[go: up one dir, main page]

CN119497177A - Communication network switching method, device, equipment and readable medium - Google Patents

Communication network switching method, device, equipment and readable medium Download PDF

Info

Publication number
CN119497177A
CN119497177A CN202311051881.5A CN202311051881A CN119497177A CN 119497177 A CN119497177 A CN 119497177A CN 202311051881 A CN202311051881 A CN 202311051881A CN 119497177 A CN119497177 A CN 119497177A
Authority
CN
China
Prior art keywords
user identity
identity card
communication network
switching
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311051881.5A
Other languages
Chinese (zh)
Inventor
程兆广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202311051881.5A priority Critical patent/CN119497177A/en
Publication of CN119497177A publication Critical patent/CN119497177A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/26Reselection being triggered by specific parameters by agreed or negotiated communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本公开提供了一种通信网络切换方法、装置、设备及可读介质,属于通信技术领域。方法包括:在第一用户身份识别卡处于激活态,且第二用户身份识别卡处于禁用态的情况下,获取所述第一用户身份识别卡的合约到期指示信息;其中,所述第一用户身份识别卡为用于提供第一通信网络服务的嵌入式的用户身份识别卡;所述第二用户身份识别卡为用于提供第二通信网络服务的可插拔的用户身份识别卡;根据所述合约到期指示信息,将所述第一用户身份识别卡切换为禁用态且所述第二用户身份识别卡切换为激活态,以从所述第一通信网络切换到所述第二通信网络。该方法用以满足合约到期后的转网需求。

The present disclosure provides a communication network switching method, device, equipment and readable medium, which belongs to the field of communication technology. The method includes: when the first user identity identification card is in an activated state and the second user identity identification card is in a disabled state, obtaining the contract expiration indication information of the first user identity identification card; wherein the first user identity identification card is an embedded user identity identification card for providing a first communication network service; the second user identity identification card is a pluggable user identity identification card for providing a second communication network service; according to the contract expiration indication information, the first user identity identification card is switched to a disabled state and the second user identity identification card is switched to an activated state, so as to switch from the first communication network to the second communication network. This method is used to meet the network switching needs after the contract expires.

