WO2022022054A1 - 网络通信方法、装置、计算机设备和存储介质 - Google Patents

网络通信方法、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2022022054A1
WO2022022054A1 PCT/CN2021/097704 CN2021097704W WO2022022054A1 WO 2022022054 A1 WO2022022054 A1 WO 2022022054A1 CN 2021097704 W CN2021097704 W CN 2021097704W WO 2022022054 A1 WO2022022054 A1 WO 2022022054A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification card
shared
target
information
card information
Prior art date
Application number
PCT/CN2021/097704
Other languages
English (en)
French (fr)
Inventor
王重朕
Original Assignee
深圳市广和通无线股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市广和通无线股份有限公司 filed Critical 深圳市广和通无线股份有限公司
Publication of WO2022022054A1 publication Critical patent/WO2022022054A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Definitions

  • the present application relates to a network communication method, apparatus, computer equipment and storage medium.
  • a first aspect of the present application provides a network communication method, executed by a target terminal, the method includes: sending a shared identification card information acquisition request to a shared server, where the shared identification card information acquisition request carries target requirements information; receive the first shared identification card information corresponding to the target demand information returned by the shared server in response to the shared identification card information acquisition request, where the first shared identification card information is the shared entity corresponding to the shared terminal
  • the first shared identification card information is configured into the target virtual identification card of the target terminal, so that the target virtual identification card can access the target network through the first shared identification card information , and use the target network for network communication.
  • a second aspect of the present application provides a network communication device, the device comprising: a shared identification card information acquisition request sending module, configured to send a shared identification card information acquisition request to a shared server, the shared identification card
  • the information acquisition request carries target demand information
  • the first shared identification card information receiving module is configured to receive the first shared identification card information corresponding to the target demand information returned by the shared server in response to the shared identification card information acquisition request , the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal
  • the first shared identification card information configuration module is used to configure the first shared identification card information to the target terminal. in the target virtual identification card, so that the target virtual identification card accesses the target network through the first shared identification card information, and uses the target network for network communication.
  • a third aspect of the present application provides a computer device, comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the following steps when executing the computer program: sending a shared server to a shared server an identification card information acquisition request, the shared identification card information acquisition request carrying target demand information; receiving the first shared identification card information corresponding to the target demand information returned by the shared server in response to the shared identification card information acquisition request , the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal; configure the first shared identification card information into the target virtual identification card of the target terminal, so that the The target virtual identification card accesses the target network through the first shared identification card information, and uses the target network for network communication.
  • a fourth aspect of the present application provides a computer-readable storage medium on which a computer program is stored, the computer program implementing the following steps when executed by a processor: sending a shared identification card information acquisition request to a shared server , the shared identification card information acquisition request carries target demand information; the first shared identification card information corresponding to the target demand information returned by the shared server in response to the shared identification card information acquisition request, the first shared identification card information
  • the shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal; the first shared identification card information is configured into the target virtual identification card of the target terminal, so that the target virtual identification card passes through
  • the first shared identification card information accesses the target network, and uses the target network for network communication.
  • a fifth aspect of the present application provides a network communication method, executed by a shared server, the method includes: receiving a shared identification card information acquisition request sent by a target terminal, the shared identification card information acquisition request carrying the target Demand information; in response to the shared identification card information acquisition request, acquire first shared identification card information corresponding to the target demand information, and return the first shared identification card information corresponding to the target demand information to the target terminal, so that the target terminal configures the first shared identification card information into the target virtual identification card of the target terminal, and enables the target virtual identification card to access the target network through the first shared identification card information,
  • the target network is used for network communication, and the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal.
  • a sixth aspect of the present application provides a network communication device, the device comprising: a shared identification card information acquisition request receiving module, configured to receive a shared identification card information acquisition request sent by a target terminal, the shared identification card The card information acquisition request carries target demand information; the first shared identification card information return module is configured to, in response to the shared identification card information acquisition request, acquire the first shared identification card information corresponding to the target demand information, and send the target The first shared identification card information corresponding to the demand information is returned to the target terminal, so that the target terminal configures the first shared identification card information into the target virtual identification card of the target terminal, and makes the target terminal The virtual identification card accesses the target network through the first shared identification card information, and the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal, and uses the target network for network communication.
  • a seventh aspect of the present application provides a computer device, including a memory and a processor, wherein the memory stores a computer program, and the processor implements the following steps when executing the computer program: receiving a data sent by a target terminal.
  • a shared identification card information acquisition request carrying target demand information; in response to the shared identification card information acquisition request, the first shared identification card information corresponding to the target demand information is acquired, and the target The first shared identification card information corresponding to the demand information is returned to the target terminal, so that the target terminal configures the first shared identification card information into the target virtual identification card of the target terminal, and makes the target terminal
  • the virtual identification card accesses the target network through the first shared identification card information, and the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal, and uses the target network for network communication.
  • an eighth aspect of the present application provides a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the following steps are implemented: receiving a shared identification card information sent by a target terminal and acquiring request, the shared identification card information acquisition request carries target demand information; in response to the shared identification card information acquisition request, obtain the first shared identification card information corresponding to the target demand information, and the first shared identification card information corresponding to the target demand information A shared identification card information is returned to the target terminal, so that the target terminal configures the first shared identification card information into the target virtual identification card of the target terminal, and causes the target virtual identification card to pass through the target virtual identification card.
  • the first shared identification card information is accessed to the target network, and the target network is used for network communication, and the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal.
  • 1 is an application environment diagram of a network communication method in some embodiments
  • FIG. 2 is a schematic flowchart of a network communication method in some embodiments
  • 3 is a schematic flowchart of steps of deleting and configuring shared identification card information in some embodiments
  • 4A is a schematic flowchart of a network communication method in some embodiments.
  • 4B is a schematic flowchart of steps of sharing identification card information in some embodiments.
  • 4C is a schematic flowchart of steps for obtaining shared identification card information in some embodiments.
  • FIG. 5 is a structural block diagram of a network communication device in some embodiments.
  • FIG. 6 is a structural block diagram of a network communication device in some embodiments.
  • Figure 7 is a diagram of the internal structure of a computer device in some embodiments
  • Figure 8 is a diagram of the internal structure of a computer device in some embodiments.
  • the network communication method provided by this application can be applied to the application environment shown in FIG. 1 .
  • the application environment includes a target terminal 102 , a shared server 104 and a shared terminal 106 .
  • the target terminal 102 includes a target communication module, the target communication module includes a target virtual identification card and a target entity identification card, the shared terminal 106 includes a shared communication module, and the shared communication module includes a shared entity identification card and a shared virtual identification card.
  • the target terminal 102 communicates with the sharing server 104 through the network, and the sharing server 104 communicates with the sharing terminal 106 through the network.
  • the target terminal 102 may send a shared identification card information acquisition request to the sharing server 106, and the shared identification card information acquisition request may carry target demand information; the sharing server 104 may respond to the shared identification card information acquisition request to the target
  • the terminal 102 returns the first shared identification card information corresponding to the target demand information, and the first shared identification card information may be extracted from the shared entity identification card corresponding to the shared terminal 106, that is, the user identification card of the shared terminal 106 (SIM, Subscriber Identity Module) to meet the target demand information, the shared terminal 106 can temporarily store the extracted first shared identification card information in the shared virtual identification card, and then send it to the shared server 106; the target terminal 102 can receive the Share the first shared identification card information corresponding to the target demand information returned by the server 104, and configure the first shared identification card information into the target virtual identification card of the target terminal 102, so that the target virtual identification card Access a target network through the first shared identification card information, and use the target network for network communication.
  • SIM Subscriber Identity Module
  • the target terminal 102 may also extract the information of the target entity identification card, and send the information of the target entity identification card to the sharing server 104 for sharing. Both the sharing terminal and the target terminal can share the information of the user identification card of the local end, and can also obtain the information of the user identification card shared by other terminals.
  • the target terminal 102 and the shared terminal 106 can be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the shared server 104 can be an independent server or a server cluster composed of multiple servers. to realise.
  • a network communication method is provided, and the method is applied to the target terminal 102 in FIG. 1 as an example for description, including the following steps:
  • S202 Send a shared identification card information acquisition request to the shared server, where the shared identification card information acquisition request carries target demand information.
  • the identification card refers to a user identification card, that is, a SIM card
  • the user identification card may include a physical identification card and a virtual identification card.
  • the entity identification card is the entity user identification card
  • the virtual identification card is the virtual user identification card.
  • the virtual identification card may be simulated by software, and the data corresponding to the virtual identification card may be stored in a preset storage area in the communication module.
  • the communication module may be a baseband processor (Modem).
  • a physical SIM card is an IC card (Integrated Circuit Card, integrated circuit card) held by a mobile user of the GSM (Global System for Mobile Communications, Global System for Mobile Communications) system, which can be inserted into or pulled out of a terminal.
  • GSM Global System for Mobile Communications, Global System for Mobile Communications
  • the virtual SIM card is an application technology that directly encrypts and stores the file parameters in the traditional SIM card in the terminal, and is completely based on software. It can be realized by the security hardware and software on the communication module (eg baseband processor). Compared with the physical SIM card, the virtual SIM card has the characteristics that the card information can be copied, removed and transferred.
  • Virtual SIM cards include, but are not limited to, VSIM (Virtual Subscriber Identification Module) and SoftSIM (Soft Subscriber Identification Module).
  • the identification card information refers to the information of the user identification card, and the identification card information corresponding to the entity identification card may include at least one of user information, authentication information or network information.
  • User information may include phone numbers.
  • the authentication information may include at least one of an IMSI (International Mobile Subscriber Identification Number), an authentication key, an authentication or an encryption algorithm.
  • the network information may include at least one of Location Area Identity (LAI, Location Area Identity), Temporary Mobile Subscriber Identity (Temporary Mobile Subscriber Identity), or a public telephone network code that is prohibited from being accessed.
  • the identification card information corresponding to the virtual identification card is obtained from the card information of the physical identification card. For example, the identification card information corresponding to the virtual identification card may be obtained by encrypting the identification card information of the physical identification card.
  • the identification card corresponding to the virtual identification card The information may include encrypted user information, encrypted authentication information, and encrypted network information.
  • the shared identification card information refers to the identification card information corresponding to the shared virtual identification card, and the identification card information corresponding to the shared virtual identification card may be obtained according to the identification card information corresponding to the shared entity identification card.
  • Shared entity identification cards refer to physical identification cards that share identification card information
  • shared virtual identification cards refer to virtual identification cards that share identification card information.
  • “sharing” is used to indicate that the identification card information is provided to the shared server, so that other terminals can obtain the identification card information from the shared server, and use the identification card information for mobile communication.
  • the shared identification card information acquisition request refers to a request for acquiring shared identification card information.
  • the target demand information may include at least one of target area information or target time information.
  • the target area information refers to the information of the area to which the requested shared identification card information belongs.
  • the target area information may include at least one of country information, geographic location information, latitude and longitude information, or city identification information.
  • the target time information refers to the time information corresponding to the time period in which the target terminal requests to use the shared identification card information.
  • the target time information may include at least one of a target duration, a target start time point, or a target end time point.
  • the target terminal may send a shared identification card information acquisition request to the shared service system in the shared server through the installed shared service client.
  • Shared service system refers to a system that provides shared identification card information services.
  • the shared server may be the server where the shared service system is located.
  • the shared service client is a terminal application program corresponding to the shared service system, that is, an application program suitable for a terminal.
  • the target terminal and the shared terminal may be respectively installed with a shared service client.
  • the target terminal and the sharing terminal can communicate with the sharing service system on the sharing server through the sharing service client, so that the sharing of the user identification card can be realized.
  • the user of the target terminal and the user of the shared terminal can perform real-name authentication on the shared service client. After passing the real-name authentication, they can be eligible to use the shared identification card information service.
  • Shared service systems can also be referred to as shared platforms.
  • the shared identity card information service may be referred to as a virtual SIM card service.
  • the shared service client may provide a shared service interface
  • the target terminal may obtain the shared identification card information acquisition instruction through the shared service interface
  • the terminal may send the shared identification card information to the shared server according to the shared identification information acquisition instruction. Get request.
