请实施例的又一种终端单元组成示意图;13 is a schematic diagram of yet another composition of a terminal unit according to an embodiment of the present application;
图14为根据本申请实施例的终端的模块组成示意图;14 is a schematic diagram of module composition of a terminal according to an embodiment of the present application;
图15为根据本申请实施例的终端与服务器交互流程示意图;15 is a schematic diagram of an interaction process between a terminal and a server according to an embodiment of the present application;
图16为根据本申请实施例的又一种终端与服务器交互流程示意图;16 is a schematic diagram of yet another interaction process between a terminal and a server according to an embodiment of the present application;
图17为根据本申请实施例的又一种终端与服务器交互流程示意图;17 is a schematic diagram of another interaction process between a terminal and a server according to an embodiment of the present application;
图18为根据本申请实施例的又一种终端与服务器交互流程示意图;以及18 is a schematic diagram of yet another interaction process between a terminal and a server according to an embodiment of the present application; and
图19为根据本申请实施例的一种终端与网元交互流程示意图。19 is a schematic diagram of a flow of interaction between a terminal and a network element according to an embodiment of the present application.
具体实施方式detailed description
以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所提供的实施例仅用以解释本申请,并不用于限定本申请。另外,以下所提供的实施例是用于实施本申请的部分实施例,而非提 供实施本申请的全部实施例,在不冲突的情况下,本申请实施例记载的技术方案可以任意组合的方式实施。The present application will be further described in detail below in conjunction with the drawings and embodiments. It should be understood that the embodiments provided here are only used to explain the present application, and are not used to limit the present application. In addition, the embodiments provided below are partial embodiments for implementing the present application, rather than providing all the embodiments for implementing the present application. In the case of no conflict, the technical solutions described in the embodiments of the present application can be arbitrarily combined Implementation.
需要说明的是,在本申请实施例中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的方法或者装置不仅包括所明确记载的要素,而且还包括没有明确列出的其他要素,或者是还包括为实施方法或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的方法或者装置中还存在另外的相关要素(例如方法中的步骤或者装置中的单元,例如的单元可以是部分电路、部分处理器、部分程序或软件等等)。It should be noted that, in the embodiments of the present application, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a method or device including a series of elements includes not only the explicitly recorded Elements, but also include other elements not explicitly listed, or include elements inherent to the implementation of the method or device. Without more restrictions, the element defined by the sentence "include a ..." does not exclude that there are other relevant elements in the method or device including the element (such as the steps in the method or the unit in the device For example, the unit may be part of a circuit, part of a processor, part of a program or software, etc.).
例如,本申请实施例提供的网络接入方法包括了一系列的步骤,但是本申请实施例提供的该网络接入方法不限于所记载的步骤,同样地,本申请实施例提供的终端包括了一系列单元,但是本申请实施例提供的终端不限于所明确记载的单元,还可以包括为获取相关信息、或基于信息进行处理时所需要设置的单元。For example, the network access method provided by the embodiment of the present application includes a series of steps, but the network access method provided by the embodiment of the present application is not limited to the described steps. Similarly, the terminal provided by the embodiment of the present application includes A series of units, but the terminal provided in this embodiment of the present application is not limited to the units explicitly described, and may also include units that need to be set when acquiring related information or performing processing based on the information.
需要说明的是,本申请实施例所涉及的术语“第一\第二”仅仅是区别类似的对象,不代表针对对象的特定排序,可以理解地,“第一\第二”在允许的情况下可以互换特定的顺序或先后次序。应该理解“第一\第二”区分的对象在适当情况下可以互换,以使这里描述的本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施。It should be noted that the term "first \ second" involved in the embodiments of the present application is only to distinguish similar objects, and does not represent a specific order for objects. Understandably, "first \ second" is allowed The specific order or sequence can be interchanged below. It should be understood that the objects distinguished by “first \ second” may be interchanged as appropriate, so that the embodiments of the present application described herein can be implemented in an order other than those illustrated or described herein.
图1为根据本申请实施例进行网络接入的应用场景的架构图,图1中示出了终端1、服务器2和基站3。终端1可以通过有线网络或者无线网络与服务器2进行信息交互。终端1可以为手机终端等类型。FIG. 1 is an architectural diagram of an application scenario for network access according to an embodiment of the present application. FIG. 1 shows a terminal 1, a server 2, and a base station 3. The terminal 1 can exchange information with the server 2 through a wired network or a wireless network. The terminal 1 may be a mobile phone terminal or the like.
在相关技术中,终端在出厂后可以存储各运营商的专属网络参数,例如电信的网络参数、联通的网络参数、移动的网络参数。在终端上插入用户识别卡(例如,客户识别模块(Subscriber Identity Module,SIM)卡)后可以识别出是哪个运营商的识别卡,从而调用终端事先存储的相适应的运营商的网络参数。但是,当相适应的运营 商的网络参数发生变化,或者所处的环境无相适应的运营商网络时,则会导致网络接入失败。In the related art, the terminal can store the exclusive network parameters of each operator after leaving the factory, such as telecommunication network parameters, China Unicom network parameters, and mobile network parameters. After inserting a user identification card (for example, a Subscriber Identity Module (SIM) card) in the terminal, it can identify which operator's identification card, so as to call the network parameters of the appropriate operator previously stored in the terminal. However, when the network parameters of the compatible operator change, or the environment is not equipped with an appropriate operator network, network access will fail.
而在本申请的各种实施例中,终端可以通过识别卡从服务器获取当前所在运营商网络的目标网络参数,并根据该目标网络参数接入目标网络。In various embodiments of the present application, the terminal may obtain the target network parameter of the current operator network from the server through the identification card, and access the target network according to the target network parameter.
根据本申请实施例的方案,可以采用虚拟识别卡或实体识别卡动态从服务器下载目标网络参数,因此该目标网络参数始终是最新的参数,接入目标网络不会因网络参数而失败,此外不需要事先在终端中预置大量的网络参数,节约了终端的存储空间。According to the solution of the embodiment of the present application, a virtual identification card or physical identification card may be used to dynamically download the target network parameters from the server, so the target network parameters are always the latest parameters, and access to the target network will not fail due to the network parameters. A large number of network parameters need to be preset in the terminal in advance, which saves the storage space of the terminal.
图2为根据本申请实施例的终端的硬件实体示意图。将参考图2对本实施例的移动终端的硬件结构做详细说明,可以理解,图2仅仅示出了本申请实施例的移动终端的示例性结构而非全部结构,根据需要可以实施图2示出的部分结构或全部结构。2 is a schematic diagram of a hardware entity of a terminal according to an embodiment of the present application. The hardware structure of the mobile terminal of this embodiment will be described in detail with reference to FIG. 2. It can be understood that FIG. 2 only shows the exemplary structure of the mobile terminal according to the embodiment of the present application rather than the entire structure. Part or all of the structure.
根据本申请实施例的终端100包括至少一个处理器11和存储器12,此外还可以包括用户接口13和至少一个网络接口14(也可以理解为通信接口)。终端100中的各个组件通过总线系统15耦合在一起。可以理解,总线系统15用于实现这些组件之间的连接通信。总线系统15除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图2中将各种总线都标为总线系统15。The terminal 100 according to the embodiment of the present application includes at least one processor 11 and memory 12, and may further include a user interface 13 and at least one network interface 14 (which may also be understood as a communication interface). The various components in the terminal 100 are coupled together through the bus system 15. It can be understood that the bus system 15 is used to implement connection and communication between these components. In addition to the data bus, the bus system 15 also includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 15 in FIG. 2.
网络接口14用于与其它设备进行交互。The network interface 14 is used to interact with other devices.
用户接口13可以包括显示器、键盘、鼠标、轨迹球、点击轮、按键、按钮、触感板或者触摸屏等。The user interface 13 may include a display, a keyboard, a mouse, a trackball, a click wheel, buttons, buttons, a touch panel, or a touch screen.
存储器12存储能够在处理器11上运行的计算机程序。可以理解,存储器12可以是易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。非易失性存储器可以包括ROM(Read Only Memory,只读存储器)、PROM(Programmable Read-Only Memory,可编程只读存储器)、EPROM(Erasable Programmable Read-Only Memory,可擦除可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦除可编程只读存储器)、 FRAM(ferromagnetic random access memory,磁性随机存取存储器)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或CD-ROM(Compact Disc Read-Only Memory,只读光盘);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以包括RAM(Random Access Memory,随机存取存储器),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如SRAM(Static Random Access Memory,静态随机存取存储器)、SSRAM(Synchronous Static Random Access Memory,同步静态随机存取存储器)、DRAM(Dynamic Random Access Memory,动态随机存取存储器)、SDRAM(Synchronous Dynamic Random Access Memory,同步动态随机存取存储器)、DDRSDRAM(Double Data Rate Synchronous Dynamic Random Access Memory,双倍数据速率同步动态随机存取存储器)、ESDRAM(Enhanced Synchronous Dynamic Random Access Memory,增强型同步动态随机存取存储器)、SLDRAM(SyncLink Dynamic Random Access Memory,同步连接动态随机存取存储器)、DRRAM(Direct Rambus Random Access Memory,直接内存总线随机存取存储器)。本申请实施例描述的存储器12旨在包括但不限于这些和任意其它适合类型的存储器。The memory 12 stores a computer program that can be run on the processor 11. It can be understood that the memory 12 may be a volatile memory or a non-volatile memory, and may also include both volatile and non-volatile memory. Non-volatile memory can include ROM (Read Only Memory, Read Only Memory), PROM (Programmable Read-Only Memory, Programmable Read Only Memory), EPROM (Erasable Programmable Read-Only Memory, erasable programmable read only memory ), EEPROM (Electrically Erasable Programmable Read-Only Memory), FRAM (ferromagnetic random access memory), flash memory (Flash memory), magnetic surface memory, optical disc , Or CD-ROM (Compact Disc Read-Only Memory, read-only CD); magnetic surface storage can be disk storage or tape storage. Volatile memory can include RAM (Random Access Memory), which is used as an external cache. By way of example but not limitation, many forms of RAM are available, such as SRAM (Static Random Access Memory), SSRAM (Synchronous Static Random Access Memory), DRAM (Dynamic Random Access Memory) Access, Dynamic Random Access Memory), SDRAM (Synchronous Dynamic Random Access, Synchronous Dynamic Random Access Memory), DDRSDRAM (Double Data Rate Synchronous Dynamic Random Access Memory, Double Data Rate Synchronous Dynamic Random Access Memory), ESDRAM (Enhanced Synchronous Dynamic Random Access Memory, enhanced synchronous dynamic random access memory), SLDRAM (SyncLink Dynamic Random Access Memory, synchronous connection dynamic random access memory), DRRAM (Direct Rambus Random Access Memory, direct memory bus random access memory ). The memory 12 described in the embodiments of the present application is intended to include but is not limited to these and any other suitable types of memories.