Description

Communication network switching method, device, equipment and readable medium
Technical Field
The disclosure relates to the field of communication technologies, and in particular, to a method, a device, equipment and a readable medium for switching a communication network.
Background
For an operator to customize a mobile phone (also called a contractor), the operator generally uses a network locking and card locking mode or an embedded subscriber identity module (eSIM card for short, also called a non-pluggable SIM card; SIM, english full name Subscriber Identity Module) mode to limit the customized mobile phone in order to protect the interests of the operator. But after the contract expires, the user's demand for switching networks cannot be satisfied.
Disclosure of Invention
The disclosure provides a communication network switching method, a device, equipment and a readable medium.
The first aspect of the present disclosure provides a communication network switching method, which is applied to a terminal, wherein the terminal includes a first user identification card and a second user identification card, and the method includes:
Acquiring contract expiration indication information of the first user identity card when the first user identity card is in an activated state and the second user identity card is in a deactivated state, wherein the first user identity card is an embedded user identity card for providing a first communication network service;
And switching the first user identification card to a disabled state and the second user identification card to an activated state according to the contract expiration indication information so as to switch from the first communication network to the second communication network.
A second aspect of the present disclosure provides a communication network switching device applied to a terminal, where the terminal includes a first subscriber identity card and a second subscriber identity card, the device includes:
The system comprises an acquisition module, a second user identity card and a first communication network service module, wherein the acquisition module is used for acquiring contract expiration indication information of the first user identity card when the first user identity card is in an activated state and the second user identity card is in a disabled state;
And the switching module is used for switching the first user identity identification card into a disabled state and the second user identity identification card into an activated state according to the contract expiration indication information so as to switch from the first communication network to the second communication network.
A third aspect of the present disclosure provides an electronic device, comprising:
at least one processor;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method according to the first aspect;
At least one I/O interface, connected between the processor and the memory, configured to enable information interaction of the processor and the memory.
A fourth aspect of the present disclosure provides a computer readable medium having stored thereon a computer program which, when executed by a processor, implements a method according to the first aspect.
The present disclosure has the following advantages:
The method comprises the steps that a first user identity card and a second user identity card are arranged in a terminal, the first user identity card is in an activated state, the first user identity card is an embedded user identity card for providing a first communication network service, the second user identity card is in a disabled state, the second user identity card is a pluggable user identity card for providing a second communication network service, under the condition that contract expiration indication information of the first user identity card is acquired, the first user identity card is switched to a disabled state, and the second user identity card is switched to an activated state, so that the first communication network is switched to the second communication network. Therefore, the embedded first user identification card is ensured to provide the first communication network service in the contract period, normal service of contract operators in the contract period is ensured, and after contract expiration indication information of the first user identification card, the second user identification card providing the second communication network service can be activated and the first user identification card is disabled, so that the second user identification card which can be plugged and unplugged can be switched after the contract is expired, the second user identification card provided by each operator can be freely selected after the contract is expired, and the contract users can freely select the operators providing the service after the contract is expired.
Drawings
Fig. 1 is a schematic flow chart of a network switching method provided in an embodiment of the disclosure;
fig. 2 is a schematic diagram of an unlocking code acquiring process provided in an embodiment of the disclosure;
Fig. 3 is a schematic diagram of an unlock code generation and storage process provided in an embodiment of the present disclosure;
Fig. 4 is a schematic structural diagram of a network switching device provided in an embodiment of the disclosure;
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
As used in this disclosure, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
When the terms "comprises" and/or "comprising," "including," are used in this disclosure, they specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used in this disclosure have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The embodiment of the disclosure provides a communication network switching method, which is applied to a contract type terminal, wherein the terminal comprises a first user identity card and a second user identity card, the first user identity card is an embedded user identity card (eSIM), and the second user identity card is a pluggable user identity card (called pSIM for short). During the contract period, the terminal defaults to using the eSIM card to ensure the benefits of the contract operator.
For a user, the single card is in an activated state in the same time period, but the terminal is actually provided with the eSIM card and the pSIM card at the same time, and the eSIM card and the pSIM are required to be respectively subjected to function inspection during production so as to prevent defective products from flowing out. The eSIM card is activated by default and the pSIM card is disabled after upgrade to the factory version.