  • the target terminal may verify the target user's eligibility for the shared service, and when it is determined that the verification is passed, send a request for obtaining the shared identification card information to the sharing server.
  • the target user refers to the user of the target terminal.
  • Shared service eligibility verification may include verifying whether the user has signed a shared service related agreement.
  • Shared service related agreements may include shared user related agreements or shared user related agreements.
  • a shared user-related agreement refers to an agreement signed by a shared user who shares identification card information, and the shared user may be, for example, a user corresponding to the shared terminal in FIG. 1 .
  • the agreement related to the shared user refers to an agreement signed by the shared user who uses the identification card information shared by others, such as the target terminal in FIG. 1 .
  • the content of the agreement related to the sharing user may include: the sharing user prohibits the sharing user from taking out the shared entity identification card from the sharing terminal and inserting it into other terminals for use, or, the sharing user guarantees that the shared identification card information is not illegally used at least in one of the cases.
  • the content of the agreement related to the shared user may include: the shared user is prohibited from using the shared identification card information to carry out illegal activities, and the like.
  • S204 Receive the first shared identification card information corresponding to the target demand information returned by the shared server in response to the shared identification card information acquisition request, where the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal.
  • the first shared identification card information may be obtained according to the information of the shared entity identification card in the shared terminal, for example, the first shared identification card information may be obtained by encrypting the information of the shared entity identification card. Because the shared identification card information may be stolen in the process of sending it to the shared server, and when the shared identification card information is encrypted information, even if the shared identification card information is stolen, the thief cannot obtain the unencrypted shared identification card information. Thus, the shared identification card information is prevented from being stolen.
  • a set of candidate shared identification card information may be stored in the shared server, and the set of candidate shared identification information may include shared identification card information respectively corresponding to a plurality of area information.
  • Each shared identification card information in the candidate shared identification card information set may correspond to shared description information, the shared description information may include at least one of shared time information or shared area information corresponding to the shared identification card information, and the shared time information may include shared identification information. At least one of duration, sharing start time point or sharing end time point.
  • the shared area information refers to the information of the area corresponding to the shared identification card information. For example, if the shared identification card information is the information of the user identification card of the area A, the shared area information is the area information of the area A.
  • the shared identification card information can be used by the terminal (for example, the target terminal in FIG. 1 ) that needs to share the identification card information.
  • the sharing server may compare the target requirement information with the shared description information of the candidate shared identification card information, and when the shared description information meets the target requirement information, take the candidate shared identification card information that meets the requirement information as the target requirement
  • the shared description information conforms to the target requirement information may include at least one of the shared time information conforming to the target time information or the shared area information conforming to the target area information.
  • the shared time information conforming to the target time information may include at least one of the shared time information being consistent with the target time information or the time period corresponding to the shared time information including the time period corresponding to the target time information.
  • the information of the target user corresponding to the target terminal may be carried in the request for obtaining the shared identification card information, and the sharing server may determine whether the target terminal is qualified to obtain the shared identification card information according to the information of the target user, for example, according to the information of the target user. information, look up the relevant historical information of the target user, determine whether it is eligible to obtain the shared identification card information according to the historical information, and when it is determined that the target terminal is eligible to obtain the shared identification card information, obtain and return the first shared identification card information corresponding to the target demand information .
  • S206 configure the first shared identification card information into the target virtual identification card of the target terminal, so that the target virtual identification card accesses the target network through the first shared identification card information, and uses the target network for network communication.
  • the target virtual identification card is a virtual identification card included in the target terminal.
  • the target network refers to the operator network corresponding to the subscriber identity card to which the first shared identity card information belongs.
  • the shared service client installed in the target terminal may write the first shared identification card information into the target virtual identification card in the target communication module.
  • the target terminal can use the information of the first shared identification card to perform network injection, access the target network after successful network injection, and access the mobile network through the target virtual identification card in the target communication module of the successful network injection.
  • a shared identification card information acquisition request is sent to a shared server, the shared identification card information acquisition request carries target demand information, and the shared identification card information acquisition request is received by the shared server in response to the shared identification card information acquisition request.
  • Identification card information, the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal, and the first shared identification card information is configured in the target virtual identification card of the target terminal, so that the target virtual identification card passes through
  • the first shared identification card information is connected to the target network, and the target network is used for network communication, which realizes communication using the network communication service corresponding to the shared identification card information, and improves the efficiency of network communication.
  • the network communication method proposed in this application shares the virtual SIM card information through software, so that other users can use the shared SIM card information for communication when they are in the service area corresponding to the shared virtual SIM card information. It provides convenience for users to use the mobile communication network in different places, improves the network communication efficiency of users in different places, and reduces the cost of using the mobile communication network in different places.
  • the target terminal includes a target entity identification card
  • the shared identification card information acquisition request also carries target user information
  • the step of receiving the first shared identification card information corresponding to the target demand information returned by the sharing server further includes: reading Take the target identification card information corresponding to the target entity identification card, and send the target identification card information to the shared server, so as to use the target identification card information as the second shared identification card information corresponding to the target user information; the first shared identification corresponding to the target demand information
  • the card information is queried by the shared server according to the shared identification card information acquisition request, and is returned to the target terminal when the second shared identification card information corresponding to the target user information is queried.
  • the target entity identification card is an entity user identification card included in the target terminal.
  • the target user information may be information of a target user corresponding to the target terminal, or information of a user who performs real-name authentication in a shared server client in the target terminal.
  • the second shared identification card information refers to identification card information shared by the target terminal.
  • the target user when the target user needs to use the shared identification card information service, the target user can share his own identification card information in exchange for the qualification to share the identification card information of others.
  • the target entity identification card in the target terminal and the shared entity identification card in the shared terminal belong to different regions.
  • the region to which the target entity identification card belongs is Beijing, and the region to which the shared entity identification card belongs is Tianjin.
  • the target terminal can share the target entity identification card in exchange for the qualification to use the shared identification card information shared by the shared terminal for mobile communication.
  • the target user can also purchase the shared identification card information service through the shared service client, so as to obtain the qualification to use the identification card information shared by others.
  • the target terminal shares the virtual identification card information corresponding to the target entity identification card it can delete the virtual identification card information stored at the local end and prohibit the use of the target entity identification card.
  • the target terminal can read the target identification card information corresponding to the target entity identification card, and send the target identification card information and the target user information to the sharing server, and the sharing server can associate and store the target user information and the target user information,
  • the target identification card information is used as the shared identification card information corresponding to the target user information in the shared server.
  • the sharing server receives the shared identification card information acquisition request sent by the target terminal, it can query the associated stored identification card information according to the target user information, and when queried, returns the first shared identification card information corresponding to the target demand information to the target terminal.
  • the sharing server can also query the historical records corresponding to the target user information, and the historical records corresponding to the target user information can include the sharing details of the identification card information within the historical time of the target user, and determine whether to return the corresponding target demand information to the target terminal according to the sharing details.
  • the first shared identification card information can be included in the historical records corresponding to the target user information.
  • the target terminal may also read the target identification card information corresponding to the target entity identification card after receiving the first shared identification card information corresponding to the target demand information returned by the shared server, and send the target identification card information to the shared server, Taking the target identification card information as the second shared identification card information corresponding to the target user information.
  • the first shared identification card information corresponding to the target demand information is queried by the shared server according to the shared identification card information acquisition request, and returned to the target terminal when the second shared identification card information corresponding to the target user information is queried. , thereby ensuring that the target user uses the shared identification card information of others on the premise that the identification card information has been shared, and ensures the fairness and rationality of the shared identification card information being used.
  • the method further includes:
  • S302 Acquire the information use duration threshold and the initial use time corresponding to the information of the first shared identification card in the target terminal.
  • S306 Acquire second shared identification card information corresponding to the target user information from the shared server, and configure the second shared identification card information into the target virtual identification card.
  • the information usage duration threshold may be determined according to the target duration and the sharing duration.
  • the information usage duration threshold may be the target duration, the sharing duration, or a statistical value based on the target duration and the sharing duration, and the statistical value is, for example, an average value.
  • the initial use time refers to the initial time point when the target terminal user uses the first shared identification card information to perform network communication.
  • the current time refers to the time point corresponding to the current moment.
  • the target terminal may obtain the information usage duration threshold and the initial usage time corresponding to the first shared identification card information in the target terminal, and when the time interval between the current time and the initial usage time reaches the information usage duration threshold, the The first shared identification card information is deleted from the target virtual identification card. For example, if the time interval between the current time and the initial use time is 2 hours, and the information usage time threshold is 2 hours, the target terminal can delete the first shared identification card information from the target virtual identification card at this time.
  • the target terminal may also acquire the information use time period corresponding to the first shared identification card information, and delete the first shared identification card information from the target virtual identification card when the current time exceeds the information use time period.
  • the target terminal when the target terminal can delete the first shared identification card information from the target virtual identification card, it can directly send the identification card information recovery request to the shared server, and the shared server can use the second shared identification card information according to the use of the second shared identification card. state, determine the time when the second shared identification card information is returned to the target terminal, for example, when the second shared identification card information is being used by other users, the sharing server can determine the time when the second shared identification card information is in an idle state, the idle state It means that the second shared identification card information is not used by other users. When the second shared identification card information is in an idle state, the second shared identification card information is returned to the target terminal, and the target terminal can configure the second shared identification card information. to the target virtual identification card.
  • the first shared identification card information is deleted from the target virtual identification card, and the second shared identification corresponding to the target user information is obtained from the sharing server.
  • Identification card information, configuring the second shared identification card information into the target virtual identification card, can make the shared identification card information be automatically deleted and restored at a specified time, and improve the automation and rationality of the sharing process of the shared identification card information .
  • a network communication method is provided, and the method is applied to the shared server 104 in FIG. 1 as an example for description, including the following steps:
  • S402 Receive a request for acquiring shared identification card information sent by a target terminal, where the request for acquiring shared identification card information carries target demand information.
  • S404 in response to the request for obtaining the shared identification card information, obtain first shared identification card information corresponding to the target demand information, and return the first shared identification card information corresponding to the target demand information to the target terminal, so that the target terminal can identify the first shared identification card
  • the card information is configured into the target virtual identification card of the target terminal, and the target virtual identification card is made to access the target network through the first shared identification card information, and use the target network for network communication, and the first shared identification card information is corresponding from the shared terminal. extracted from the shared entity identification card of .
  • a shared identification card information acquisition request sent by a target terminal is received, the shared identification card information acquisition request carries target demand information, and in response to the shared identification card information acquisition request, the first shared identification card information corresponding to the target demand information is acquired. , returning the first shared identification card information corresponding to the target demand information to the target terminal, so that the target terminal configures the first shared identification card information into the target virtual identification card of the target terminal, and causes the target virtual identification card to pass the first shared identification card.
  • the identification card information is connected to the target network, and the target network is used for network communication.
  • the first shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal, which realizes the use of the network communication service corresponding to the shared identification card information. Communication improves the efficiency of network communication.
  • the target terminal includes a target entity identification card
  • the shared identification card information acquisition request also carries target user information
  • the first shared identification card information corresponding to the target demand information is acquired