本申请实施例中的存储器12用于存储各种类型的数据以支持终端100的操作。这些数据的示例包括:用于在终端100上操作的任何可执行指令,如可执行指令121。用于实现本申请实施例的终端的网络接入的程序可以包括在可执行指令121中。The memory 12 in the embodiment of the present application is used to store various types of data to support the operation of the terminal 100. Examples of these data include: any executable instructions for operating on the terminal 100, such as executable instructions 121. The program for implementing network access of the terminal of the embodiment of the present application may be included in the executable instruction 121.
本申请实施例揭示的终端接入网络的方法可以应用于处理器11中,或者由处理器11实现。处理器11可能是集成电路芯片,具有信号的处理能力。在实现过程中,移动终端的系统自适应方法的各步骤可以通过处理器11中的硬件的集成逻辑电路或者软件形式的指令完成。处理器11可以是通用处理器、DSP(Digital Signal Processor,数字信号处理器),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器11可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤, 可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器12,处理器11读取存储器12中的信息,结合其硬件完成本申请实施例提供的网络接入方法的步骤。The method for the terminal to access the network disclosed in the embodiments of the present application may be applied to the processor 11 or implemented by the processor 11. The processor 11 may be an integrated circuit chip and has signal processing capabilities. In the implementation process, each step of the system adaptation method of the mobile terminal may be completed by instructions in the form of hardware integrated logic circuits or software in the processor 11. The processor 11 may be a general-purpose processor, a DSP (Digital Signal Processor, digital signal processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, and the like. The processor 11 may implement or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present application. The general-purpose processor may be a microprocessor or any conventional processor. The steps of the method disclosed in the embodiments of the present application may be directly implemented and completed by a hardware decoding processor, or may be implemented and completed by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium, where the storage medium is located in the memory 12, and the processor 11 reads the information in the memory 12 and completes the steps of the network access method provided in the embodiments of the present application in combination with its hardware.
实现本申请实施例终端可以被一个或多个ASIC(Application Specific Integrated Circuit,应用专用集成电路)、DSP(Digital Signal Processing,数字信号处理)、PLD(Programmable Logic Device,可编程逻辑器件)、CPLD(Complex Programmable Logic Device,复杂可编程逻辑器件)、FPGA(Field-Programmable Gate Array,现场可编程门阵列)或其他电子元件实现,用于执行实现本申请实施例提供的网络接入方法。To realize the embodiments of the present application, the terminal may be implemented by one or more ASICs (Application Specific Integrated Circuits), DSPs (Digital Signal Processing), PLDs (Programmable Logic Devices), CPLDs (Programmable Logic Devices) Complex Programmable Logic Device, FPGA (Field-Programmable Gate Array) or other electronic components are used to implement the network access method provided by the embodiments of the present application.
根据本申请实施例的网络接入方法,如图3所示,包括步骤301和302。The network access method according to an embodiment of the present application, as shown in FIG. 3, includes steps 301 and 302.
在步骤301,终端通过识别卡从服务器获取目标网络参数。In step 301, the terminal acquires the target network parameters from the server through the identification card.
在步骤302,终端根据目标网络参数接入目标网络。In step 302, the terminal accesses the target network according to the target network parameters.
这里,在实际应用时,识别卡可以为虚拟识别卡或实体识别卡。以虚拟识别卡为例,虚拟识别卡包括但不限于:VSIM(Virtual Subscriber Identification Module,虚拟SIM)卡、eSIM(Embedded SIM,嵌入式SIM)卡、SoftSIM(Soft Subscriber Identification Module,软客户识别模块)卡、UICC(Universal Integrated Circuit Card,虚拟通用集成电路)卡中的至少一种。Here, in actual application, the identification card may be a virtual identification card or a physical identification card. Taking the virtual identification card as an example, the virtual identification card includes but is not limited to: VSIM (Virtual Subscriber Identification Module, virtual SIM) card, eSIM (Embedded SIM, embedded SIM) card, SoftSIM (Soft Subscriber Identification, Module), soft customer identification module) At least one of a card and a UICC (Universal Integrated Circuit Card, virtual universal integrated circuit) card.
eSIM卡本质上还是一张SIM卡,只是它直接嵌入到终端设备的电路板上,其尺寸比目前最小的Nano SIM还小很多。eSIM可通过远程编程的方式支持不同的运营商,可在不同运营商网络间切换。SoftSIM是传统实体SIM卡的纯软件方案,它具有无硬件成本、可动态更新SIM卡参数以支持不同运营商的优点。VSIM是SoftSIM的演进版,安全性更高。它不将密钥(Ki,Key Identifier)等鉴权参数下载到本地,而是在服务器进行鉴权。The eSIM card is essentially a SIM card, but it is directly embedded in the circuit board of the terminal device, and its size is much smaller than the smallest Nano currently. eSIM can support different operators through remote programming, and can switch between different operator networks. SoftSIM is a pure software solution for traditional physical SIM cards. It has the advantages of no hardware cost and can dynamically update SIM card parameters to support different operators. VSIM is an evolved version of SoftSIM, with higher security. It does not download authentication parameters such as Key (Key, Identifier) to the local, but performs authentication on the server.
在实际应用时,识别卡的运营商与目标网络的运营商可以相同,也可以不同。In practical applications, the operator of the identification card and the operator of the target network may be the same or different.
无论虚拟识别卡还是实体识别卡,当其所能接入的网络所属的运营商与识别卡所属运营商相同时,通过识别卡(虚拟识别卡或实体识别卡)默认直接下载的目标网络参数为所述识别卡所属的运营商支持的目标网络的目标网络参数,以根据该目标网络参数接入目标网络。比如,识别卡所属的运营商为中国移动,当其所能接入的网络的运营商也是中国移动时,识别卡默认直接下载的目标网络参数就是中国移动的网络参数。采用本申请实施例,由于直接默认下载的就是与识别卡的运营商相同的运营商的网络的网络参数,从而省去了相关技术中根据识别卡的运营商属性在存储的运营商列表中去查找相适应的运营商的过程。Whether the virtual identification card or the physical identification card, when the operator to which the network it can access belongs to is the same as the operator to which the identification card belongs, the target network parameter directly downloaded by default through the identification card (virtual identification card or physical identification card) The target network parameter of the target network supported by the operator to which the identification card belongs to access the target network according to the target network parameter. For example, if the operator to which the identification card belongs is China Mobile, when the operator of the network it can access is also China Mobile, the target network parameter that the identification card directly downloads by default is the network parameter of China Mobile. According to the embodiment of the present application, because the default direct download is the network parameters of the same operator's network as the operator of the identification card, thereby eliminating the need to store the operator list in the stored operator list according to the identification card's operator attributes in related technologies. The process of finding the appropriate operator.
当识别卡(虚拟识别卡或实体识别卡)所能接入的运营商网络与卡所属运营商不相同时,需要判断能接入的运营商网络与识别卡所属运营商是否互相签署了授权,即,是否存在授权接入网络的签约信息,如果签约信息存在,那么可以基于该签约信息下载所授权运营商的目标网络参数。When the operator network that the identification card (virtual identification card or physical identification card) can access is different from the operator to which the card belongs, it is necessary to determine whether the operator network that can be accessed and the operator to which the identification card belongs have signed authorizations with each other. That is, whether there is subscription information authorized to access the network, and if the subscription information exists, the target network parameters of the authorized operator can be downloaded based on the subscription information.
在实际应用时,目标网络可以是多种形式,比如可以是VoLTE网络、VoWiFi(Voice over WiFi,基于WiFi的语音)网络、5G网络或RCS(Rich Communication Suite,融合通信)网络等。相应地,不同的目标网络对应有不同的网络参数。In practical applications, the target network can be in various forms, such as a VoLTE network, a VoWiFi (Voice over WiFi, WiFi-based voice) network, a 5G network, or an RCS (Rich Communication, Suite, converged communication) network, etc. Correspondingly, different target networks have different network parameters.
当目标网络为VoLTE网络时,从服务器获取的目标网络参数为VoLTE参数。当需要接入的目标网络为VoWiFi网络时,从服务器获取的目标网络参数为WiFi参数。当需要接入的目标网络为5G网络时,从服务器获取的目标网络参数为VoNR(Voice over New Radio,新空口承载语音)参数。当需要接入的目标网络为RCS网络时,从服务器获取的目标网络参数包含VoLTE参数、WiFi参数、VoNR参数中的至少一种。When the target network is a VoLTE network, the target network parameters obtained from the server are VoLTE parameters. When the target network to be accessed is a VoWiFi network, the target network parameters obtained from the server are WiFi parameters. When the target network to be accessed is a 5G network, the target network parameter obtained from the server is the VoNR (Voice Over New Radio) parameter. When the target network to be accessed is an RCS network, the target network parameters acquired from the server include at least one of VoLTE parameters, WiFi parameters, and VoNR parameters.
RCS网络是可以将上述VoLTE、VoWiFi、5G网络等场景融合的一种应用场景,其最大的特性在于实现了业务的融合,即,将短信、语音、通话、彩信以及视频共享等诸多业务在同一个协议框架(如基于IMS(IP Multimedia Subsystem,IP多媒体子系统))下进行传输、 通信,同时实现了业务的扩展。The RCS network is an application scenario that can integrate the above-mentioned VoLTE, VoWiFi, 5G network and other scenarios. Its biggest feature is the realization of service integration, that is, the integration of many services such as SMS, voice, call, MMS, and video sharing. A protocol framework (such as based on IMS (IP Multimedia Subsystem, IP Multimedia Subsystem)) performs transmission and communication, and at the same time realizes business expansion.
在实际应用时,当识别卡为虚拟识别卡时,终端需要向运营商申请卡信息,以便能够通过识别卡接入网络、进行各种网络业务等。In practical applications, when the identification card is a virtual identification card, the terminal needs to apply for card information from the operator in order to be able to access the network and perform various network services through the identification card.