Fig. 1 is a schematic flow chart of a network switching method provided by an embodiment of the present disclosure, and the method is executed by a contract type terminal to switch an operator network, and the method mainly includes the following steps:
Step 101, acquiring contract expiration indication information of a first user identification card under the condition that the first user identification card is in an activated state and a second user identification card is in a disabled state, wherein the first user identification card is an embedded user identification card for providing a first communication network service, and the second user identification card is a pluggable user identification card for providing a second communication network service.
In some embodiments, obtaining the contract expiration indication information of the first subscriber identity card includes obtaining the contract expiration indication information sent by an operator server providing the first communication network service, where the contract expiration indication information is transmitted from the operator server to the terminal in a short message, a telephone, or the like, or obtaining the contract expiration indication information triggered by an after-sales service person through an interface operation.
Step 102, switching the first subscriber identity card to a disabled state and the second subscriber identity card to an active state according to the contract expiration indication information, so as to switch from the first communication network to the second communication network.
In some embodiments, the first subscriber identity card is switched to the disabled state and the second subscriber identity card is switched to the activated state according to the contract expiration indication information, so that after the first communication network is switched to the second communication network, the first subscriber identity card is kept to be in the disabled state and the second subscriber identity card is kept in the activated state all the time, that is, the activated states of the first subscriber identity card and the second subscriber identity card are not changed due to user operation.
In The exemplary embodiment, after The first subscriber identity card is switched to The disabled state and The second subscriber identity card is switched to The enabled state, the operation on The terminal does not affect The states of The first subscriber identity card and The second subscriber identity card, where The operation on The terminal includes, but is not limited to, operations such as upgrading Over-The-Air (Fota) of The terminal, restoring factory settings, etc., which do not change The enabled state of The SIM card, that is, restoring The state in which The eSIM card is enabled and The pSIM card is disabled when factory leaving.
In some embodiments, switching a first subscriber identity card to a disabled state and a second subscriber identity card to an active state according to contract expiration indication information to switch from a first communication network to a second communication network includes obtaining an unlocking code according to the contract expiration indication information, judging whether the unlocking code is legal, and switching the first subscriber identity card to the disabled state and the second subscriber identity card to the active state to switch from the first communication network to the second communication network if the unlocking code is legal. The unlocking code is used for executing validity verification of the switching operation, the switching operation is determined to be legal under the condition that the unlocking code is legal, and the switching operation is determined to be illegal under the condition that the unlocking code is illegal.
In some embodiments, obtaining the unlocking code according to contract expiration indication information comprises obtaining a target engineering instruction recorded through an interactive interface, wherein the target engineering instruction is used for indicating to enter a user identity identification card switching interface, displaying the user identity identification card switching interface according to the target engineering instruction and the contract expiration indication information, and obtaining the unlocking code recorded in the user identity identification card switching interface.
The interactive interface may be a hidden man-machine interactive interface displayed after being called by an explicit man-machine interactive interface such as a dialing interface, or may be an explicit man-machine interactive interface capable of being directly called. For example, a dialing interface is called in a standby state, and an engineering instruction is input through the dialing interface to call an interactive interface for switching the SIM card.
In some embodiments, judging whether the unlocking code is legal comprises encrypting the unlocking code to obtain an encryption value, judging whether the encryption value is identical to a reference value stored in a designated storage space, wherein the designated storage space comprises one of a safe partition and an unerased partition, judging that the unlocking code is legal when the encryption value is identical to the reference value, and judging that the unlocking code is illegal when the encryption value is not identical to the reference value.
In some embodiments, encrypting the unlock code to obtain an encrypted value includes double-layer encrypting the unlock code using a secure hash algorithm and a message digest algorithm to obtain an encrypted value.
The encryption algorithm used for encrypting the unlocking code is a predetermined algorithm, and is the same as the encryption algorithm used in the generation process of the reference value stored in the specified storage space of the terminal, and the encryption algorithm used is not limited in particular. Illustratively, the encryption algorithm is an algorithm with an irreversible encryption process, so as to prevent cracking and improve security.
The reference value is stored in a storage area with high confidentiality, such as a safe partition, an erasable partition and the like, so that even if the terminal is completely erased and downloaded, the reference value cannot be cracked, and the safety is ensured.
In some embodiments, after the step of switching the first user identification card to the disabled state and the second user identification card to the activated state is performed under the condition that the unlocking code is legal, setting the value of the unlocking flag bit to a first preset value under the condition that the switching is determined to be successful, outputting prompt information that the switching is successful, and setting the value of the unlocking flag bit to a second preset value under the condition that the unlocking code is illegal, outputting prompt information that the switching is not successful.