  • the target Returning the first shared identification card information corresponding to the demand information to the target terminal includes: querying the second shared identification card information corresponding to the target user information according to the shared identification card information acquisition request, and the second shared identification card information is obtained from the target entity identification card. Extracted; when the second shared identification card information corresponding to the target user information is queried, in response to the shared identification card information acquisition request, the first shared identification card information corresponding to the target demand information is obtained, and the first shared identification card information corresponding to the target demand information is obtained.
  • the shared identification card information is returned to the target terminal.
  • the first shared identification card information corresponding to the target demand information is returned to the target terminal, thereby ensuring that the target user has shared identification card information.
  • acquiring the first shared identification card information corresponding to the target demand information includes: acquiring a candidate identification card information set corresponding to the target demand information, and each candidate identification card information in the candidate identification card information set corresponds to an information use state respectively. ; Determine the first shared identification card information corresponding to the target demand information from each candidate identification card information whose information usage status is available.
  • the candidate identification card information set may include a plurality of candidate identification card information, and the candidate identification card information is obtained by screening each shared identification card information stored in the shared server according to the target requirement information.
  • the information usage status can be selected from a usage status and an idle status.
  • the shared identification card information is used, the information use state is the use state, and when the shared identification card information is not used, the information use state is the idle state.
  • the candidate identification card information may be calculated by the shared server according to the target requirement information and the shared description information corresponding to each stored shared identification card information.
  • the sharing server may calculate the similarity of the shared description information corresponding to the candidate identification card information whose information usage status is available, and the target demand information, and use the shared identification card information corresponding to the maximum similarity as the target demand information corresponding The first shared identification card information.
  • the first shared identification card information corresponding to the target demand information is determined from each candidate identification card information whose information usage status is available, so that the first shared identification card information can be quickly and effectively determined.
  • acquiring the candidate identification card information set corresponding to the target demand information includes: acquiring shared description information corresponding to each stored shared identification card information, performing similarity calculation according to the target demand information and the shared description information, and obtaining the stored The target similarity corresponding to each shared identification card information; the shared identification card information corresponding to each target similarity greater than the preset similarity threshold value is respectively used as the candidate identification card information corresponding to the target demand information, and the corresponding target demand information is obtained.
  • a collection of candidate identification card information includes: acquiring shared description information corresponding to each stored shared identification card information, performing similarity calculation according to the target demand information and the shared description information, and obtaining the stored The target similarity corresponding to each shared identification card information; the shared identification card information corresponding to each target similarity greater than the preset similarity threshold value is respectively used as the candidate identification card information corresponding to the target demand information, and the corresponding target demand information is obtained.
  • a collection of candidate identification card information includes: acquiring shared description information corresponding to each stored shared identification card information, performing similarity calculation according to
  • the preset similarity threshold can be set as required.
  • the shared identification card information corresponding to each target similarity greater than the preset similarity threshold value can be found, and the shared identification card information with a high degree of matching with the target demand information can be found, which improves the accuracy of the selected candidate identification card information. Spend.
  • the network communication method of the present application is exemplified.
  • FIG. 4B it shows a flow chart of user A sharing the user identification card.
  • the terminal A of user A receives the instruction from user A to determine the sharing, it can upload the virtual SIM card information in the module to Share the server, cancel the virtual SIM card in terminal A, and prohibit the use of the physical SIM card corresponding to the virtual SIM card.
  • the terminal can transfer the shared virtual SIM card information from The shared terminal is downloaded to the communication module of the terminal.
  • FIG. 4C the process of user B using the identification card information shared by others is shown.
  • User B registers for the service (shared identification card information service) on the shared platform, after clarifying the relevant rights and responsibilities, that is, after agreeing to the relevant agreement corresponding to the shared identification card information service, he can purchase the local virtual SIM card service on the shared platform,
  • terminal B corresponding to user B roams to a different place (such as the region where the identification card in terminal A belongs)
  • user B can publish demand information through the sharing platform on terminal B and wait for the matching result of the sharing platform.
  • the sharing platform can perform matching according to the published demand information.
  • the matching When the matching is successful (for example, it matches the identification card information shared by terminal A), it sends the matching shared identification card information to terminal B, and terminal B can send the matching shared identification card information to terminal B.
  • the card information is written into the virtual SIM card of the local end, and the virtual SIM card information in the terminal B is shared.
  • the sharing time arrives, the shared virtual identification card information is restored to the module of the local end.
  • a network communication device including: a shared identification card information acquisition request sending module 502, a first shared identification card information receiving module 504, and a first shared identification card information configuration module 506, where:
  • the shared identification card information acquisition request sending module 502 is configured to send a shared identification card information acquisition request to the sharing server, where the shared identification card information acquisition request carries target demand information.
  • the first shared identification card information receiving module 504 is configured to receive the first shared identification card information corresponding to the target demand information returned by the shared server in response to the shared identification card information acquisition request, and the first shared identification card information is corresponding to the shared terminal Extracted from the shared entity identification card.
  • the first shared identification card information configuration module 506 is configured to configure the first shared identification card information into the target virtual identification card of the target terminal, so that the target virtual identification card accesses the target network through the first shared identification card information, and uses target network for network communication.
  • the target terminal includes a target entity identification card
  • the shared identification card information acquisition request also carries target user information
  • the device is further configured to: read the target identification card information corresponding to the target entity identification card, and send the target identification card information.
  • the shared server to use the target identification card information as the second shared identification card information corresponding to the target user information; the first shared identification card information corresponding to the target demand information is queried by the shared server according to the shared identification card information acquisition request.
  • the second shared identification card information corresponding to the target user information is the second shared identification card information, it is returned to the target terminal.
  • the apparatus is further configured to: acquire the information usage duration threshold and the initial usage time corresponding to the first shared identification card information in the target terminal; when the time interval between the current time and the initial usage time reaches the information usage duration threshold , delete the first shared identification card information from the target virtual identification card; obtain the second shared identification card information corresponding to the target user information from the sharing server, and configure the second shared identification card information into the target virtual identification card.
  • a network communication device including: a shared identification card information acquisition request receiving module 602 and a first shared identification card information returning module 604, wherein:
  • the shared identification card information acquisition request receiving module 602 is configured to receive a shared identification card information acquisition request sent by a target terminal, where the shared identification card information acquisition request carries target demand information.
  • the first shared identification card information return module 604 is configured to obtain the first shared identification card information corresponding to the target demand information in response to the shared identification card information acquisition request, and return the first shared identification card information corresponding to the target demand information to the target terminal , so that the target terminal configures the first shared identification card information into the target virtual identification card of the target terminal, and enables the target virtual identification card to access the target network through the first shared identification card information, and uses the target network for network communication, and the first A shared identification card information is extracted from the shared entity identification card corresponding to the shared terminal.
  • the target terminal includes a target entity identification card
  • the shared identification card information acquisition request also carries target user information
  • the first shared identification card information return module 604 includes:
  • the second shared identification card information query unit is configured to query the second shared identification card information corresponding to the target user information according to the shared identification card information acquisition request, where the second shared identification card information is extracted from the target entity identification card.
  • the first shared identification card information returning unit is configured to obtain the first shared identification card information corresponding to the target demand information in response to the shared identification card information acquisition request when the second shared identification card information corresponding to the target user information is queried, and send the The first shared identification card information corresponding to the target demand information is returned to the target terminal.
  • the first shared identification card information return unit is further configured to obtain a candidate identification card information set corresponding to the target demand information, and each candidate identification card information in the candidate identification card information set corresponds to an information use status respectively; From each candidate identification card information whose information usage status is available, the first shared identification card information corresponding to the target demand information is determined.
  • the first shared identification card information returning unit is further configured to obtain shared description information corresponding to each stored shared identification card information, and perform similarity calculation according to the target demand information and the shared description information, and obtain each stored shared identification card.
  • Each module in the above-mentioned network communication device may be implemented in whole or in part by software, hardware and combinations thereof.
  • the above modules can be embedded in or independent of the processor in the computer device in the form of hardware, or stored in the memory in the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
  • a computer device is provided, and the computer device may be a terminal, and its internal structure diagram may be as shown in FIG. 7 .
  • the computer equipment includes a processor, memory, a communication interface, a display screen, and an input device connected by a system bus.
  • the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes non-volatile storage media, internal memory.
  • the nonvolatile storage medium stores an operating system and a computer program.
  • the internal memory provides an environment for the execution of the operating system and computer programs in the non-volatile storage medium.
  • the communication interface of the computer device is used for wired or wireless communication with an external terminal, and the wireless communication can be realized by WIFI, operator network, NFC (Near Field Communication) or other technologies.
  • the computer program when executed by a processor, implements a network communication method.
  • the display screen of the computer equipment may be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment may be a touch layer covered on the display screen, or a button, a trackball or a touchpad set on the shell of the computer equipment , or an external keyboard, trackpad, or mouse.
  • a computer device is provided, and the computer device may be a server, and its internal structure diagram may be as shown in FIG. 8 .
  • the computer device includes a processor, memory, and a network interface connected by a system bus. Among them, the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes non-volatile storage media and internal memory.
  • the nonvolatile storage medium stores an operating system and a computer program.
  • the internal memory provides an environment for the execution of the operating system and computer programs in the non-volatile storage medium.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer program when executed by a processor, implements a network communication method.
  • FIGS. 7 and 8 are only block diagrams of partial structures related to the solution of the present application, and do not constitute a limitation on the computer equipment to which the solution of the present application is applied.
  • a device may include more or fewer components than shown in the figures, or combine certain components, or have a different arrangement of components.
  • a computer device comprising a memory and a processor, a computer program is stored in the memory, and the processor implements the following steps when executing the computer program:
  • a shared identification card information acquisition request is sent to the shared server, and the shared identification card information acquisition request carries target demand information.
  • the first shared identification card information is configured into the target virtual identification card of the target terminal, so that the target virtual identification card accesses the target network through the first shared identification card information, and uses the target network for network communication.
  • a computer device comprising a memory and a processor, a computer program is stored in the memory, and the processor implements the following steps when executing the computer program:
  • a request for acquiring shared identification card information sent by the target terminal is received, and the request for acquiring shared identification card information carries target demand information.
  • the target terminal In response to the shared identification card information acquisition request, obtain the first shared identification card information corresponding to the target demand information, and return the first shared identification card information corresponding to the target demand information to the target terminal, so that the target terminal sends the first shared identification card information Configure the target virtual identification card in the target terminal, and enable the target virtual identification card to access the target network through the first shared identification card information, and use the target network for network communication, and the first shared identification card information is from the shared terminal corresponding to the shared identification card. extracted from the entity identification card.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented:
  • a shared identification card information acquisition request is sent to the shared server, and the shared identification card information acquisition request carries target demand information.
  • the first shared identification card information is configured into the target virtual identification card of the target terminal, so that the target virtual identification card accesses the target network through the first shared identification card information, and uses the target network for network communication.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented:
  • a request for acquiring shared identification card information sent by the target terminal is received, and the request for acquiring shared identification card information carries target demand information.
  • the target terminal In response to the shared identification card information acquisition request, obtain the first shared identification card information corresponding to the target demand information, and return the first shared identification card information corresponding to the target demand information to the target terminal, so that the target terminal sends the first shared identification card information Configure the target virtual identification card in the target terminal, and enable the target virtual identification card to access the target network through the first shared identification card information, and use the target network for network communication, and the first shared identification card information is from the shared terminal corresponding to the shared identification card. extracted from the entity identification card.
  • Non-volatile memory may include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory, or optical memory, and the like.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • the RAM may be in various forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种网络通信方法、装置、计算机设备和存储介质。所述方法包括:向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。