在一实施例中,如图4所示,该方法还可以包括步骤300至302。In an embodiment, as shown in FIG. 4, the method may further include steps 300 to 302.
在步骤300,终端向第一运营商网络申请虚拟识别卡。In step 300, the terminal applies to the first operator network for a virtual identification card.
终端向第一运营商网络申请虚拟识别卡成功后,可以获得卡参数(也可以理解为卡信息),以便能够通过虚拟识别卡能够接入网络等。After the terminal successfully applies for the virtual identification card from the first operator's network, it can obtain card parameters (which can also be understood as card information) so that it can access the network through the virtual identification card.
这里,在实际应用时,VSIM卡为一种常用的虚拟识别卡。当虚拟识别卡为VSIM卡时,会出现以下两种情况:第一种情况,虚拟SIM卡所属的第一运营商与目标网络所属的第二运营商为同一运营商;第二种情况,虚拟SIM卡所属的第一运营商与目标网络所属的第二运营商为不同运营商。Here, in practical application, the VSIM card is a commonly used virtual identification card. When the virtual identification card is a VSIM card, the following two situations will occur: in the first case, the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are the same operator; in the second case, the virtual The first operator to which the SIM card belongs and the second operator to which the target network belongs are different operators.
当然,对于其他类型的虚拟识别卡和实体识别卡,同样也会出现上述两种情况。Of course, for other types of virtual identification cards and physical identification cards, the above two situations will also occur.
对于第一种情况,在接入前无需进行授权判断,直接根据通过VSIM卡从服务器获取的目标网络参数接入目标网络。此时,终端接入网络的流程,如图5所示,包括步骤501至503。For the first case, no authorization judgment is required before access, and the target network is directly accessed according to the target network parameters obtained from the server through the VSIM card. At this time, the process for the terminal to access the network, as shown in FIG. 5, includes steps 501 to 503.
在步骤501,终端通过VSIM识别卡从服务器获取目标网络参数。In step 501, the terminal obtains the target network parameters from the server through the VSIM identification card.
在步骤502,确定VSIM卡所属的运营商与目标网络所属的运营商为相同的目标运营商。In step 502, it is determined that the operator to which the VSIM card belongs and the operator to which the target network belongs are the same target operator.
在步骤503,根据通过VSIM卡从服务器获取的目标网络参数接入目标网络。In step 503, the target network is accessed according to the target network parameters acquired from the server through the VSIM card.
具体地,假设目标网络为VoLTE网络,出厂前在终端侧不预置任何运营商的VoLTE参数,而是由终端向某运营商网络申请该运营商的VSIM卡,并通过该VSIM卡从服务器(服务器端可以是某个运营商的服务器,也可以是某个购买了多个运营商的号码段的第三方服务器)下载该运营商的VoLTE参数,以自适应的接入该运营商的VoLTE网络。在相关技术中,VoLTE参数来自于终端本地数据库。根据本申请实施例,VoLTE参数由服务器提供,并且可以随VSIM卡参数一起下发给 终端,当然服务器也可以只向终端提供VoLTE参数。VoLTE参数指的是终端进行VoLTE业务时需要用到的参数,一般由运营商提供。比如语音编码方式、IPSec加密算法、是否支持VoLTE等。VSIM卡参数指的是那些原先保存在实体SIM卡中的参数,包括但不限于MCC(Mobile Country Code,移动设备国家代码)、MNC(Mobile Network Code,移动网络号码)、IMSI(International Mobile Subscriber Identity,国际移动用户识别码)、ICCID(Integrate Circuit Card Identity,集成电路卡识别码)、SIM卡与运营商之间加密数据传递的Ki、FPLMN(Forbidden PLMN,被禁止访问的归属网络)、HPLMN(Home PLMN,终端用户归属的公共陆地移动网络)等。Specifically, assuming that the target network is a VoLTE network, no VoLTE parameters of any operator are preset on the terminal side before leaving the factory. Instead, the terminal applies to the operator ’s network for the operator ’s VSIM card, and uses the VSIM card from the server ( The server can be an operator ’s server or a third-party server that has purchased multiple operators ’number segments) Download the operator ’s VoLTE parameters to adaptively access the operator ’s VoLTE network . In the related art, VoLTE parameters come from the terminal's local database. According to the embodiment of the present application, the VoLTE parameters are provided by the server, and may be delivered to the terminal along with the VSIM card parameters. Of course, the server may also only provide the VoLTE parameters to the terminal. VoLTE parameters refer to the parameters that the terminal needs to use when performing the VoLTE service, and are generally provided by the operator. For example, voice coding method, IPSec encryption algorithm, whether to support VoLTE, etc. VSIM card parameters refer to those parameters that were originally stored in the physical SIM card, including but not limited to MCC (Mobile Country Code), MNC (Mobile Network Code, mobile network number), IMSI (International Mobile Subscriber Identity) , International Mobile Subscriber Identification Number), ICCID (Integrate Circuit Card Identity, integrated circuit card identification code), Ki, FPLMN (Forbidden PLMN, Forbidden Home Network), HPLMN (Encrypted Data Transfer between SIM Card and Operator) Home PLMN, the public land mobile network to which the end user belongs), etc.
另外,如前所述,当虚拟SIM卡所属的第一运营商与目标网络所属的第二运营商为同一运营商时,采用本申请实施例的方案,可以省去相关技术中根据识别卡的运营商属性在存储的运营商列表中去匹配查找相适应的运营商的过程,简化了处理过程,大大加快了处理速度。In addition, as described above, when the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are the same operator, the solution of the embodiment of the present application can be used to eliminate The operator attribute matches the process of searching for a suitable operator in the stored operator list, which simplifies the processing process and greatly accelerates the processing speed.
就第一种情况而言,在VoLTE场景中,如图6所示,本申请实施例终端接入网络的方法流程包括步骤601至603。As for the first case, in the VoLTE scenario, as shown in FIG. 6, the method flow of the terminal accessing the network according to the embodiment of the present application includes steps 601 to 603.
在步骤601,终端向第一运营商网络申请VSIM卡。In step 601, the terminal applies to the first operator network for a VSIM card.
在步骤602,终端通过VSIM卡获取所述第一运营商的VoLTE网络的VoLTE参数。In step 602, the terminal obtains the VoLTE parameters of the VoLTE network of the first operator through the VSIM card.
在步骤603,终端根据VoLTE参数接入VoLTE网络。In step 603, the terminal accesses the VoLTE network according to the VoLTE parameters.
考虑到安全,为了避免所申请的VSIM卡被盗用,终端可以在向第一运营商网络申请VSIM卡后获取随机数。终端可以将所述随机数发送给第一运营商网络,并且在通过第一运营商网络根据所述随机数执行的身份校验后,通过VSIM卡获取VoLTE网络的VoLTE参数。Considering security, in order to avoid theft of the applied VSIM card, the terminal may obtain a random number after applying for the VSIM card from the first operator network. The terminal may send the random number to the first operator network, and after the identity verification performed by the first operator network according to the random number, obtain the VoLTE parameters of the VoLTE network through the VSIM card.
更具体地,本申请实施例终端接入网络的方法流程,如图7所示,包括步骤701至704。More specifically, the method for the terminal to access the network according to the embodiment of the present application, as shown in FIG. 7, includes steps 701 to 704.
在步骤701,终端向第一运营商网络申请VSIM卡并获取随机数。In step 701, the terminal applies to the first operator network for a VSIM card and obtains a random number.
比如,终端用户可以在申请VSIM卡完成付费之后,从服务器获取随机数。For example, an end user can obtain a random number from the server after applying for a VSIM card to complete payment.
在步骤702,终端发送所述随机数给第一运营商网络。In step 702, the terminal sends the random number to the first operator network.
在步骤703,第一运营商网络将网络侧本地所存储的随机数与从终端收到的随机数进行比较,如果这两个随机数一致,则身份校验成功。In step 703, the first operator network compares the random number stored locally on the network side with the random number received from the terminal. If the two random numbers are consistent, the identity verification is successful.
在步骤704,身份校验成功后,终端通过VSIM卡获取第一运营商的VoLTE网络的VoLTE参数。In step 704, after the identity verification is successful, the terminal obtains the VoLTE parameters of the VoLTE network of the first operator through the VSIM card.
另一种安全机制是加密,即,终端向运营商网络申请VSIM卡,终端通过VSIM卡从服务器获取加密形式的“SIM卡参数和VoLTE参数”,终端将加密形式的“SIM卡参数和VoLTE参数”存储于终端侧,并在对其进行解密后得到“SIM卡参数和VoLTE参数”,随后根据“SIM卡参数和VoLTE参数”接入目标网络。Another security mechanism is encryption, that is, the terminal applies for a VSIM card from the operator's network, the terminal obtains the encrypted "SIM card parameters and VoLTE parameters" from the server through the VSIM card, and the terminal uses the encrypted "SIM card parameters and VoLTE parameters" "Stored on the terminal side, and after decrypting it, get" SIM card parameters and VoLTE parameters ", and then access the target network according to" SIM card parameters and VoLTE parameters ".
具体地,终端出厂时,终端侧在软件版本中不预置任何运营商的VoLTE参数,终端申请目标运营商的VSIM卡,从服务器下载加密形式的VSIM卡参数及该运营商的VoLTE参数并解密,从而,当根据VSIM卡参数判断出VSIM卡所属的运营商与VoLTE网络所属的运营商为相同的目标运营商时,终端使用服务器提供的VoLTE参数,成功接入该运营商的VoLTE网络。本实施例中,VoLTE参数是动态获取的目标运营商的最新VoLTE参数。Specifically, when the terminal leaves the factory, the terminal side does not preset any operator's VoLTE parameters in the software version. The terminal applies for the target operator's VSIM card, downloads the encrypted VSIM card parameters and the operator's VoLTE parameters from the server, and decrypts Therefore, when it is determined that the operator to which the VSIM card belongs and the operator to which the VoLTE network belongs are the same target operator according to the VSIM card parameters, the terminal uses the VoLTE parameters provided by the server to successfully access the VoLTE network of the operator. In this embodiment, the VoLTE parameters are the latest VoLTE parameters of the target operator that are dynamically acquired.
对于第二种情况,VSIM卡所属的第一运营商与目标网络所属的第二运营商不同。对于此种情况,在接入目标网络前需要可以进行授权判断,如果已经授权,则可以根据目标网络参数接入目标网络;否则,说明未授权,则接入目标网络失败。可以借助VSIM卡参数中的VSIM卡标识来进行授权判断。也就是说,向第一运营商申请的虚拟SIM卡的卡参数至少包含SIM卡标识,终端将所述SIM卡标识发送至目标网络,并接收目标网络的反馈消息,所述反馈消息用于指示终端的虚拟SIM卡获得目标网络接入授权,然后,所述终端根据所述反馈消息和目标网络参数接入目标网络。For the second case, the first operator to which the VSIM card belongs is different from the second operator to which the target network belongs. In this case, it is necessary to perform authorization judgment before accessing the target network. If it is authorized, the target network can be accessed according to the parameters of the target network; otherwise, it means that unauthorized access to the target network fails. The authorization judgment can be performed with the help of the VSIM card identifier in the VSIM card parameters. That is to say, the card parameters of the virtual SIM card applied to the first operator at least include the SIM card identification, and the terminal sends the SIM card identification to the target network and receives a feedback message from the target network, the feedback message is used to indicate The virtual SIM card of the terminal obtains the target network access authorization, and then the terminal accesses the target network according to the feedback message and the target network parameters.
此时,终端接入网络的具体流程,如图8所示,包括步骤801至805。At this time, the specific process of the terminal accessing the network, as shown in FIG. 8, includes steps 801 to 805.