Illustratively, the first preset value is 1 and the second preset value is 0. It should be noted that, specific values of the first preset value and the second preset value are only illustrative, and may be set according to needs in practical application, and only two values need to be distinguished, that is, the first preset value and the second preset value are different.
In some embodiments, according to the contract expiration indication information, obtaining an unlock code includes:
Sending an unlocking code acquisition request message to a specified server according to the contract expiration indication information;
receiving a response message returned by the designated server according to the unlocking code acquisition request message;
and extracting the unlocking code carried in the response message.
The specific form of the unlock code acquisition request message and the response message is not limited, and may be a form of a short message or a voice message.
In an exemplary embodiment, fig. 2 is a schematic diagram illustrating an unlock code acquisition process in an embodiment of the disclosure, and mainly includes:
(1) The method comprises the steps of displaying a standby interface, obtaining a target engineering instruction input in the standby interface, entering a pSIM/eSIM switching interface through the target engineering instruction, prompting a user to exit the switching interface after the user has successfully switched to a pSIM card if an unlocking zone bit is 1, prompting the user to input an unlocking code if the unlocking zone bit is 0 and is not switched to the pSIM card;
(2) After prompting the user to input the unlocking code, acquiring the unlocking code input by the user through the switching interface and judging whether the unlocking code is correct, if so, executing the instruction of switching from the eSIM card to the pSIM card, setting the unlocking mark as 1, and if not, prompting the user whether to reselect and input, and continuing to input the unlocking code or exiting the switching interface according to the selected operation of the user on the switching interface.
In an exemplary embodiment, fig. 3 is a schematic diagram illustrating a process of generating and storing an unlock code in an embodiment of the disclosure, which mainly includes:
(1) Generating an unlocking code in the production process of the terminal, storing the unlocking code in a production database, encrypting the unlocking code to generate a reference value, and storing the generated reference value in a secure partition or an unerased partition of the terminal, wherein for example, the unlocking code is subjected to double-layer encryption of a secure hash algorithm (such as sha 256) and a message digest algorithm (such as MD 5) to obtain the reference value, and the encryption scheme is irreversible so that a password cannot be pushed backwards;
(2) The after-sales staff acquires the unlocking code and inputs the unlocking code through an interactive interface of the terminal, the terminal encrypts the input unlocking code in the same encryption mode as the generation of the reference value, compares the value obtained by encryption with the reference value stored in the terminal, if the value is consistent, executes the operation of switching the eSIM to the pSIM, and if the value is inconsistent, prompts an error.
By storing the unlocking code in the production database, the user cannot obtain the unlocking code by himself, the value obtained by encrypting the password is stored in the terminal instead of directly storing the password, and the encryption algorithm is irreversible, so that the password cannot be cracked, and the safety is ensured.
In the embodiment of the disclosure, a first user identification card and a second user identification card are set in a terminal, the first user identification card is in an activated state, the first user identification card is an embedded user identification card for providing a first communication network service, and the second user identification card is in a disabled state, the second user identification card is a pluggable user identification card for providing a second communication network service, under the condition that contract expiration indication information of the first user identification card is acquired, the first user identification card is switched to a disabled state and the second user identification card is switched to an activated state, so that the first communication network is switched to the second communication network. Therefore, the embedded first user identification card is ensured to provide the first communication network service in the contract period, normal service of contract operators in the contract period is ensured, and after contract expiration indication information of the first user identification card, the second user identification card providing the second communication network service can be activated and the first user identification card is disabled, so that the second user identification card which can be plugged and unplugged can be switched after the contract is expired, the second user identification card provided by each operator can be freely selected after the contract is expired, and the contract users can freely select the operators providing the service after the contract is expired.
The above steps of the methods are divided, for clarity of description, and may be combined into one step or split into multiple steps when implemented, so long as they include the same logic relationship, and all the steps are within the scope of the disclosure, and adding insignificant modification to the algorithm or the process or introducing insignificant design, but not changing the core design of the algorithm and the process, are within the scope of the disclosure.
The embodiment of the disclosure provides a network switching device, which is applied to a terminal, wherein the terminal comprises a first user identity identification card and a second user identity identification card, and the implementation of the device can be referred to the related description of the embodiment of the method and is not repeated here. Fig. 4 is a schematic structural diagram of the device, mainly including:
The acquisition module 401 is configured to acquire contract expiration indication information of the first subscriber identity card when the first subscriber identity card is in an activated state and the second subscriber identity card is in a deactivated state, where the first subscriber identity card is an embedded subscriber identity card for providing a first communication network service;