Description

网络通信方法、装置、计算机设备和存储介质
相关申请交叉引用
本申请要求2020年07月27日递交的、标题为“网络通信方法、装置、计算机设备和存储介质”、申请号为2020107293780的中国申请,其公开内容通过引用全部结合在本申请中。
技术领域
本申请涉及一种网络通信方法、装置、计算机设备和存储介质。
背景技术
随着通信技术以及互联网技术的发展,用户越来越多的通过移动通信网络进行通信,例如当用户外出旅游时可以通过移动通信网络与朋友进行语音通信或视频通信聊天,当用户外出工作时,可以通过移动通信网络与同事开语音或视频会议。
发明内容
根据多个实施例,本申请第一方面提供一种网络通信方法,由目标终端执行,所述方法包括:向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。
根据多个实施例,本申请第二方面提供一种网络通信装置,所述装置包括:共享识别卡信息获取请求发送模块,用于向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;第一共享识别卡信息接收模块,用于接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一 共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;第一共享识别卡信息配置模块,用于将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。
根据多个实施例,本申请第三方面提供一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时实现以下步骤:向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。
根据多个实施例,本申请第四方面提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现以下步骤:向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。
根据多个实施例,本申请第五方面提供一种网络通信方法,由共享服务器执行,所述方法包括:接收目标终端发送的共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端,以使得所述目标终端将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以及使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信,所述第一共享识别卡信息是从共享终端 对应的共享实体识别卡中提取得到的。
根据多个实施例,本申请第六方面提供一种网络通信装置,所述装置包括:共享识别卡信息获取请求接收模块,用于接收目标终端发送的共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;第一共享识别卡信息返回模块,用于响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端,以使得所述目标终端将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以及使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
根据多个实施例,本申请第七方面提供一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时实现以下步骤:接收目标终端发送的共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端,以使得所述目标终端将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以及使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
根据多个实施例,本申请第八方面提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现以下步骤:接收目标终端发送的共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端,以使得所述目标终端将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以及使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得 到的。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为一些实施例中网络通信方法的应用环境图;
图2为一些实施例中网络通信方法的流程示意图;
图3为一些实施例中删除以及配置共享识别卡信息的步骤的流程示意图;
图4A为一些实施例中网络通信方法的流程示意图;
图4B为一些实施例中识别卡信息的共享步骤的流程示意图;
图4C为一些实施例中共享识别卡信息获取的步骤的流程示意图;
图5为一些实施例中网络通信装置的结构框图;
图6为一些实施例中网络通信装置的结构框图;
图7为一些实施例中计算机设备的内部结构图
图8为一些实施例中计算机设备的内部结构图。
具体实施方式
目前,当用户在异地使用移动通信网络时,用户通常需要办理异地网络运营商提供的数据服务,使得用户在异地使用移动通信网络的复杂度高,导致网络通信的效率低。
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的网络通信方法,可以应用于如图1所示的应用环境中。该应用环境包括目标终端102、共享服务器104和共享终端106。目标终端102 包括目标通信模块,目标通信模块中包括目标虚拟识别卡和目标实体识别卡,共享终端106包括共享通信模块,共享通信模块中包括共享实体识别卡和共享虚拟识别卡。其中,目标终端102通过网络与共享服务器104通过网络进行通信,共享服务器104通过网络与共享终端106通过网络进行通信。
具体地,目标终端102可以向共享服务器106发送共享识别卡信息获取请求,所述共享识别卡信息获取请求可以携带目标需求信息;共享服务器104可以响应于所述共享识别卡信息获取请求,向目标终端102返回所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息可以是从共享终端106对应的共享实体识别卡中提取得到的,即共享终端106的用户识别卡(SIM,Subscriber Identity Module)满足目标需求信息,共享终端106可以将提取到的第一共享识别卡信息先暂存到共享虚拟识别卡中,再发送至共享服务器106;目标终端102可以接收所述共享服务器104返回的所述目标需求信息对应的第一共享识别卡信息,将所述第一共享识别卡信息配置到所述目标终端102的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。目标终端102也可以提取目标实体识别卡的信息,将目标实体识别卡的信息发送至共享服务器104进行共享。共享终端和目标终端均可以对本端的用户识别卡的信息进行共享,也可以获取其他终端共享的用户识别卡信息。
其中,目标终端102和共享终端106可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,共享服务器104可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
在一些实施例中,如图2所示,提供了一种网络通信方法,以该方法应用于图1中的目标终端102为例进行说明,包括以下步骤:
S202,向共享服务器发送共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
具体地,识别卡指的是用户识别卡,即SIM卡,用户识别卡可以包括实体识别卡和虚拟识别卡。实体识别卡即实体的用户识别卡,虚拟识别卡即虚拟的用户识别卡。虚拟识别卡可以是通过软件模拟出的,虚拟识别卡对应的数据可以是存储在通信模块中预设的存储区域中的。通信模块可以是基带处理器(Modem)。实体SIM卡是GSM(Global System for Mobile  Communications,全球移动通信系统)系统的移动用户所持有的IC卡(Integrated Circuit Card,集成电路卡),可以插入终端,也可以从终端中拔出。虚拟SIM卡是一种将传统SIM卡中的文件参数直接加密存储在终端中,并完全基于软件的应用技术,可以是由通信模块(例如基带处理器)上的安全硬件以及软件共同实现的。与实体SIM卡相比,虚拟SIM卡具有卡信息可复制、移除和传递的特点。虚拟SIM卡包括但不限于是VSIM(Virtual Subscriber Identification Module)和SoftSIM(Soft Subscriber Identification Module)等。
识别卡信息指的是用户识别卡的信息,实体识别卡对应的识别卡信息可以包括用户信息、鉴权信息或网络信息中的至少一种。用户信息可以包括电话号码。鉴权信息可以包括IMSI(国际移动用户识别码,International Mobile Subscriber Identification Number)、鉴权密钥、鉴权或加密算法中的至少一种。网络信息可以包括位置区域识别码(LAI,Location Area Identity)、移动用户暂时识别码TMSI(Temporary Mobile Subscriber Identity)或禁止接入的公共电话网代码中的至少一种。虚拟识别卡对应的识别卡信息是根据实体识别卡的卡信息得到的,例如虚拟识别卡对应的识别卡信息可以是对实体识别卡的识别卡信息进行加密得到的,虚拟识别卡对应的识别卡信息可以包括加密的用户信息、加密的鉴权信息和加密的网络信息。
共享识别卡信息指的是共享虚拟识别卡对应的识别卡信息,共享虚拟识别卡对应的识别卡信息可以是根据共享实体识别卡对应的识别卡信息得到的。共享实体识别卡指的是将识别卡信息进行共享的实体识别卡,共享虚拟识别卡指的是将识别卡信息进行共享的虚拟识别卡。其中,“共享”用于表示将识别卡信息提供给共享服务器,从而其他终端可以从共享服务器获取该识别卡信息,并使用该识别卡信息进行移动通信。
共享识别卡信息获取请求指的是获取共享识别卡信息的请求。目标需求信息可以包括目标区域信息或目标时间信息中的至少一种。目标区域信息指的是所请求获取的共享识别卡信息所属的区域的信息。目标区域信息可以包括国家信息、地理位置信息、经纬度信息或城市标识信息中的至少一种。目标时间信息指的是目标终端请求使用共享识别卡信息的时间段对应的时间信息。目标时间信息可以包括目标时长、目标起始时间点或目标终止时间点中 的至少一种。