在步骤801,终端通过VSIM卡从服务器获取目标网络参数。In step 801, the terminal obtains the target network parameters from the server through the VSIM card.
在步骤802,确定VSIM卡所属的运营商与所述目标网络参数所属的运营商为不同的目标运营商。In step 802, it is determined that the operator to which the VSIM card belongs and the operator to which the target network parameter belongs are different target operators.
在步骤803,在接入目标网络前目标网络侧进行授权判断,如果已经授权,则执行步骤804;否则,说明未授权,执行步骤805。In step 803, the target network side performs authorization judgment before accessing the target network. If it is authorized, step 804 is performed; otherwise, it indicates that it is not authorized, and step 805 is performed.
在步骤804,终端根据通过VSIM卡从服务器获取的目标网络参数接入目标网络。In step 804, the terminal accesses the target network according to the target network parameters acquired from the server through the VSIM card.
在步骤805,终端接入目标网络失败。In step 805, the terminal fails to access the target network.
在实际应用时,在判断是否授权时,目标网络可以利用VSIM卡标识获得终端的签约信息中有是否授权的信息,据此可以判断VSIM卡所属的运营商与目标网络参数所属的运营商之间是否有网络接入的授权。卡标识包括但不限于IMSI,IMSI是区别移动用户的标志,其总长度不超过15位,可以使用0~9的数字来表示有效信息(用于区别移动用户的有效信息)。In actual application, when judging whether to authorize, the target network can use the VSIM card identifier to obtain whether the terminal's contract information has authorization information, based on which it can be judged between the operator to which the VSIM card belongs and the operator to which the target network parameters belong Whether there is authorization for network access. Card identification includes but is not limited to IMSI. IMSI is a mark to distinguish mobile users. Its total length does not exceed 15 digits. You can use 0-9 to represent valid information (valid information for distinguishing mobile users).
在实际应用时,可以向用户呈现获得授权的目标网络列表,以便用户根据需要进行选择。基于此,在一实施例中,如图9所示,步骤302可以包括步骤901至903。In practical applications, the user can be presented with a list of authorized target networks so that the user can choose according to their needs. Based on this, in an embodiment, as shown in FIG. 9, step 302 may include steps 901 to 903.
在步骤901,显示识别卡获得授权的目标网络列表。In step 901, a list of target networks to which the identification card is authorized is displayed.
在步骤902,从目标网络列表中选取待接入目标网络。In step 902, the target network to be accessed is selected from the target network list.
在步骤903,从服务器获取待接入目标网络的目标网络参数。In step 903, the target network parameters of the target network to be accessed are acquired from the server.
就第二种情况而言,根据本申请实施例,终端通过识别卡从服务器获取目标网络参数的流程,如图10所示,包括步骤1001至1002。As for the second case, according to an embodiment of the present application, a process for a terminal to acquire target network parameters from a server through an identification card, as shown in FIG. 10, includes steps 1001 to 1002.
在步骤1001,在终端显示与VSIM卡相匹配的可授权接入网络的目标网络列表。In step 1001, a list of target networks that can be authorized to access the network matching the VSIM card is displayed on the terminal.
在步骤1002,用户从目标网络列表选择目标网络,终端接收到用户的选择操作后,获取对应目标网络的目标网络参数。In step 1002, the user selects a target network from the target network list, and after receiving the user's selection operation, the terminal acquires target network parameters corresponding to the target network.
具体来说,这是一种将授权信息通过界面呈现出来的方式。比如一张联通的VSIM卡获得了网络的接入授权,并且当前终端处在移动网络的覆盖范围下,需要接入移动网络,在选择移动网络后从服务器下载对应移动网络的目标网络参数,以便根据下载得到的目标网络参数接入移动网络。Specifically, this is a way to present authorization information through the interface. For example, a Unicom ’s VSIM card has obtained the network access authorization, and the current terminal is under the coverage of the mobile network, and needs to access the mobile network. After selecting the mobile network, the target network parameters of the corresponding mobile network are downloaded from the server in order to Access the mobile network according to the downloaded target network parameters.
就第二种情况而言,当终端当前所处的位置为漫游地后,可以先从漫游地的基站获取想要接入的运营商信息,这样能够快速从服务器获取目标网络参数。In the second case, when the current location of the terminal is the roaming place, the operator information to be accessed can be obtained from the base station of the roaming place, so that the target network parameters can be quickly obtained from the server.
基于此,根据本申请实施例,终端通过识别卡从服务器获取目标网络参数的流程,如图11所示,包括步骤1101至1103。Based on this, according to an embodiment of the present application, the process for the terminal to obtain the target network parameters from the server through the identification card, as shown in FIG. 11, includes steps 1101 to 1103.
在步骤1101,获取终端当前的位置信息。In step 1101, the current location information of the terminal is acquired.
在步骤1102,从根据位置信息对应的网络覆盖距离范围内的基站获取可接入的目标网络的运营商信息。In step 1102, the operator information of the accessible target network is acquired from the base station within the network coverage distance corresponding to the location information.
在步骤1103,通过VSIM卡从服务器获取与运营商信息对应的目标网络参数。In step 1103, the target network parameters corresponding to the operator information are obtained from the server through the VSIM card.
这里,在实际应用时,可以通过定位系统获取位置信息。获取位置信息后,可以根据位置信息获得附近的基站信息,从而可以向基站获取运营商信息。Here, in actual application, the location information can be obtained through the positioning system. After the location information is obtained, information of nearby base stations can be obtained according to the location information, so that operator information can be obtained from the base station.
在实际应用时,运营商信息是指可以标识运营商的信息,比如MCC和MNC等。终端可以将VSIM卡参数中的MCC和MNC与从基站获取的MCC和MNC进行比较,从而可以获知终端是否处于漫游地。In practical applications, operator information refers to information that can identify an operator, such as MCC and MNC. The terminal can compare the MCC and MNC in the parameters of the VSIM card with the MCC and MNC obtained from the base station, so that it can know whether the terminal is roaming.
当终端处于漫游地时,在相关技术中,需要根据从基站获取的国家代码等运营商信息进行网络切换,切换过程相当繁琐,根据本申请实施例,当终端处于漫游地时,不需要基于MCC等进行网络切换过程,大大加快了网络接入速度,提升了用户体验。When the terminal is in a roaming place, in the related art, network switching needs to be performed according to operator information such as the country code obtained from the base station, and the switching process is quite cumbersome. According to the embodiment of the present application, when the terminal is in the roaming place, it does not need to be based on MCC Waiting for the network switching process greatly speeds up the network access speed and improves the user experience.
根据本申请实施例,解决了在服务器的目标网络参数自身调整或国际漫游时目标网络接入成功率低的问题,极大地提升了用户体验。在国际漫游情况下采用上述各种实施例,终端可以根据识别卡动态地从服务器获取目标网络参数,目标网络参数并不需要事先预置于终端侧与识别卡进行预先绑定,如此,节约了终端侧的存储空间。同时,从服务器获取的目标网络参数始终是最新的参数,因此接入目标网络就不会因网络参数而失败,保证了终端成功接入网络。According to the embodiment of the present application, the problem of low success rate of target network access during the adjustment of the target network parameter of the server itself or international roaming is solved, and the user experience is greatly improved. In the case of international roaming, using the above various embodiments, the terminal can dynamically obtain the target network parameters from the server according to the identification card. The target network parameters do not need to be preset in advance on the terminal side and pre-binding with the identification card, which saves Storage space on the terminal side. At the same time, the target network parameters obtained from the server are always the latest parameters, so access to the target network will not fail due to the network parameters, which ensures that the terminal successfully accesses the network.
本申请实施例还提供了一种终端,用于实现上述网络接入方法,已经进行过说明的内容不再赘述。如以下所使用的,术语“模块”可以实现为预定功能的软件和/或硬件的组合。尽管以下实施例所描述 的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。An embodiment of the present application further provides a terminal for implementing the above network access method, and the content that has been described will not be described in detail. As used below, the term "module" may be implemented as a combination of software and / or hardware with predetermined functions. Although the devices described in the following embodiments are preferably implemented in software, implementation of hardware or a combination of software and hardware is also possible and conceived.
图12是根据本申请实施例的终端的结构框图,根据本申请实施例的终端包括获取单元121和接入单元122。获取单元121用于通过识别卡从服务器获取目标网络参数。接入单元122用于根据所述目标网络参数接入目标网络。识别卡可以为虚拟识别卡或实体识别卡。以虚拟识别卡为例,虚拟识别号码包括但不限于:eSIM、SoftSIM、VSIM、虚拟UICC卡中的至少一种。12 is a structural block diagram of a terminal according to an embodiment of the present application. The terminal according to an embodiment of the present application includes an acquiring unit 121 and an access unit 122. The obtaining unit 121 is used to obtain the target network parameters from the server through the identification card. The access unit 122 is used to access the target network according to the target network parameter. The identification card may be a virtual identification card or a physical identification card. Taking a virtual identification card as an example, the virtual identification number includes but is not limited to at least one of eSIM, SoftSIM, VSIM, and virtual UICC card.
在本申请实施例中,当虚拟识别卡为VSIM卡时,VSIM卡所属的第一运营商可以与目标网络所属的第二运营商为同一运营商。In the embodiment of the present application, when the virtual identification card is a VSIM card, the first operator to which the VSIM card belongs may be the same operator as the second operator to which the target network belongs.
在本申请实施例中,当虚拟识别卡为VSIM卡时,VSIM卡所属的第一运营商可以与目标网络所属的第二运营商为不同运营商。In the embodiment of the present application, when the virtual identification card is a VSIM card, the first operator to which the VSIM card belongs may be a different operator from the second operator to which the target network belongs.
如图13所示,所述终端还可以包括申请单元123,用于向第一运营商网络申请VSIM卡。As shown in FIG. 13, the terminal may further include an application unit 123 for applying for a VSIM card from the first operator network.
在一实施例中,当VSIM卡所属的第一运营商与目标网络所属的第二运营商为不同运营商时,向第一运营商申请的VSIM卡的卡参数至少包含SIM卡标识。In an embodiment, when the first operator to which the VSIM card belongs and the second operator to which the target network belongs are different operators, the card parameters of the VSIM card applied to the first operator at least include the SIM card identifier.
获取单元121进一步用于发送SIM卡标识至目标网络,并接收目标网络的反馈消息。所述反馈消息用于指示所述虚拟SIM卡获得所述目标网络接入授权。The obtaining unit 121 is further used to send the SIM card identification to the target network and receive the feedback message of the target network. The feedback message is used to instruct the virtual SIM card to obtain the target network access authorization.