And a switching module 402, configured to switch the first subscriber identity card to a disabled state and the second subscriber identity card to an activated state according to the contract expiration indication information, so as to switch from the first communication network to the second communication network.
In some embodiments, the switching module 402 is further to:
And switching the first user identification card into a disabled state and the second user identification card into an activated state according to the contract expiration indication information so as to keep the first user identification card in the disabled state and the second user identification card in the activated state all the time after switching from the first communication network to the second communication network.
In some embodiments, the switching module 402 is to:
Acquiring an unlocking code according to the contract expiration indication information;
judging whether the unlocking code is legal or not;
And under the condition that the unlocking code is legal, switching the first user identity identification card into a disabled state and switching the second user identity identification card into an activated state so as to switch from the first communication network to the second communication network.
In some embodiments, the switching module 402 is to:
acquiring a target engineering instruction input through an interactive interface, wherein the target engineering instruction is used for indicating to enter a user identity identification card switching interface;
Displaying the user identity identification card switching interface according to the target engineering instruction and the contract expiration indication information;
and acquiring the unlocking code input in the user identity identification card switching interface.
In some embodiments, the switching module 402 is to:
Encrypting the unlocking code to obtain an encryption value;
judging whether the encrypted value is the same as a reference value stored in a designated storage space or not, wherein the designated storage space comprises one of a safe partition and a non-erasable partition;
judging that the unlocking code is legal under the condition that the encryption value is the same as the reference value;
and under the condition that the encryption value is different from the reference value, judging that the unlocking code is illegal.
In some embodiments, the switching module 402 is further to:
After the step of switching the first user identity identification card to a disabled state and the step of switching the second user identity identification card to an active state are executed under the condition that the unlocking code is legal, setting the value of an unlocking zone bit to a first preset value under the condition that the switching is determined to be successful, and outputting prompt information that the switching is successful;
And under the condition that the unlocking code is illegal, setting the value of the unlocking zone bit as a second preset value, and outputting prompt information of successful non-switching.
In some embodiments, the switching module 402 is to:
and carrying out double-layer encryption on the unlocking code by adopting a secure hash algorithm and a message digest algorithm to obtain an encrypted value.
In some embodiments, the switching module 402 is to:
Sending an unlocking code acquisition request message to a specified server according to the contract expiration indication information;
receiving a response message returned by the designated server according to the unlocking code acquisition request message;
and extracting the unlocking code carried in the response message.
The functions or modules included in the apparatus provided by the embodiments of the present disclosure may be used to perform the methods described in the method embodiments, and specific implementation and technical effects thereof may refer to the descriptions of the method embodiments above, which are not repeated herein for brevity.
In this embodiment, each module is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of a plurality of physical units. In addition, in order to highlight the innovative part of the present disclosure, elements that are not so close to solving the technical problem presented in the present disclosure are not introduced in the present embodiment, but it does not indicate that other elements are not present in the present embodiment.
Referring to fig. 5, an embodiment of the present disclosure provides an electronic device including:
At least one processor 501;
A memory 502 having at least one program stored thereon, which when executed by the at least one processor causes the at least one processor to perform the above-described method;
at least one I/O interface 503, coupled between the processor and the memory, is configured to enable information interaction of the processor with the memory.
The processor 501 is a device with data processing capability, including but not limited to a Central Processing Unit (CPU), the memory 502 is a device with data storage capability, including but not limited to a random access memory (RAM, more specifically SDRAM, DDR, etc.), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a FLASH memory (FLASH), and an I/O interface (read/write interface) 503 is connected between the processor 501 and the memory 502, so as to enable information interaction between the processor 501 and the memory 502, including but not limited to a data Bus (Bus), etc.
In some embodiments, processor 501, memory 502, and I/O interface 503 are interconnected by a bus, which in turn is connected to other components of a computing device.
The present embodiment also provides a computer readable medium, on which a computer program is stored, where the program when executed by a processor implements the method provided in the present embodiment, and specific steps of the method are not described herein in detail to avoid repetitive description.
Those of ordinary skill in the art will appreciate that all or some of the steps in the methods, systems, functional modules/units in the apparatus as applied above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components, for example, one physical component may have a plurality of functions, or one function or step may be cooperatively performed by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the embodiments and form different embodiments.
It is to be understood that the above embodiments are merely exemplary embodiments employed to illustrate the principles of the present disclosure, however, the present disclosure is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the disclosure, and are also considered to be within the scope of the disclosure.