在一些实施例中,目标终端可以通过安装的共享服务客户端向共享服务器中的共享服务系统发送共享识别卡信息获取请求。共享服务系统指的是提供共享识别卡信息服务的系统。共享服务器可以为共享服务系统所在的服务器。共享服务客户端是共享服务系统对应的终端应用程序,即适用于终端的应用程序。目标终端以及共享终端可以分别安装有共享服务客户端。目标终端以及共享终端可以通过共享服务客户端与共享服务器上的共享服务系统进行通信,从而可以实现用户识别卡的共享。目标终端的用户以及共享终端的用户可以通过在共享服务客户端上进行实名认证,当实名认证通过后可以有资格使用共享识别卡信息服务。共享服务系统也可以称为共享平台。共享识别卡信息服务可以称为虚拟SIM卡服务。
在一些实施例中,共享服务客户端可以提供进行共享服务界面,目标终端可以通过共享服务界面获取共享识别卡信息获取指令,终端可以根据共享识卡信息获取指令,向共享服务器发送共享识别卡信息获取请求。具体地,目标终端可以对目标用户进行共享服务资格验证,当确定验证通过后向共享服务器发送共享识别卡信息获取请求。其中,目标用户指的是目标终端的用户。共享服务资格验证可以包括验证用户是否签署了共享服务相关协议。共享服务相关协议可以包括共享用户相关协议或被共享用户相关协议。共享用户相关协议指的是共享识别卡信息的共享用户所签署的协议,共享用户例如可以为图1中的共享终端对应的用户。被共享用户相关协议指的是使用他人共享的识别卡信息的被共享用户所签署的协议,被共享用户例如图1中的目标终端。共享用户相关协议的协议内容可以包括:共享用户禁止将共享实体识别卡从共享终端取出并插入到其他终端上使用,或,共享用户保证所共享的识别卡信息不存在非法使用的情况中的至少一种。被共享用户相关协议的协议内容可以包括:被共享用户禁止使用共享识别卡信息进行非法活动等。
S204,接收共享服务器响应于共享识别卡信息获取请求,返回的目标需求信息对应的第一共享识别卡信息,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
具体地,第一共享识别卡信息可以是根据共享终端中共享实体识别卡的信息得到的,例如,第一共享识别卡信息可以是对共享实体识别卡的信息进 行加密得到的。由于在将共享识别卡信息发送至共享服务器的过程中可能被窃取,而当共享识别卡信息为加密信息时,即便共享识别卡信息被窃取,窃取者也不能得到未加密的共享识别卡信息,从而防止了共享识别卡信息被盗用。
在一些实施例中,共享服务器中可以存储有候选共享识别卡信息集合,候选共享识别信息集合中可以包括多个区域信息分别对应的共享识别卡信息。候选共享识别卡信息集合中的各个共享识别卡信息可以对应有共享描述信息,共享描述信息可以包括共享识别卡信息对应的共享时间信息或共享区域信息中的至少一种,共享时间信息可以包括共享时长、共享起始时间点或共享终止时间点中的至少一种。共享区域信息指的是共享识别卡信息对应的区域的信息。例如,共享识别卡信息为A地区的用户识别卡的信息,则共享区域信息为A地区的区域信息。在共享时间信息对应的时间段内,共享识别卡信息可以被需要共享识别卡信息的终端(例如图1中的目标终端)使用。
在一些实施例中,共享服务器可以根据将目标需求信息与候选共享识别卡信息的共享描述信息进行对比,当共享描述信息符合目标需求信息时,将符合需求信息的候选共享识别卡信息作为目标需求信息对应的第一共享识别卡信息。其中,共享描述信息符合目标需求信息可以包括共享时间信息符合目标时间信息或共享区域信息符合目标区域信息中的至少一种。共享时间信息符合目标时间信息可以包括共享时间信息与目标时间信息一致或共享时间信息对应的时间段包含目标时间信息对应的时间段中的至少一种。
在一些实施例中,共享识别卡信息获取请求中可以携带目标终端对应的目标用户的信息,共享服务器可以根据目标用户的信息确定目标终端是否有资格获取共享识别卡信息,例如可以根据目标用户的信息,查找目标用户相关的历史信息,根据历史信息确定是否有资格获取共享识别卡信息,当确定目标终端有资格获取共享识别卡信息时,获取并返回目标需求信息对应的第一共享识别卡信息。
S206,将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信。
具体地,目标虚拟识别卡为目标终端包括的虚拟识别卡。目标网络指的 是第一共享识别卡信息所属的用户识别卡对应的运营商网络。目标终端安装的共享服务客户端可以将第一共享识别卡信息写入到目标通信模块中的目标虚拟识别卡中。目标终端可以使用第一共享识别卡信息进行注网,注网成功后接入目标网络,通过注网成功的目标通信模块中的目标虚拟识别卡接入移动网络。
上述网络通信方法中,向共享服务器发送共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息,接收共享服务器响应于共享识别卡信息获取请求,返回的目标需求信息对应的第一共享识别卡信息,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的,将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信,实现了使用共享识别卡信息对应的网络通信服务进行通信,提高了网络通信的效率。
目前,用户在使用移动通讯服务时,在异地网络漫游的情况下,通过支付漫游费或者购买异地网络运营商的数据服务来进行网络通信,使得用户在异地使用移动通信网络不方便且费用较高。本申请提出的网络通信方法,在使用者允许的情况下,通过软件的方式,共享虚拟SIM卡信息,使得其他用户在处于共享虚拟SIM卡信息对应的服务区域时,使用共享SIM卡信息进行通信,为用户在异地使用移动通信网络提供了方便,提高了异地用户的网络通信效率,并降低了异地使用移动通信网络的费用。
在一些实施例中,目标终端包括目标实体识别卡,共享识别卡信息获取请求还携带目标用户信息,接收共享服务器返回的目标需求信息对应的第一共享识别卡信息的步骤之前,还包括:读取目标实体识别卡对应的目标识别卡信息,将目标识别卡信息发送至共享服务器,以将目标识别卡信息作为目标用户信息对应的第二共享识别卡信息;目标需求信息对应的第一共享识别卡信息是共享服务器根据共享识别卡信息获取请求进行查询,当查询到目标用户信息对应的第二共享识别卡信息时,向目标终端返回的。
具体地,目标实体识别卡为目标终端中包括的实体用户识别卡。目标用户信息可以是目标终端对应的目标用户的信息,也可以是在目标终端中的共享服务器客户端中进行实名认证的用户的信息。第二共享识别卡信息指的是 目标终端共享出的识别卡信息。
在一些实施例中,当目标用户需要使用共享识别卡信息服务时,目标用户可以将自身的识别卡信息共享从而换取共享他人识别卡信息的资格。例如目标终端中的目标实体识别卡与共享终端中的共享实体识别卡所属的区域不同,目标实体识别卡所属的区域为北京,共享实体识别卡所属的区域为天津,当目标终端到达天津时,目标终端可以将目标实体识别卡共享出去,从而换取使用共享终端共享的共享识别卡信息进行移动通信的资格。当然,目标用户还可以通过共享服务客户端购买共享识别卡信息服务,从而获取使用他人共享的识别卡信息的资格。目标终端将目标实体识别卡对应的虚拟识别卡信息共享后,可以删除本端存储的虚拟识别卡信息并且禁止目标实体识别卡的使用。
在一些实施例中,目标终端可以读取目标实体识别卡对应的目标识别卡信息,将目标识别卡信息以及目标用户信息发送至共享服务器,共享服务器可以将目标用户信息以及目标用户信息关联存储,将目标识别卡信息作为共享服务器中与目标用户信息对应的共享识别卡信息。共享服务器接收到目标终端发送的共享识别卡信息获取请求时,可以根据目标用户信息查询关联存储的识别卡信息,当查询到时,向目标终端返回目标需求信息对应的第一共享识别卡信息。当然,共享服务器也可以查询目标用户信息对应的历史记录,目标用户信息对应的历史记录可以包括目标用户历史时间内识别卡信息的共享详情,根据共享详情确定是否向目标终端返回目标需求信息对应的第一共享识别卡信息。
当然,目标终端也可以是在接收到共享服务器返回的目标需求信息对应的第一共享识别卡信息后,读取目标实体识别卡对应的目标识别卡信息,将目标识别卡信息发送至共享服务器,以将目标识别卡信息作为目标用户信息对应的第二共享识别卡信息。
上述实施例中,目标需求信息对应的第一共享识别卡信息是共享服务器根据共享识别卡信息获取请求进行查询,当查询到目标用户信息对应的第二共享识别卡信息时,向目标终端返回的,从而保证了目标用户在共享过识别卡信息的前提下使用他人的共享识别卡信息,保证共享识别卡信息被使用的公平性以及合理性。
在一些实施例中,如图3所示,该方法还包括:
S302,获取目标终端中第一共享识别卡信息对应的信息使用时长阈值以及起始使用时间。
S304,在当前时间与起始使用时间的时间间隔达到信息使用时长阈值时,将第一共享识别卡信息从目标虚拟识别卡中删除。
S306,从共享服务器获取目标用户信息对应的第二共享识别卡信息,将第二共享识别卡信息配置到目标虚拟识别卡中。
具体地,信息使用时长阈值可以是根据目标时长和共享时长确定的。例如信息使用时长阈值可以为目标时长,也可以是共享时长,也可以是根据目标时长和共享时长的统计值,统计值例如为平均值。起始使用时间指的是目标终端用户使用第一共享识别卡信息进行网络通信的起始时间点。当前时间指的是当前时刻对应的时间点。
在一些实施例中,目标终端可以获取目标终端中第一共享识别卡信息对应的信息使用时长阈值以及起始使用时间,在当前时间与起始使用时间的时间间隔达到信息使用时长阈值时,将第一共享识别卡信息从目标虚拟识别卡中删除。例如,当前时间与起始使用时间的时间间隔为2个小时,信息使用时长阈值为2个小时,则这时目标终端可以将第一共享识别卡信息从目标虚拟识别卡中删除。当然,目标终端还可以获取第一共享识别卡信息对应的信息使用时间段,在当前时间超过该信息使用时间段时,将第一共享识别卡信息从目标虚拟识别卡中删除。
在一些实施例中,当目标终端可将第一共享识别卡信息从目标虚拟识别卡中删除时,可以直接向共享服务器发送识别卡信息恢复请求,共享服务器可以根据第二共享识别卡信息的使用状态,确定将第二共享识别卡信息返回至目标终端的时间,例如当第二共享识别卡信息正在被其他用户使用时,共享服务器可以确定第二共享识别卡信息处于闲置状态的时间,闲置状态指的是第二共享识别卡信息未被其他用户使用,在第二共享识别卡信息处于闲置状态时,将第二共享识别卡信息返回至目标终端,目标终端可以将第二共享识别卡信息配置到目标虚拟识别卡中。
上述实施例中,在当前时间与起始使用时间的时间间隔达到信息使用时长阈值时,将第一共享识别卡信息从目标虚拟识别卡中删除,从共享服务器 获取目标用户信息对应的第二共享识别卡信息,将第二共享识别卡信息配置到目标虚拟识别卡中,可以使得共享识别卡信息在规定的时间被自动地删除和恢复,提高了共享识别卡信息的共享过程的自动化和合理性。
在一些实施例中,如图4A所示,提供了一种网络通信方法,以该方法应用于图1中的共享服务器104为例进行说明,包括以下步骤:
S402,接收目标终端发送的共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
S404,响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端,以使得目标终端将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以及使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
具体地,相关描述请参考图2所示的网络通信方法对应的相关描述,这里不再赘述。
上述网络通信方法中,接收目标终端发送的共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息,响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端,以使得目标终端将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以及使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的,实现了使用共享识别卡信息对应的网络通信服务进行通信,提高了网络通信的效率。
在一些实施例中,目标终端包括目标实体识别卡,共享识别卡信息获取请求还携带目标用户信息,响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端包括:根据共享识别卡信息获取请求,查询目标用户信息对应的第二共享识别卡信息,第二共享识别卡信息是从目标实体识别卡中提取得到的;当查询到目标用户信息对应的第二共享识别卡信息时,响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将 目标需求信息对应的第一共享识别卡信息返回至目标终端。
上述实施例中,当查询到目标用户信息对应的第二共享识别卡信息时,将目标需求信息对应的第一共享识别卡信息返回至目标终端,从而保证了目标用户在共享过识别卡信息的前提下使用他人的共享识别卡信息,保证共享识别卡信息被使用的公平性以及合理性。
在一些实施例中,获取目标需求信息对应的第一共享识别卡信息包括:获取目标需求信息对应的候选识别卡信息集合,候选识别卡信息集合中的各个候选识别卡信息分别对应有信息使用状态;从信息使用状态为可用的各个候选识别卡信息中,确定目标需求信息对应的第一共享识别卡信息。
具体地,候选识别卡信息集合中可以包括多个候选识别卡信息,候选识别卡信息是根据目标需求信息从共享服务器存储的各个共享识别卡信息中筛选得到的。信息使用状态可以选自使用状态和闲置状态。当共享识别卡信息被使用时,信息使用状态为使用状态,当共享识别卡信息未被使用时,信息使用状态为闲置状态。候选识别卡信息可以是共享服务器根据目标需求信息,以及存储的各个共享识别卡信息分别对应的共享描述信息计算得到的。
在一些实施例中,共享服务器可以计算信息使用状态为可用的候选识别卡信息对应的共享描述信息,与目标需求信息的相似度,将相似度最大对应的共享识别卡信息,作为目标需求信息对应的第一共享识别卡信息。
上述实施例中,从信息使用状态为可用的各个候选识别卡信息中,确定目标需求信息对应的第一共享识别卡信息,可以快速有效地确定第一共享识别卡信息。
在一些实施例中,获取目标需求信息对应的候选识别卡信息集合包括:获取存储的各个共享识别卡信息分别对应的共享描述信息,根据目标需求信息以及共享描述信息进行相似度计算,得到存储的各个共享识别卡信息分别对应的目标相似度;将大于预设相似度阈值的各个目标相似度分别对应的共享识别卡信息,分别作为目标需求信息对应的候选识别卡信息,得到目标需求信息对应的候选识别卡信息集合。
具体地,预设相似度阈值可以根据需要进行设置。
上述实施例中,将大于预设相似度阈值的各个目标相似度分别对应的共享识别卡信息,可以找到与目标需求信息匹配度高的共享识别卡信息,提高 了选择的候选识别卡信息的准确度。
举例说明本申请的网络通信方法,如图4B所示,展示了用户A将用户识别卡进行共享的流程图,用户A在共享平台上注册服务(共享识别卡信息服务),在明确相关的权责之后,即同意共享识别卡信息服务对应的相关协议后,可以在共享平台上购买所在地的虚拟SIM卡服务,根据需要(例如当需要使用他人共享的识别卡信息时),可以在共享平台上宣布共享本身的虚拟SIM卡服务(即共享自身的识别卡信息)以及共享的时间段,用户A的终端A在收到用户A确定共享的指令时,可以将模块中的虚拟SIM卡信息上传到共享服务器,并将终端A中的虚拟SIM卡注销,以及禁止虚拟SIM卡对应的实体SIM卡的使用,终端可以在共享的虚拟SIM卡的共享时间到达时,将共享出去的虚拟SIM卡信息从共享终端下载到终端的通信模块中。
如图4C所示,展示了用户B使用他人共享的识别卡信息的过程。用户B在共享平台上注册服务(共享识别卡信息服务),在明确相关的权责之后,即同意共享识别卡信息服务对应的相关协议后,可以在共享平台上购买所在地的虚拟SIM卡服务,当用户B对应的终端B漫游到异地时(比如终端A中的识别卡所属的地区),用户B可以通过终端B上的共享平台发布需求信息,并等待共享平台的匹配结果。共享平台可以根据发布的需求信息进行匹配,当匹配成功时(例如匹配到终端A共享的识别卡信息),将匹配到的共享识别卡信息发送至终端B,终端B可以将匹配到的共享识别卡信息写入到本端的虚拟SIM卡中,并将终端B中的虚拟SIM卡信息进行共享,当到达共享时间,将共享出去的虚拟识别卡信息恢复到本端的模块中。
应该理解的是,虽然上述各实施例的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,上述各实施例的流程图中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。
在一些实施例中,如图5所示,提供了一种网络通信装置,包括:共享 识别卡信息获取请求发送模块502、第一共享识别卡信息接收模块504和第一共享识别卡信息配置模块506,其中:
共享识别卡信息获取请求发送模块502,用于向共享服务器发送共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
第一共享识别卡信息接收模块504,用于接收共享服务器响应于共享识别卡信息获取请求,返回的目标需求信息对应的第一共享识别卡信息,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
第一共享识别卡信息配置模块506,用于将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信。
在一些实施例中,目标终端包括目标实体识别卡,共享识别卡信息获取请求还携带目标用户信息,装置还用于:读取目标实体识别卡对应的目标识别卡信息,将目标识别卡信息发送至共享服务器,以将目标识别卡信息作为目标用户信息对应的第二共享识别卡信息;目标需求信息对应的第一共享识别卡信息是共享服务器根据共享识别卡信息获取请求进行查询,当查询到目标用户信息对应的第二共享识别卡信息时,向目标终端返回的。
在一些实施例中,装置还用于:获取目标终端中第一共享识别卡信息对应的信息使用时长阈值以及起始使用时间;在当前时间与起始使用时间的时间间隔达到信息使用时长阈值时,将第一共享识别卡信息从目标虚拟识别卡中删除;从共享服务器获取目标用户信息对应的第二共享识别卡信息,将第二共享识别卡信息配置到目标虚拟识别卡中。
在一些实施例中,如图6所示,提供了一种网络通信装置,包括:共享识别卡信息获取请求接收模块602和第一共享识别卡信息返回模块604,其中:
共享识别卡信息获取请求接收模块602,用于接收目标终端发送的共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
第一共享识别卡信息返回模块604,用于响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端,以使得目标终端将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以及使得目标虚拟识别卡通过第一 共享识别卡信息接入目标网络,并使用目标网络进行网络通信,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
在一些实施例中,目标终端包括目标实体识别卡,共享识别卡信息获取请求还携带目标用户信息,第一共享识别卡信息返回模块604包括:
第二共享识别卡信息查询单元,用于根据共享识别卡信息获取请求,查询目标用户信息对应的第二共享识别卡信息,第二共享识别卡信息是从目标实体识别卡中提取得到的。
第一共享识别卡信息返回单元,用于当查询到目标用户信息对应的第二共享识别卡信息时,响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端。
在一些实施例中,第一共享识别卡信息返回单元,还用于获取目标需求信息对应的候选识别卡信息集合,候选识别卡信息集合中的各个候选识别卡信息分别对应有信息使用状态;从信息使用状态为可用的各个候选识别卡信息中,确定目标需求信息对应的第一共享识别卡信息。
在一些实施例中,第一共享识别卡信息返回单元,还用于获取存储的各个共享识别卡信息分别对应的共享描述信息,根据目标需求信息以及共享描述信息进行相似度计算,得到存储的各个共享识别卡信息分别对应的目标相似度;将大于预设相似度阈值的各个目标相似度分别对应的共享识别卡信息,分别作为目标需求信息对应的候选识别卡信息,得到目标需求信息对应的候选识别卡信息集合。
关于网络通信装置的具体限定可以参见上文中对于网络通信方法的限定,在此不再赘述。上述网络通信装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一些实施例中,提供了一种计算机设备,该计算机设备可以是终端,其内部结构图可以如图7所示。该计算机设备包括通过系统总线连接的处理器、存储器、通信接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、 内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的通信接口用于与外部的终端进行有线或无线方式的通信,无线方式可通过WIFI、运营商网络、NFC(近场通信)或其他技术实现。该计算机程序被处理器执行时以实现一种网络通信方法。该计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。
在一些实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图8所示。该计算机设备包括通过系统总线连接的处理器、存储器和网络接口。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质和内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种网络通信方法。
本领域技术人员可以理解,图7和8中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
在一些实施例中,提供了一种计算机设备,包括存储器和处理器,存储器中存储有计算机程序,该处理器执行计算机程序时实现以下步骤:
向共享服务器发送共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
接收共享服务器响应于共享识别卡信息获取请求,返回的目标需求信息对应的第一共享识别卡信息,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信。
在一些实施例中,提供了一种计算机设备,包括存储器和处理器,存储器中存储有计算机程序,该处理器执行计算机程序时实现以下步骤:
接收目标终端发送的共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端,以使得目标终端将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以及使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
在一些实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:
向共享服务器发送共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
接收共享服务器响应于共享识别卡信息获取请求,返回的目标需求信息对应的第一共享识别卡信息,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信。
在一些实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:
接收目标终端发送的共享识别卡信息获取请求,共享识别卡信息获取请求携带目标需求信息。
响应于共享识别卡信息获取请求,获取目标需求信息对应的第一共享识别卡信息,将目标需求信息对应的第一共享识别卡信息返回至目标终端,以使得目标终端将第一共享识别卡信息配置到目标终端的目标虚拟识别卡中,以及使得目标虚拟识别卡通过第一共享识别卡信息接入目标网络,并使用目标网络进行网络通信,第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-Only Memory,ROM)、磁带、软盘、闪存或光存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种网络通信方法,由目标终端执行,所述方法包括:
    向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;
    接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;以及
    将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。
  2. 根据权利要求1所述的方法,其中所述目标终端包括目标实体识别卡,所述共享识别卡信息获取请求还携带目标用户信息,所述接收所述共享服务器返回的所述目标需求信息对应的第一共享识别卡信息的步骤之前,还包括:
    读取所述目标实体识别卡对应的目标识别卡信息,将所述目标识别卡信息发送至所述共享服务器,以将所述目标识别卡信息作为所述目标用户信息对应的第二共享识别卡信息;以及
    所述目标需求信息对应的第一共享识别卡信息是所述共享服务器根据所述共享识别卡信息获取请求进行查询,当查询到所述目标用户信息对应的第二共享识别卡信息时,向所述目标终端返回的。
  3. 根据权利要求2所述的方法,其中所述方法还包括:
    获取所述目标终端中所述第一共享识别卡信息对应的信息使用时长阈值以及起始使用时间;
    在当前时间与所述起始使用时间的时间间隔达到所述信息使用时长阈值时,将所述第一共享识别卡信息从所述目标虚拟识别卡中删除;以及
    从所述共享服务器获取所述目标用户信息对应的第二共享识别卡信息,将所述第二共享识别卡信息配置到所述目标虚拟识别卡中。
  4. 根据权利要求1所述的方法,其中所述实体识别卡对应的识别卡信息包括用户信息、鉴权信息或网络信息中的至少一种。
  5. 根据权利要求4所述的方法,其中所述鉴权信息包括IMSI(国际移动用户识别码,International Mobile Subscriber Identification Number)、鉴权 密钥、鉴权或加密算法中的至少一种。
  6. 根据权利要求4所述的方法,其中所述网络信息包括位置区域识别码(LAI,Location Area Identity)、移动用户暂时识别码TMSI(Temporary Mobile Subscriber Identity)或禁止接入的公共电话网代码中的至少一种。
  7. 根据权利要求1所述的方法,其中所述目标需求信息包括目标区域信息或目标时间信息中的至少一种。
  8. 根据权利要求7所述的方法,其中所述目标区域信息是所请求获取的所述共享识别卡信息所属的区域的信息。
  9. 根据权利要求8所述的方法,其中所述目标区域信息包括国家信息、地理位置信息、经纬度信息或城市标识信息中的至少一种。
  10. 根据权利要求7所述的方法,其中所述目标时间信息是所述目标终端请求使用所述共享识别卡信息的时间段对应的时间信息。
  11. 根据权利要求10所述的方法,其中所述目标时间信息包括目标时长、目标起始时间点或目标终止时间点中的至少一种。
  12. 根据权利要求3所述的方法,其中当所述目标终端可将第一共享识别卡信息从目标虚拟识别卡中删除时,所述目标终端直接向所述共享服务器发送识别卡信息恢复请求,所述共享服务器根据所述第二共享识别卡信息的使用状态,确定将所述第二共享识别卡信息返回至所述目标终端的时间。
  13. 一种网络通信方法,由共享服务器执行,所述方法包括:
    接收目标终端发送的共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;以及
    响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端,以使得所述目标终端将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以及使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
  14. 根据权利要求13所述的方法,其中所述目标终端包括目标实体识别卡,所述共享识别卡信息获取请求还携带目标用户信息,所述响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息, 将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端包括:
    根据所述共享识别卡信息获取请求,查询所述目标用户信息对应的第二共享识别卡信息,所述第二共享识别卡信息是从所述目标实体识别卡中提取得到的;以及
    当查询到所述目标用户信息对应的第二共享识别卡信息时,响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端。
  15. 根据权利要求13-14任意一项所述的方法,其中所述获取所述目标需求信息对应的第一共享识别卡信息包括:
    获取所述目标需求信息对应的候选识别卡信息集合,所述候选识别卡信息集合中的各个候选识别卡信息分别对应有信息使用状态;以及
    从信息使用状态为可用的各个所述候选识别卡信息中,确定所述目标需求信息对应的第一共享识别卡信息。
  16. 根据权利要求15所述的方法,其中所述获取所述目标需求信息对应的候选识别卡信息集合包括:
    获取存储的各个共享识别卡信息分别对应的共享描述信息,根据所述目标需求信息以及所述共享描述信息进行相似度计算,得到存储的各个所述共享识别卡信息分别对应的目标相似度;以及
    将大于预设相似度阈值的各个所述目标相似度分别对应的所述共享识别卡信息,分别作为所述目标需求信息对应的候选识别卡信息,得到所述目标需求信息对应的候选识别卡信息集合。
  17. 一种网络通信装置,所述装置包括:
    共享识别卡信息获取请求发送模块,用于向共享服务器发送共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;
    第一共享识别卡信息接收模块,用于接收所述共享服务器响应于所述共享识别卡信息获取请求,返回的所述目标需求信息对应的第一共享识别卡信息,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的;以及
    第一共享识别卡信息配置模块,用于将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以使得所述目标虚拟识别卡通过所述第 一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信。
  18. 一种网络通信装置,所述装置包括:
    共享识别卡信息获取请求接收模块,用于接收目标终端发送的共享识别卡信息获取请求,所述共享识别卡信息获取请求携带目标需求信息;
    第一共享识别卡信息返回模块,用于响应于所述共享识别卡信息获取请求,获取所述目标需求信息对应的第一共享识别卡信息,将所述目标需求信息对应的第一共享识别卡信息返回至所述目标终端,以使得所述目标终端将所述第一共享识别卡信息配置到所述目标终端的目标虚拟识别卡中,以及使得所述目标虚拟识别卡通过所述第一共享识别卡信息接入目标网络,并使用所述目标网络进行网络通信,所述第一共享识别卡信息是从共享终端对应的共享实体识别卡中提取得到的。
  19. 一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,其中所述处理器执行所述计算机程序时实现权利要求1至12或13至15中任一项所述的方法的步骤。
  20. 一种计算机可读存储介质,其上存储有计算机程序,其中所述计算机程序被处理器执行时实现权利要求1至12或13至15中任一项所述的方法的步骤。
PCT/CN2021/097704 2020-07-27 2021-06-01 网络通信方法、装置、计算机设备和存储介质 WO2022022054A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010729378.0A CN111970330B (zh) 2020-07-27 2020-07-27 网络通信方法、装置、计算机设备和存储介质
CN202010729378.0 2020-07-27

Publications (1)

Publication Number Publication Date
WO2022022054A1 true WO2022022054A1 (zh) 2022-02-03

Family

ID=73363898

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/097704 WO2022022054A1 (zh) 2020-07-27 2021-06-01 网络通信方法、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN111970330B (zh)
WO (1) WO2022022054A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115720388A (zh) * 2022-11-22 2023-02-28 中国电信股份有限公司 实现用户识别卡信息共享的方法及装置、电子设备

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970330B (zh) * 2020-07-27 2023-11-24 深圳市广和通无线股份有限公司 网络通信方法、装置、计算机设备和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530627A (zh) * 2015-10-22 2016-04-27 深圳市斯凯荣科技有限公司 实现移动终端通信连接的方法、配卡服务端及移动终端
CN107659928A (zh) * 2017-09-30 2018-02-02 广东欧珀移动通信有限公司 流量资源共享方法、装置、计算机设备及存储介质
US20190090124A1 (en) * 2016-03-10 2019-03-21 Zte Corporation Method and apparatus for realizing a plurality of terminals sharing user identity identification card, and storage medium
CN110519761A (zh) * 2019-08-12 2019-11-29 深圳市优克联新技术有限公司 用户身份识别卡的验证方法、装置、电子设备及存储介质
CN111970330A (zh) * 2020-07-27 2020-11-20 深圳市广和通无线股份有限公司 网络通信方法、装置、计算机设备和存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686669A (zh) * 2013-12-13 2014-03-26 华为终端有限公司 数据业务传输方法及终端
CN104717630A (zh) * 2015-03-02 2015-06-17 联想(北京)有限公司 一种信息处理方法及电子设备、服务器
CN107306387A (zh) * 2016-04-18 2017-10-31 中兴通讯股份有限公司 网络连接方法及装置、终端、系统
CN106851617B (zh) * 2017-02-14 2020-10-30 深圳市迪讯飞科技有限公司 一种虚拟sim卡系统及移动终端使用虚拟sim卡的方法
CN108600229A (zh) * 2018-04-26 2018-09-28 深圳市盛路物联通讯技术有限公司 一种射频通信共享方法及系统
CN110310113B (zh) * 2019-05-20 2022-01-04 深圳市微付充科技有限公司 一种基于地理位置的虚拟卡匹配方法、服务器及移动终端
CN110493754B (zh) * 2019-08-12 2022-05-03 深圳市优克联新技术有限公司 一种sim卡资源分配方法、系统、终端设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530627A (zh) * 2015-10-22 2016-04-27 深圳市斯凯荣科技有限公司 实现移动终端通信连接的方法、配卡服务端及移动终端
US20190090124A1 (en) * 2016-03-10 2019-03-21 Zte Corporation Method and apparatus for realizing a plurality of terminals sharing user identity identification card, and storage medium
CN107659928A (zh) * 2017-09-30 2018-02-02 广东欧珀移动通信有限公司 流量资源共享方法、装置、计算机设备及存储介质
CN110519761A (zh) * 2019-08-12 2019-11-29 深圳市优克联新技术有限公司 用户身份识别卡的验证方法、装置、电子设备及存储介质
CN111970330A (zh) * 2020-07-27 2020-11-20 深圳市广和通无线股份有限公司 网络通信方法、装置、计算机设备和存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115720388A (zh) * 2022-11-22 2023-02-28 中国电信股份有限公司 实现用户识别卡信息共享的方法及装置、电子设备
CN115720388B (zh) * 2022-11-22 2024-04-30 中国电信股份有限公司 实现用户识别卡信息共享的方法及装置、电子设备

Also Published As

Publication number Publication date
CN111970330B (zh) 2023-11-24
CN111970330A (zh) 2020-11-20

Similar Documents

Publication Publication Date Title
US10299191B2 (en) Method and device for establishing wireless connection
US11736292B2 (en) Access token management method, terminal, and server
CN104769983B (zh) 用于管理安全元件内的数据的方法与装置
US8474017B2 (en) Identity management and single sign-on in a heterogeneous composite service scenario
WO2022022054A1 (zh) 网络通信方法、装置、计算机设备和存储介质
CN108307674A (zh) 一种保障终端安全的方法和设备
CN106411878B (zh) 访问控制策略的制定方法、装置及系统
CN106506511B (zh) 一种通讯录信息处理方法、装置
JP2014056611A (ja) シンクライアント−サーバシステム、シンクライアント端末、データ管理方法及びコンピュータ読み取り可能な記録媒体
WO2018233051A1 (zh) 数据发布方法、装置、服务器和存储介质
WO2018010480A1 (zh) eSIM卡锁网方法、终端及锁网认证服务器
CN112527835B (zh) 基于缓存的认证请求处理方法、装置及相关设备
US20230388304A1 (en) Decentralized application authentication
WO2023115913A1 (zh) 认证方法、系统、电子设备和计算机可读存储介质
US8386518B2 (en) Server for managing anonymous confidential data
CN106412887A (zh) 一种虚拟sim卡的快速鉴权方法、系统、服务器及终端
WO2016165444A1 (en) System and method for migrating virtual subscriber identity module (sim) card
US11595193B2 (en) Secure data storage for anonymized contact tracing
CN116233847A (zh) 登录方法、装置、计算机设备和存储介质
CN112215591B (zh) 一种针对加密货币钱包的分布式加密管理方法、装置及系统
CN109474591A (zh) 多系统间帐户共享方法、装置、电子设备及存储介质
CN112188591B (zh) 网络接入方法、装置、计算机设备和存储介质
CN113645054B (zh) 无线网络设备配置方法及系统
CN112423300A (zh) 无线网络接入认证方法及装置
KR101811285B1 (ko) 부가인증장치에 기반한 클라우드 시스템의 인증 방법 및 그 클라우드 시스템

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21850162

Country of ref document: EP

Kind code of ref document: A1