接入单元122用于根据所述反馈消息和目标网络参数,接入所述目标网络。The access unit 122 is configured to access the target network according to the feedback message and target network parameters.
在一实施例中,获取单元121用于显示识别卡获得授权的目标网络列表,从目标网络列表中选取待接入目标网络,并且从服务器获取待接入目标网络的目标网络参数。In an embodiment, the acquiring unit 121 is used to display a list of target networks authorized by the identification card, select a target network to be accessed from the list of target networks, and acquire target network parameters of the target network to be accessed from the server.
在一实施例中,当VSIM卡所属的第一运营商与目标网络所属的第二运营商为不同运营商时,获取单元121用于获取终端当前的位置信息,从所述位置信息对应的网络覆盖距离范围内的基站获取可接入的目标网络的运营商信息,并且通过VSIM卡从服务器获取与运营商信息对应的目标网络参数。In an embodiment, when the first operator to which the VSIM card belongs and the second operator to which the target network belongs are different operators, the obtaining unit 121 is used to obtain the current location information of the terminal, from the network corresponding to the location information The base station within the coverage distance obtains the operator information of the accessible target network, and obtains the target network parameters corresponding to the operator information from the server through the VSIM card.
在一实施例中,当VSIM卡所属的第一运营商与目标网络所属的第二运营商为同一运营商时,获取单元121用于通过VSIM卡获取第一运营商的VoLTE网络的VoLTE参数。In an embodiment, when the first operator to which the VSIM card belongs and the second operator to which the target network belongs are the same operator, the obtaining unit 121 is configured to obtain the VoLTE parameters of the VoLTE network of the first operator through the VSIM card.
在一实施例中,获取单元121用于向第一运营商网络申请VSIM卡并获取随机数,发送随机数给第一运营商网络,在通过第一运营商网络根据随机数执行的身份校验后,通过虚拟SIM卡获取第一运营商的VoLTE网络的VoLTE参数。In an embodiment, the obtaining unit 121 is used to apply for a VSIM card from the first operator network and obtain a random number, send the random number to the first operator network, and perform identity verification based on the random number through the first operator network After that, the VoLTE parameters of the VoLTE network of the first operator are obtained through the virtual SIM card.
在本申请实施例中,当需要接入的目标网络为VoLTE网络时,从服务器获取的目标网络参数为VoLTE参数;当需要接入的目标网络为VoWiFi网络时,从服务器获取的目标网络参数为WiFi参数;当需要接入的目标网络为5G网络时,从服务器获取的目标网络参数为VoNR参数;当需要接入的目标网络为RCS时,从服务器获取的目标网络参数包含VoLTE参数、WiFi参数、VoNR参数中的至少一种。In the embodiment of the present application, when the target network to be accessed is a VoLTE network, the target network parameter obtained from the server is the VoLTE parameter; when the target network to be accessed is the VoWiFi network, the target network parameter obtained from the server is WiFi parameters; when the target network to be accessed is a 5G network, the target network parameters obtained from the server are VoNR parameters; when the target network to be accessed is RCS, the target network parameters obtained from the server include VoLTE parameters, WiFi parameters , At least one of the VoNR parameters.
需要说明的是,上述实施例提供的终端在进行网络接入时,仅以上述各程序模块的划分进行举例说明,在实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即,将装置的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的终端与网络接入方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that when the terminal provided in the above embodiment performs network access, only the above division of the program modules is used as an example for illustration. In actual applications, the above processing may be allocated by different program modules according to needs. That is, the internal structure of the device is divided into different program modules to complete all or part of the processing described above. In addition, the terminal and the network access method embodiment provided in the foregoing embodiments belong to the same concept. For the specific implementation process, see the method embodiment, and details are not described here.
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序,以实现前述网络接入方法的步骤。计算机可读存储介质可以是FRAM、ROM、PROM、EPROM、EEPROM、Flash Memory、磁表面存储器、光盘、或CD-ROM等存储器;也可以是包括上述存储器之一或任意组合的各种设备。An embodiment of the present application further provides a computer-readable storage medium for storing a computer program to implement the steps of the foregoing network access method. The computer readable storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash, magnetic surface memory, optical disk, or CD-ROM; it may also be various devices including one or any combination of the above memories.
需要说明的是,本申请实施例所记载的技术方案之间,在不冲突的情况下,可以任意组合。It should be noted that the technical solutions described in the embodiments of the present application can be arbitrarily combined without conflict.
下面结合附图对本申请实施例进行详细说明。The embodiments of the present application will be described in detail below with reference to the drawings.
在本实施例中,以VoLTE为例,实现了一种通过VSIM卡动态获取服务器的VoLTE参数,从而自适应接入VoLTE网络的方法。具体地,出厂前终端侧不再预置任何运营商的VoLTE参数,而是在申请VSIM 卡后,通过VSIM卡从服务器下载运营商的VoLTE参数以接入VoLTE网络。In this embodiment, taking VoLTE as an example, a method of dynamically acquiring VoLTE parameters of a server through a VSIM card is implemented, so as to adaptively access a VoLTE network. Specifically, the terminal side no longer presets VoLTE parameters of any operator before leaving the factory, but after applying for a VSIM card, downloads the VoLTE parameters of the operator from the server through the VSIM card to access the VoLTE network.
在一个示例性的实施例中,图14为应用上述实施例方法的终端一个可选的结构示意图。如图14所示,本申请的终端包含检测模块141、申请模块142、下载模块143、存储模块144、配置模块145、查询模块146。检测模块141用于检测本地是否存储了某运营商的有效期内的VSIM卡参数及VoLTE参数。申请模块142用于向服务器申请某运营商的VSIM卡号码及VoLTE参数。下载模块143用于下载服务器提供的VSIM卡参数及运营商的VoLTE参数。存储模块144用于将下载的VSIM卡参数及VoLTE参数保存到本地,并基于信息安全的考虑,采用加密方式保存。配置模块145用于解析保存到本地的VoLTE参数,将其写入终端实际使用的NV或文件中。查询模块146用于查询终端的VoLTE开关是否开启。In an exemplary embodiment, FIG. 14 is a schematic diagram of an optional structure of a terminal applying the method of the foregoing embodiment. As shown in FIG. 14, the terminal of the present application includes a detection module 141, an application module 142, a download module 143, a storage module 144, a configuration module 145, and a query module 146. The detection module 141 is used to detect whether the VSIM card parameters and VoLTE parameters of a certain operator are stored locally within the validity period. The application module 142 is used to apply for the VSIM card number and VoLTE parameters of an operator from the server. The download module 143 is used to download the VSIM card parameters provided by the server and the VoLTE parameters of the operator. The storage module 144 is used to save the downloaded VSIM card parameters and VoLTE parameters locally, and based on the consideration of information security, the encryption mode is used. The configuration module 145 is used to parse and save the local VoLTE parameters and write them into the NV or file actually used by the terminal. The query module 146 is used to query whether the VoLTE switch of the terminal is turned on.
比如,配置模块145读取到的VoLTE参数如下:For example, the VoLTE parameters read by the configuration module 145 are as follows:
AMR_WB=1AMR_WB = 1
IPSec=0IPSec = 0
ViLTE=0ViLTE = 0
则配置模块145解析得知,运营商的VoLTE网络要求终端打开自适应AMR-WB(Adaptive Multi-Rate Wideband,多速率宽带编码)语音编码、关闭IPSec(IP Security,IP安全)鉴权和ViLTE(Video over LTE,基于LTE的视频通话)。于是,配置模块145修改以上功能点对应的NV或文件。The configuration module 145 analyzes and learns that the operator's VoLTE network requires the terminal to turn on adaptive AMR-WB (Adaptive Multi-Rate Wideband, multi-rate wideband coding) voice coding, and turn off IPSec (IP Security, IP security) authentication and ViLTE Video over LTE, LTE-based video calling). Therefore, the configuration module 145 modifies the NV or file corresponding to the above function points.
在一个示例性的实施例中,图15为应用本实施例的基于VSIM卡自适应接入VoLTE网络的流程,该流程包括如下步骤1501至1509。In an exemplary embodiment, FIG. 15 is a procedure for adaptively accessing a VoLTE network based on a VSIM card using this embodiment. The procedure includes the following steps 1501 to 1509.
在步骤1501,终端成功接入LTE网络。In step 1501, the terminal successfully accesses the LTE network.
在步骤1502,通知检测模块141检测本地是否存储了运营商的有效期内的虚拟SIM卡参数及VoLTE参数。In step 1502, the notification detection module 141 detects whether the virtual SIM card parameters and VoLTE parameters of the operator's validity period are stored locally.
这里,如果没有存储有效期内的参数,则继续执行步骤1503;否则,执行步骤1507。Here, if the parameters within the validity period are not stored, step 1503 is continued; otherwise, step 1507 is executed.
在步骤1503,通知申请模块142向服务器申请运营商的VSIM 卡号码及VoLTE参数。In step 1503, the notification application module 142 applies to the server for the operator's VSIM card number and VoLTE parameters.
在步骤1504,通知下载模块143下载服务器提供的VSIM卡参数及运营商的VoLTE参数。In step 1504, the download module 143 is notified to download the VSIM card parameters provided by the server and the VoLTE parameters of the operator.
在步骤1505,通知存储模块144将下载的参数保存到本地。In step 1505, the storage module 144 is notified to save the downloaded parameters locally.
在步骤1506,通知配置模块145解析保存到本地的VoLTE参数,并将其写入终端实际使用的NV或文件中。In step 1506, the notification configuration module 145 parses and saves the local VoLTE parameters and writes them to the NV or file actually used by the terminal.
在步骤1507,通知查询模块146查询终端的VoLTE开关是否开启。In step 1507, the notification query module 146 queries whether the VoLTE switch of the terminal is turned on.
这里,如果开关开启,则继续执行步骤1508;否则,执行步骤1509。Here, if the switch is turned on, step 1508 is continued; otherwise, step 1509 is executed.
在步骤1508,发起VoLTE注册。At step 1508, VoLTE registration is initiated.
在步骤1509,本次会话结束。At step 1509, the session ends.
在本实施例中,检测模块141用于检测本地是否存储了某运营商的有效期内的虚拟SIM卡参数及VoLTE参数。从目前智能终端的发展趋势来看,实体SIM卡的存在,部分程度地限制了移动终端的进化,限制了设备的空间和设计,并增加了设备的工艺难度和制造成本。因此,各大智能终端厂商开始下决心大力推广虚拟SIM技术。In this embodiment, the detection module 141 is used to detect whether the virtual SIM card parameters and VoLTE parameters of a certain operator are stored locally. From the current development trend of smart terminals, the existence of physical SIM cards partially limits the evolution of mobile terminals, limits the space and design of devices, and increases the process difficulty and manufacturing costs of devices. Therefore, the major smart terminal manufacturers began to resolve to vigorously promote the virtual SIM technology.
VoLTE参数指的是终端进行VoLTE业务时需要用到的参数,一般由运营商提供。比如语音编码方式、IPSec加密算法、是否支持ViLTE等。VoLTE parameters refer to the parameters that the terminal needs to use when performing the VoLTE service, and are generally provided by the operator. For example, voice coding method, IPSec encryption algorithm, whether to support ViLTE, etc.
可以看到,此处指的是同一个运营商的VSIM卡参数及VoLTE参数。比如,终端申请中国联通的虚拟SIM卡号码后,从服务器下载该号码的SIM卡参数,及中国联通的VoLTE参数。本申请实施例省去了相关技术中的根据实体SIM卡的PLMN,在软件版本中匹配该运营商的VoLTE参数的过程。It can be seen that this refers to the VSIM card parameters and VoLTE parameters of the same operator. For example, after applying for the virtual SIM card number of China Unicom, the terminal downloads the SIM card parameters of the number and the VoLTE parameters of China Unicom from the server. The embodiment of the present application omits the process of matching VoLTE parameters of the operator in the software version according to the PLMN of the physical SIM card in the related art.
本实施例以VoLTE为例,但实际应用包括但不限定于VoLTE、VoWiFi、RCS、5G业务等运营商相关的参数。In this embodiment, VoLTE is used as an example, but actual applications include, but are not limited to, parameters related to operators such as VoLTE, VoWiFi, RCS, and 5G services.
在一个示例性的实施例中,申请模块142用于向服务器申请VSIM卡参数及VoLTE参数。服务器可以是某个运营商的服务器,也可以是某个购买了多个运营商的号码段的第三方服务器。In an exemplary embodiment, the application module 142 is used to apply for VSIM card parameters and VoLTE parameters to the server. The server may be a server of an operator, or a third-party server that has purchased a number segment of multiple operators.
申请模块142与服务器的交互流程图如图16所示,该流程包括如下步骤1601至1604。The flow chart of the interaction between the application module 142 and the server is shown in FIG. 16, and the process includes the following steps 1601 to 1604.
在步骤1601,终端向服务器申请某运营商的VSIM卡及VoLTE参数。In step 1601, the terminal applies to the server for the VSIM card and VoLTE parameters of an operator.
在步骤1602,终端收到服务器要求“身份验证”的指令。In step 1602, the terminal receives an instruction from the server requesting "identity verification".
在步骤1603,终端向服务器发送终端的设备标识,请求对终端的身份进行验证。In step 1603, the terminal sends the device identification of the terminal to the server, requesting verification of the identity of the terminal.
这里,终端的设备标识用于在下载SIM卡参数及VoLTE参数时进行身份验证,以确定是该终端申请了上述虚拟SIM卡,从而确保与SIM卡所对应的SIM卡参数及VoLTE参数下载的安全性。终端的设备标识也可作为这些SIM卡参数及VoLTE参数的加密因子。Here, the device identification of the terminal is used for identity verification when downloading the SIM card parameters and VoLTE parameters to determine that the terminal has applied for the above-mentioned virtual SIM card, so as to ensure the security of the SIM card parameters and VoLTE parameter download corresponding to the SIM card Sex. The device identification of the terminal can also be used as an encryption factor for these SIM card parameters and VoLTE parameters.
在步骤1604,服务器对终端的身份验证通过后,终端收到服务器返回的“申请成功”的消息,申请得到VSIM卡及VoLTE参数。In step 1604, after the identity verification of the terminal by the server is passed, the terminal receives the "successful application" message returned by the server, and the application obtains the VSIM card and VoLTE parameters.
这里,在申请过程中,下载模块143用于下载服务器提供的虚拟SIM卡参数及VoLTE参数,并在下载完成后向服务器发送“下载完毕消息”。另外,当这些参数加密时,下载完毕后经解密处理后得到VSIM卡参数及VoLTE参数。Here, during the application process, the download module 143 is used to download the virtual SIM card parameters and VoLTE parameters provided by the server, and send a "download complete message" to the server after the download is completed. In addition, when these parameters are encrypted, the VSIM card parameters and VoLTE parameters are obtained after the download is completed and decrypted.
在一个示例性的实施例中,为了安全起见,进一步增加了随机数,申请模块142与服务器的交互流程图,如图17所示。In an exemplary embodiment, for the sake of security, a random number is further added, and a flowchart of the interaction between the application module 142 and the server is shown in FIG. 17.
在步骤1701,终端向服务器申请某运营商的VSIM卡。In step 1701, the terminal applies to the server for the VSIM card of an operator.
在步骤1702,终端收到服务器要求“身份验证”的指令。In step 1702, the terminal receives an instruction from the server requesting "identity verification".
在步骤1703,终端向服务器发送终端的设备标识,请求对终端的身份进行验证。In step 1703, the terminal sends the device identification of the terminal to the server, requesting verification of the identity of the terminal.
在步骤1704,服务器对终端的身份验证通过后,申请得到VSIM卡,及一起发送的随机数。In step 1704, after the identity verification of the terminal by the server is passed, the VSIM card is applied for and the random number sent together.
随机数可以用于在下载SIM卡参数及VoLTE参数时进行身份验证,以确定是拥有该虚拟SIM卡的终端要下载SIM卡参数及VoLTE参数,从而确保与SIM卡所对应的SIM卡参数及VoLTE参数下载的安全性。随机数也可作为这些SIM卡参数及VoLTE参数的加密因子。The random number can be used for identity verification when downloading the SIM card parameters and VoLTE parameters to determine whether it is the terminal that owns the virtual SIM card to download the SIM card parameters and VoLTE parameters, so as to ensure the SIM card parameters and VoLTE corresponding to the SIM card Parameter download security. Random numbers can also be used as encryption factors for these SIM card parameters and VoLTE parameters.
终端收到服务器返回的“申请成功”的消息,申请得到虚拟SIM 卡,以便后续终端可以通过该虚拟SIM卡从服务器下载得到SIM卡参数及VoLTE参数。The terminal receives the "successful application" message returned by the server and applies for a virtual SIM card so that subsequent terminals can download the SIM card parameters and VoLTE parameters from the server through the virtual SIM card.
在一个示例性的实施例中,为了安全起见,进一步增加了随机数,申请模块142、下载模块143与服务器的交互流程如图18所示,该流程包括如下步骤1801至1805。In an exemplary embodiment, for security reasons, a random number is further added. The interaction process between the application module 142, the download module 143 and the server is shown in FIG. 18, and the process includes the following steps 1801 to 1805.
在步骤1801,终端(申请模块142)向服务器请求下载某运营商的VSIM卡参数及VoLTE参数。In step 1801, the terminal (application module 142) requests the server to download the VSIM card parameters and VoLTE parameters of an operator.
在步骤1802,终端(申请模块142)收到服务器要求“身份验证”的指令。In step 1802, the terminal (application module 142) receives an instruction from the server requesting "identity verification".
在步骤1803,终端(申请模块142)向服务器发送终端的设备标识及随机数请求身份验证。In step 1803, the terminal (application module 142) sends the device identification and random number of the terminal to the server to request identity verification.
在本步骤中,也可以只发送随机数。在之前的申请流程中,是在通过终端的设备标识实现终端身份验证通过后才获取到随机数,因此,只发送随机数也是安全的。In this step, only random numbers may be sent. In the previous application process, the random number was obtained only after the terminal identity verification was achieved through the device identification of the terminal, so it is also safe to send only the random number.
终端向服务器发送终端的设备标识及随机数,或者终端仅仅向服务器发送随机数,都是为了在下载SIM卡参数及VoLTE参数时进行身份验证,以确定是该终端申请了上述虚拟SIM卡,从而确保与SIM卡所对应的SIM卡参数及VoLTE参数下载的安全性。The terminal sends the device identification and random number of the terminal to the server, or the terminal only sends the random number to the server, to verify the identity when downloading the SIM card parameters and VoLTE parameters, to determine that the terminal applied for the virtual SIM card, thus Ensure the security of the SIM card parameters and VoLTE parameter download corresponding to the SIM card.
在步骤1804,终端(下载模块143)收到服务器发送的VSIM卡参数及VoLTE参数。In step 1804, the terminal (download module 143) receives the VSIM card parameters and VoLTE parameters sent by the server.
在步骤1805,终端(下载模块143)向服务器发送“下载完毕”的消息。In step 1805, the terminal (download module 143) sends a "download complete" message to the server.
在一个示例性的实施例中,接入网络前的授权判断流程如图19所示,该流程包括如下步骤1901至1904。In an exemplary embodiment, the authorization judgment process before accessing the network is shown in FIG. 19, and the process includes the following steps 1901 to 1904.
在步骤1901,终端向P-CSCF(Proxy-Call Session Control Function,代理呼叫会话控制功能)网元发送VoLTE注册消息。In step 1901, the terminal sends a VoLTE registration message to the P-CSCF (Proxy-Call Session Control Function) network element.
在步骤1902,P-CSCF网元根据SIM卡中的IMSI,向该SIM卡所在的HSS(Home Subscriber Server,归属签约用户服务器)服务器查询是否获得VoLTE授权。In step 1902, the P-CSCF network element queries the HSS (Home Subscriber Server, Home Subscriber Server) server where the SIM card is located according to the IMSI in the SIM card to obtain the VoLTE authorization.
这里存在两种情况:P-CSCF网元和HSS网元归属于同一个运营 商;或者P-CSCF网元和HSS网元不归属于同一个运营商。There are two cases here: P-CSCF network element and HSS network element belong to the same operator; or P-CSCF network element and HSS network element do not belong to the same operator.
IMSI存储在SIM卡中,是SIM卡(包括虚拟SIM卡和实体SIM卡)的唯一标识。The IMSI is stored in the SIM card and is the unique identifier of the SIM card (including the virtual SIM card and the physical SIM card).
P-CSCF是网络侧的网元,终端与SIP服务器的VoLTE信令交互都要经过P-CSCF。HSS也是网络侧的网元,用于存储用户签约信息。The P-CSCF is a network element on the network side, and the VoLTE signaling interaction between the terminal and the SIP server must pass through the P-CSCF. The HSS is also a network element on the network side and is used to store user subscription information.
在步骤1903,HSS网元根据所存储的用户签约信息查询到授权信息后通过指令给P-CSCF网元,从而P-CSCF查询得到该SIM卡已获得VoLTE授权。In step 1903, the HSS network element queries the authorization information according to the stored user subscription information and then instructs the P-CSCF network element through instructions, so that the P-CSCF inquires that the SIM card has obtained the VoLTE authorization.
在步骤1904,终端成功注册到VoLTE网络。In step 1904, the terminal successfully registers with the VoLTE network.
从上面的描述可以看出,采用本实施例的方案,提高了软件版本的通用性,大幅度减少了软件版本的数量,缩短了软件开发、测试周期,降低了成本。解决了网络侧参数调整或国际漫游时业务接入成功率低、互通成功率低的问题,能够解决网络业务一直存在的互联互通、跨国互通等问题,为5G等网络下的新业务的迅速推广提供了帮助,极大地提升了用户体验。还为识别卡业务的发展提供了更多可能。As can be seen from the above description, using the solution of this embodiment improves the versatility of software versions, greatly reduces the number of software versions, shortens the software development and testing cycle, and reduces costs. Solve the problem of low network access parameter adjustment or low service access success rate and low interoperability success rate during network side parameter adjustment or international roaming Provided help and greatly improved the user experience. It also provides more possibilities for the development of identification card business.
另外,运营商可以根据用户类别、终端类别、业务类别等灵活配置不同的网络业务的参数。In addition, operators can flexibly configure different network service parameters according to user categories, terminal categories, and service categories.
尽管为示例目的,已经公开了本申请的实施例,本领域的技术人员将意识到各种改进、增加和取代也是可能的,因此,本申请的范围应当不限于上述实施例。Although the embodiments of the present application have been disclosed for illustrative purposes, those skilled in the art will realize that various improvements, additions, and substitutions are also possible, and therefore, the scope of the present application should not be limited to the above-described embodiments.

Claims (23)

  1. 一种网络接入方法,包括:A network access method, including:
    终端通过识别卡从服务器获取目标网络参数;以及The terminal obtains the target network parameters from the server through the identification card; and
    终端根据所述目标网络参数接入目标网络。The terminal accesses the target network according to the target network parameter.
  2. 根据权利要求1所述的方法,其中,所述识别卡为虚拟识别卡或实体识别卡。The method according to claim 1, wherein the identification card is a virtual identification card or a physical identification card.
  3. 根据权利要求1所述的方法,其中,所述识别卡为虚拟识别卡,并且所述方法还包括:The method according to claim 1, wherein the identification card is a virtual identification card, and the method further comprises:
    所述终端向第一运营商网络申请虚拟识别卡。The terminal applies to the first operator network for a virtual identification card.
  4. 根据权利要求3所述的方法,其中,所述虚拟识别卡为虚拟客户识别模块SIM卡,并且所述虚拟SIM卡所属的第一运营商与所述目标网络所属的第二运营商为同一运营商。The method according to claim 3, wherein the virtual identification card is a virtual customer identification module SIM card, and the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are the same operator Quotient.
  5. 根据权利要求3所述的方法,其中,所述虚拟识别卡为虚拟客户识别模块SIM卡,并且所述虚拟SIM卡所属的第一运营商与所述目标网络所属的第二运营商为不同运营商。The method according to claim 3, wherein the virtual identification card is a virtual customer identification module SIM card, and the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are operated differently Quotient.
  6. 根据权利要求5所述的方法,其中,所述虚拟SIM卡的卡参数至少包括SIM卡标识,并且终端根据所述目标网络参数接入目标网络的步骤包括:The method according to claim 5, wherein the card parameter of the virtual SIM card includes at least a SIM card identification, and the step of the terminal accessing the target network according to the target network parameter includes:
    所述终端发送所述SIM卡标识至所述目标网络,并从所述目标网络接收反馈消息,所述反馈消息用于指示所述虚拟SIM卡获得所述目标网络接入授权;以及The terminal sends the SIM card identification to the target network and receives a feedback message from the target network, the feedback message is used to instruct the virtual SIM card to obtain the target network access authorization; and
    所述终端根据所述反馈消息和所述目标网络参数接入所述目标网络。The terminal accesses the target network according to the feedback message and the target network parameter.
  7. 根据权利要求1或5所述的方法,其中,终端通过识别卡从服务器获取目标网络参数的步骤包括:The method according to claim 1 or 5, wherein the step of the terminal acquiring the target network parameters from the server through the identification card includes:
    显示所述识别卡获得授权的目标网络列表;Display a list of target networks authorized by the identification card;
    从所述目标网络列表中选取待接入目标网络;以及Selecting a target network to be accessed from the target network list; and
    从服务器获取所述待接入目标网络的目标网络参数。Obtain the target network parameters of the target network to be accessed from the server.
  8. 根据权利要求5所述的方法,其中,终端通过识别卡从服务器获取目标网络参数的步骤包括:The method according to claim 5, wherein the step of the terminal acquiring the target network parameters from the server through the identification card includes:
    获取所述终端当前的位置信息;Obtain the current location information of the terminal;
    从所述位置信息对应的网络覆盖距离范围内的基站获取可接入的目标网络的运营商信息;以及Acquiring operator information of an accessible target network from a base station within a network coverage distance corresponding to the location information; and
    通过所述虚拟SIM卡从所述服务器获取与所述运营商信息对应的目标网络参数。Obtain the target network parameter corresponding to the operator information from the server through the virtual SIM card.
  9. 根据权利要求4所述的方法,其中,The method according to claim 4, wherein
    所述目标网络为基于LTE的语音VoLTE网络,并且所述目标网络参数为VoLTE参数;或者The target network is an LTE-based voice VoLTE network, and the target network parameters are VoLTE parameters; or
    所述目标网络为基于WiFi的语音VoWiFi网络,并且所述目标网络参数为WiFi参数;或者The target network is a WiFi VoWiFi network based on WiFi, and the target network parameters are WiFi parameters; or
    所述目标网络为5G网络,所述目标网络参数为VoNR参数;或者The target network is a 5G network, and the target network parameters are VoNR parameters; or
    所述目标网络为融合通信RCS网络,并且所述目标网络参数包括VoLTE参数、WiFi参数、VoNR参数中的至少一种。The target network is a converged communication RCS network, and the target network parameters include at least one of VoLTE parameters, WiFi parameters, and VoNR parameters.
  10. 根据权利要求9所述的方法,其中,所述目标网络为基于LTE的VoLTE网络,并且所述目标网络参数为VoLTE参数,并且终端通过识别卡从服务器获取目标网络参数的步骤包括:The method according to claim 9, wherein the target network is a LTE-based VoLTE network, and the target network parameter is a VoLTE parameter, and the step of the terminal acquiring the target network parameter from the server through the identification card includes:
    所述终端向所述第一运营商网络申请所述虚拟SIM卡;以及The terminal applies to the first operator network for the virtual SIM card; and
    所述终端通过所述虚拟SIM卡获取所述第一运营商的VoLTE网络的VoLTE参数。The terminal obtains the VoLTE parameters of the VoLTE network of the first operator through the virtual SIM card.
  11. 根据权利要求1所述的方法,还包括:The method of claim 1, further comprising:
    所述终端向第一运营商网络申请虚拟SIM卡,并获取随机数,并且The terminal applies for a virtual SIM card from the first operator network and obtains a random number, and
    终端通过识别卡从服务器获取目标网络参数的步骤包括:The steps for the terminal to obtain the target network parameters from the server through the identification card include:
    所述终端发送所述随机数给所述第一运营商网络;以及The terminal sends the random number to the first operator network; and
    在通过所述第一运营商网络根据所述随机数执行的身份校验后,所述终端通过所述虚拟SIM卡获取所述第一运营商的VoLTE网络的VoLTE参数。After the identity verification performed by the first operator network according to the random number, the terminal obtains the VoLTE parameters of the VoLTE network of the first operator through the virtual SIM card.
  12. 一种终端,包括:A terminal, including:
    获取单元,用于通过识别卡从服务器获取目标网络参数;以及An acquisition unit for acquiring target network parameters from the server through the identification card; and
    接入单元,用于根据所述目标网络参数接入目标网络。The access unit is configured to access the target network according to the target network parameter.
  13. 根据权利要求12所述的终端,其中,所述识别卡为虚拟识别卡或实体识别卡。The terminal according to claim 12, wherein the identification card is a virtual identification card or a physical identification card.
  14. 根据权利要求12所述的终端,其中,所述识别卡为虚拟识别卡,并且所述终端还包括:The terminal according to claim 12, wherein the identification card is a virtual identification card, and the terminal further comprises:
    申请单元,用于向第一运营商网络申请虚拟识别卡。The application unit is used to apply for a virtual identification card from the first operator network.
  15. 根据权利要求14所述的终端,其中,所述虚拟识别卡为虚拟客户识别模块SIM卡,并且所述虚拟SIM卡所属的第一运营商与所述目标网络所属的第二运营商为同一运营商。The terminal according to claim 14, wherein the virtual identification card is a virtual customer identification module SIM card, and the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are the same operator Quotient.
  16. 根据权利要求14所述的终端,其中,所述虚拟识别卡为虚拟客户识别模块SIM卡,并且所述虚拟SIM卡所属的第一运营商与所述目标网络所属的第二运营商为不同运营商。The terminal according to claim 14, wherein the virtual identification card is a virtual customer identification module SIM card, and the first operator to which the virtual SIM card belongs and the second operator to which the target network belongs are different operations Quotient.
  17. 根据权利要求16所述的终端,其中,所述虚拟SIM卡的卡 参数至少包括SIM卡标识,并且所述接入单元用于:The terminal according to claim 16, wherein the card parameter of the virtual SIM card includes at least a SIM card identification, and the access unit is configured to:
    发送所述SIM卡标识至所述目标网络,并从所述目标网络接收反馈消息,所述反馈消息用于指示所述虚拟SIM卡获得所述目标网络接入授权;以及Sending the SIM card identifier to the target network, and receiving a feedback message from the target network, the feedback message used to instruct the virtual SIM card to obtain the target network access authorization; and
    根据所述反馈消息和所述目标网络参数接入所述目标网络。Access the target network according to the feedback message and the target network parameters.
  18. 根据权利要求12或16所述的终端,其中,所述获取单元用于:The terminal according to claim 12 or 16, wherein the acquisition unit is configured to:
    显示所述识别卡获得授权的目标网络列表;Display a list of target networks authorized by the identification card;
    从所述目标网络列表中选取待接入目标网络;以及Selecting a target network to be accessed from the target network list; and
    从服务器获取所述待接入目标网络的目标网络参数。Obtain the target network parameters of the target network to be accessed from the server.
  19. 根据权利要求16所述的终端,其中,所述获取单元用于:The terminal according to claim 16, wherein the acquisition unit is configured to:
    获取所述终端当前的位置信息;Obtain the current location information of the terminal;
    从所述位置信息对应的网络覆盖距离范围内的基站获取可接入的目标网络的运营商信息;以及Acquiring operator information of an accessible target network from a base station within a network coverage distance corresponding to the location information; and
    通过所述虚拟SIM卡从所述服务器获取与所述运营商信息对应的目标网络参数。Obtain the target network parameter corresponding to the operator information from the server through the virtual SIM card.
  20. 根据权利要求15所述的终端,其中,The terminal according to claim 15, wherein,
    所述目标网络为基于LTE的语音VoLTE网络,并且所述目标网络参数为VoLTE参数;或者The target network is an LTE-based voice VoLTE network, and the target network parameters are VoLTE parameters; or
    所述目标网络为基于WiFi的语音VoWiFi网络,并且所述目标网络参数为WiFi参数;或者The target network is a WiFi VoWiFi network based on WiFi, and the target network parameters are WiFi parameters; or
    所述目标网络为5G网络,所述目标网络参数为VoNR参数;或者The target network is a 5G network, and the target network parameters are VoNR parameters; or
    所述目标网络为融合通信RCS网络,并且所述目标网络参数包括VoLTE参数、WiFi参数、VoNR参数中的至少一种。The target network is a converged communication RCS network, and the target network parameters include at least one of VoLTE parameters, WiFi parameters, and VoNR parameters.
  21. 根据权利要求20所述的终端,其中,所述目标网络为基于 LTE的VoLTE网络,并且所述目标网络参数为VoLTE参数,并且所述获取单元用于:The terminal according to claim 20, wherein the target network is a LTE-based VoLTE network, and the target network parameter is a VoLTE parameter, and the acquisition unit is used to:
    向所述第一运营商网络申请所述虚拟SIM卡;以及Apply for the virtual SIM card from the first operator network; and
    通过所述虚拟SIM卡获取所述第一运营商的VoLTE网络的VoLTE参数。Obtaining the VoLTE parameters of the VoLTE network of the first operator through the virtual SIM card.
  22. 一种终端,包括:A terminal, including:
    存储有计算机程序的存储器;以及Memory in which computer programs are stored; and
    处理器,用于执行所述计算机程序,以实现权利要求1至11任一项所述的方法。A processor, configured to execute the computer program to implement the method according to any one of claims 1 to 11.
  23. 一种计算机存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时,所述处理器实现权利要求1至11任一项所述的方法。A computer storage medium on which a computer program is stored, and when the computer program is executed by a processor, the processor implements the method of any one of claims 1 to 11.
PCT/CN2019/111684 2018-10-17 2019-10-17 Network access method, terminal, and computer storage medium WO2020078425A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811210797.2A CN109246700A (en) 2018-10-17 2018-10-17 A kind of method for network access, terminal and computer storage medium
CN201811210797.2 2018-10-17

Publications (1)

Publication Number Publication Date
WO2020078425A1 true WO2020078425A1 (en) 2020-04-23

Family

ID=65053817

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/111684 WO2020078425A1 (en) 2018-10-17 2019-10-17 Network access method, terminal, and computer storage medium

Country Status (2)

Country Link
CN (1) CN109246700A (en)
WO (1) WO2020078425A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654824A (en) * 2020-05-29 2020-09-11 Oppo广东移动通信有限公司 Network condition prompting method and device, electronic equipment and storage medium
CN112312514A (en) * 2020-11-23 2021-02-02 惠州Tcl移动通信有限公司 Method, device and equipment for accessing network and computer readable storage medium
CN112492575A (en) * 2020-11-19 2021-03-12 惠州Tcl移动通信有限公司 Execution path setting method and device, storage medium and mobile terminal
CN113556790A (en) * 2020-04-24 2021-10-26 深圳市万普拉斯科技有限公司 Network type switching method and device, computer equipment and storage medium
CN115086207A (en) * 2022-06-14 2022-09-20 深信服科技股份有限公司 Network card detection method and device, electronic equipment and storage medium
CN115190467A (en) * 2022-06-28 2022-10-14 盖泰柯通信系统(上海)有限公司 Method, system, electronic device and storage medium for universal call in mobile private network

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246700A (en) * 2018-10-17 2019-01-18 中兴通讯股份有限公司 A kind of method for network access, terminal and computer storage medium
CN109769245A (en) * 2019-02-27 2019-05-17 努比亚技术有限公司 A kind of mobile terminal radio frequency compatibility method, mobile terminal and computer readable storage medium
CN111787552B (en) * 2019-04-04 2023-09-22 安克创新科技股份有限公司 Control method and device for network operation
CN110149677B (en) * 2019-06-10 2021-03-02 深圳市福日中诺电子科技有限公司 Method for selecting VoWiFi network access by terminal and mobile terminal
CN111818518B (en) * 2020-06-29 2023-12-26 珠海市小源科技有限公司 5G message receiving method and device based on application software and storage medium
CN112866975B (en) * 2020-12-29 2022-11-18 恒宝股份有限公司 Cross-border roaming code number control method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103415017A (en) * 2013-08-23 2013-11-27 深圳市中兴物联科技有限公司 Method, device and mobile terminal of virtual SIM card
CN103581889A (en) * 2012-07-31 2014-02-12 鸿富锦精密工业(深圳)有限公司 Method and system for automatically updating network configuration parameters
CN106162606A (en) * 2016-07-26 2016-11-23 努比亚技术有限公司 A kind of method for switching network and mobile terminal
CN107172588A (en) * 2017-06-14 2017-09-15 广东艾檬电子科技有限公司 A kind of WiFi network recommends method and device
CN107241783A (en) * 2017-06-23 2017-10-10 努比亚技术有限公司 A kind of method and terminal for searching for network
CN107995613A (en) * 2016-10-26 2018-05-04 中兴通讯股份有限公司 A kind of method, mobile terminal and server for obtaining virtual SIM card
CN109246700A (en) * 2018-10-17 2019-01-18 中兴通讯股份有限公司 A kind of method for network access, terminal and computer storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW522685B (en) * 2001-07-31 2003-03-01 Inventec Appliances Corp Method for implementing automatic network configuration setup in portable electronics communication equipment
CN1330207C (en) * 2005-07-29 2007-08-01 华为技术有限公司 Parameter allocating system and method for mobile station
JP4392035B2 (en) * 2007-06-20 2009-12-24 ソフトバンクモバイル株式会社 Mobile communication terminal
CN101222711B (en) * 2008-02-02 2010-11-10 代邦(江西)制卡有限公司 Mobile communication network system supporting virtual SIM card and authentication method thereof
CN104640096A (en) * 2015-02-05 2015-05-20 西安酷派软件科技有限公司 Data transmission method and device as well as terminal
CN106488435A (en) * 2015-08-31 2017-03-08 中兴通讯股份有限公司 A kind of client identification module approaches to IM and mobile terminal
CN107182046B (en) * 2017-05-25 2019-12-27 深圳市万普拉斯科技有限公司 Network configuration method, device, user terminal and readable storage medium
CN107682850A (en) * 2017-10-18 2018-02-09 影响力技术有限公司 A kind of soft SIM card selection, acquisition methods and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581889A (en) * 2012-07-31 2014-02-12 鸿富锦精密工业(深圳)有限公司 Method and system for automatically updating network configuration parameters
CN103415017A (en) * 2013-08-23 2013-11-27 深圳市中兴物联科技有限公司 Method, device and mobile terminal of virtual SIM card
CN106162606A (en) * 2016-07-26 2016-11-23 努比亚技术有限公司 A kind of method for switching network and mobile terminal
CN107995613A (en) * 2016-10-26 2018-05-04 中兴通讯股份有限公司 A kind of method, mobile terminal and server for obtaining virtual SIM card
CN107172588A (en) * 2017-06-14 2017-09-15 广东艾檬电子科技有限公司 A kind of WiFi network recommends method and device
CN107241783A (en) * 2017-06-23 2017-10-10 努比亚技术有限公司 A kind of method and terminal for searching for network
CN109246700A (en) * 2018-10-17 2019-01-18 中兴通讯股份有限公司 A kind of method for network access, terminal and computer storage medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556790A (en) * 2020-04-24 2021-10-26 深圳市万普拉斯科技有限公司 Network type switching method and device, computer equipment and storage medium
CN111654824A (en) * 2020-05-29 2020-09-11 Oppo广东移动通信有限公司 Network condition prompting method and device, electronic equipment and storage medium
CN111654824B (en) * 2020-05-29 2023-07-25 Oppo广东移动通信有限公司 Network condition prompting method, device, electronic equipment and storage medium
CN112492575A (en) * 2020-11-19 2021-03-12 惠州Tcl移动通信有限公司 Execution path setting method and device, storage medium and mobile terminal
CN112492575B (en) * 2020-11-19 2023-05-23 惠州Tcl移动通信有限公司 Execution path setting method and device, storage medium and mobile terminal
CN112312514A (en) * 2020-11-23 2021-02-02 惠州Tcl移动通信有限公司 Method, device and equipment for accessing network and computer readable storage medium
CN112312514B (en) * 2020-11-23 2023-06-20 惠州Tcl移动通信有限公司 Method, device, equipment and computer readable storage medium for accessing network
CN115086207A (en) * 2022-06-14 2022-09-20 深信服科技股份有限公司 Network card detection method and device, electronic equipment and storage medium
CN115190467A (en) * 2022-06-28 2022-10-14 盖泰柯通信系统(上海)有限公司 Method, system, electronic device and storage medium for universal call in mobile private network
CN115190467B (en) * 2022-06-28 2023-09-01 盖泰柯通信系统(上海)有限公司 Method, system, electronic equipment and storage medium for universal call in mobile private network

Also Published As

Publication number Publication date
CN109246700A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
WO2020078425A1 (en) Network access method, terminal, and computer storage medium
US10187784B1 (en) Systems and methods for transferring SIM profiles between eUICC devices
US11039298B2 (en) Method and apparatus for remotely providing profile in communication system
US8417234B2 (en) Method and apparatus for tracking the programming of a mobile device with multiple service accounts
US8503983B2 (en) Management of CDMA credentials on a smart card
US8417231B2 (en) Method and apparatus for programming a mobile device with multiple service accounts
US9831903B1 (en) Update of a trusted name list
US11282056B2 (en) Method, servers and system for downloading an updated profile
US20080293411A1 (en) Method and apparatus for managing obfuscated mobile device user identities
US20080293378A1 (en) Mobile device with an obfuscated mobile device user identity
US9825916B2 (en) Method and apparatus for accessing a foreign network with an obfuscated mobile device user identity
EP3837868A1 (en) Handling of subscription profiles for a set of wireless devices
US10291613B1 (en) Mobile device authentication
US20200008052A1 (en) Attachment of a wireless device to a mobile network operator
US20220022014A1 (en) Imei binding and dynamic imei provisioning for wireless devices
US11678158B2 (en) Privacy-enhanced method for linking an eSIM profile
US20230300596A1 (en) Remote subscription profile download
US10251122B2 (en) Method for switching from a first to a second mobile network operator and corresponding device
US20210120411A1 (en) Method for obtaining a profile for access to a telecommunications network
WO2021238989A1 (en) Over-the-air method and related device
GB2594930A (en) Authentication of devices to third party services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19873032

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27.08.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19873032

Country of ref document: EP

Kind code of ref document: A1