Claims (10)

1.一种通信网络切换方法,应用于终端,所述终端中包括第一用户身份识别卡和第二用户身份识别卡;所述方法包括:1. A communication network switching method, applied to a terminal, wherein the terminal includes a first user identity card and a second user identity card; the method comprises: 在所述第一用户身份识别卡处于激活态,且所述第二用户身份识别卡处于禁用态的情况下,获取所述第一用户身份识别卡的合约到期指示信息;其中,所述第一用户身份识别卡为用于提供第一通信网络服务的嵌入式的用户身份识别卡;所述第二用户身份识别卡为用于提供第二通信网络服务的可插拔的用户身份识别卡;When the first user identity card is in an activated state and the second user identity card is in a disabled state, obtaining contract expiration indication information of the first user identity card; wherein the first user identity card is an embedded user identity card for providing a first communication network service; and the second user identity card is a pluggable user identity card for providing a second communication network service; 根据所述合约到期指示信息,将所述第一用户身份识别卡切换为禁用态且所述第二用户身份识别卡切换为激活态,以从所述第一通信网络切换到所述第二通信网络。According to the contract expiration indication information, the first user identity card is switched to a disabled state and the second user identity card is switched to an activated state, so as to switch from the first communication network to the second communication network. 2.根据权利要求1所述的方法,其中,所述方法还包括:2. The method according to claim 1, wherein the method further comprises: 根据所述合约到期指示信息,将所述第一用户身份识别卡切换为禁用态且所述第二用户身份识别卡切换为激活态,以从所述第一通信网络切换到所述第二通信网络之后,一直保持所述第一用户身份识别卡为禁用态且所述第二用户身份识别卡为激活态。According to the contract expiration indication information, the first user identity identification card is switched to a disabled state and the second user identity identification card is switched to an activated state, so that after switching from the first communication network to the second communication network, the first user identity identification card is kept in a disabled state and the second user identity identification card is kept in an activated state. 3.根据权利要求1所述的方法,其中,根据所述合约到期指示信息,将所述第一用户身份识别卡切换为禁用态且所述第二用户身份识别卡切换为激活态,以从所述第一通信网络切换到所述第二通信网络,包括:3. The method according to claim 1, wherein, according to the contract expiration indication information, switching the first user identity card to a disabled state and the second user identity card to an activated state to switch from the first communication network to the second communication network comprises: 根据所述合约到期指示信息,获取解锁码;Obtaining an unlock code according to the contract expiration indication information; 判断所述解锁码是否合法;Determining whether the unlock code is legal; 在所述解锁码合法的情况下,将所述第一用户身份识别卡切换为禁用态且所述第二用户身份识别卡切换为激活态,以从所述第一通信网络切换到所述第二通信网络。When the unlock code is legal, the first user identity card is switched to a disabled state and the second user identity card is switched to an activated state, so as to switch from the first communication network to the second communication network. 4.根据权利要求3所述的方法,其中,所述根据所述合约到期指示信息,获取解锁码,包括:4. The method according to claim 3, wherein obtaining an unlock code according to the contract expiration indication information comprises: 获取通过交互界面录入的目标工程指令,其中,所述目标工程指令用于指示进入用户身份识别卡切换界面;Acquire a target engineering instruction entered through an interactive interface, wherein the target engineering instruction is used to instruct to enter a user identity card switching interface; 根据所述目标工程指令以及所述合约到期指示信息显示所述用户身份识别卡切换界面;Displaying the user identity card switching interface according to the target engineering instruction and the contract expiration indication information; 获取在所述用户身份识别卡切换界面录入的所述解锁码。Obtain the unlock code entered in the user identity card switching interface. 5.根据权利要求3所述的方法,其中,判断所述解锁码是否合法,包括:5. The method according to claim 3, wherein determining whether the unlock code is legal comprises: 对所述解锁码进行加密获得加密值;Encrypting the unlock code to obtain an encrypted value; 判断所述加密值与存储在指定存储空间的参考值是否相同,其中,所述指定存储空间包括以下之一:安全分区、不可擦除分区;Determining whether the encrypted value is the same as a reference value stored in a designated storage space, wherein the designated storage space includes one of the following: a secure partition and an inerasable partition; 在所述加密值与所述参考值相同的情况下,判定所述解锁码合法;In the case where the encrypted value is the same as the reference value, determining that the unlocking code is legal; 在所述加密值与所述参考值不相同的情况下,判定所述解锁码不合法。In the case that the encrypted value is different from the reference value, it is determined that the unlocking code is illegal. 6.根据权利要求5所述的方法,其中,所述方法还包括:6. The method according to claim 5, wherein the method further comprises: 在所述解锁码合法的情况下,执行所述将所述第一用户身份识别卡切换为禁用态且所述第二用户身份识别卡切换为激活态的步骤之后,在确定切换成功的情况下,设置解锁标志位的值为第一预设值,输出已切换成功的提示信息;If the unlock code is legal, after executing the step of switching the first user identity card to a disabled state and the second user identity card to an activated state, if it is determined that the switching is successful, setting the value of the unlock flag to a first preset value and outputting a prompt message that the switching is successful; 在所述解锁码不合法的情况下,设置解锁标志位的值为第二预设值,输出未切换成功的提示信息。In the case that the unlock code is illegal, the value of the unlock flag is set to a second preset value, and a prompt message indicating that the switching is not successful is output. 7.根据权利要求5所述的方法,其中,所述对所述解锁码进行加密获得加密值,包括:7. The method according to claim 5, wherein encrypting the unlocking code to obtain an encrypted value comprises: 采用安全散列算法和消息摘要算法对所述解锁码进行双层加密,获得加密值。The unlock code is double-encrypted using a secure hash algorithm and a message digest algorithm to obtain an encrypted value. 8.根据权利要求3所述的方法,其中,根据所述合约到期指示信息,获取解锁码,包括:8. The method according to claim 3, wherein obtaining an unlock code according to the contract expiration indication information comprises: 根据所述合约到期指示信息,向指定服务器发送解锁码获取请求消息;Sending an unlock code acquisition request message to a designated server according to the contract expiration indication information; 接收所述指定服务器根据所述解锁码获取请求消息返回的响应消息;Receiving a response message returned by the designated server according to the unlock code acquisition request message; 提取所述响应消息中携带的所述解锁码。Extract the unlock code carried in the response message. 9.一种电子设备,包括:9. An electronic device, comprising: 至少一个处理器;at least one processor; 存储器,其上存储有至少一个程序,当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现根据权利要求1-8中任意一项所述的方法;A memory having at least one program stored thereon, wherein when the at least one program is executed by the at least one processor, the at least one processor implements the method according to any one of claims 1 to 8; 至少一个I/O接口,连接在所述处理器与存储器之间,配置为实现所述处理器与存储器的信息交互。At least one I/O interface is connected between the processor and the memory and is configured to implement information interaction between the processor and the memory. 10.一种计算机可读介质,其上存储有计算机程序,所述程序被处理器执行时实现根据权利要求1-8中任意一项所述的方法。10. A computer readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method according to any one of claims 1 to 8.
CN202311051881.5A 2023-08-17 2023-08-17 Communication network switching method, device, equipment and readable medium Pending CN119497177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311051881.5A CN119497177A (en) 2023-08-17 2023-08-17 Communication network switching method, device, equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311051881.5A CN119497177A (en) 2023-08-17 2023-08-17 Communication network switching method, device, equipment and readable medium

Publications (1)

Publication Number Publication Date
CN119497177A true CN119497177A (en) 2025-02-21

Family

ID=94620351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311051881.5A Pending CN119497177A (en) 2023-08-17 2023-08-17 Communication network switching method, device, equipment and readable medium

Country Status (1)

Country Link
CN (1) CN119497177A (en)

Similar Documents

Publication Publication Date Title
EP3905078B1 (en) Identity verification method and system therefor
US10587591B2 (en) Generating a password
KR102307665B1 (en) identity authentication
CN107103245B (en) File authority management method and device
US9325683B2 (en) Mobile application management framework
US20130159699A1 (en) Password Recovery Service
US20080183771A1 (en) System and method for managing files
BRPI1100749A2 (en) network and device authentication method to implement the same
US20160227413A1 (en) Terminal, Network Locking and Network Uunlocking Method for Same, and Storage Medium
CN113472774A (en) Account login-free method, system, device and computer readable storage medium
CN111614698A (en) Method and device for erasing terminal data
WO2022052665A1 (en) Wireless terminal and interface access authentication method for wireless terminal in uboot mode
CN112182555A (en) Weak password detection method, device, electronic apparatus, storage medium, and program
CN105809045A (en) Method and device for processing equipment systems during data reset
US10789518B2 (en) Barcode-based enrollment of devices with a management service
CN110830930B (en) Verification code anti-sniffing processing method and device
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
CN119497177A (en) Communication network switching method, device, equipment and readable medium
CN117892319A (en) Method and device for reading encrypted data of solid state disk and readable storage medium
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium
CN112154634A (en) Application Access Control
CN110505295B (en) Unlocking information setting method, device and equipment
CN114580005A (en) Data access method, computer device and readable storage medium
CN113886802A (en) Security authentication method, device, electronic device and storage medium
CN113099453A (en) Authentication method, device and equipment for access server and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication