Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
As used in this disclosure, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
When the terms "comprises" and/or "comprising," "including," are used in this disclosure, they specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used in this disclosure have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The embodiment of the disclosure provides a communication network switching method, which is applied to a contract type terminal, wherein the terminal comprises a first user identity card and a second user identity card, the first user identity card is an embedded user identity card (eSIM), and the second user identity card is a pluggable user identity card (called pSIM for short). During the contract period, the terminal defaults to using the eSIM card to ensure the benefits of the contract operator.
For a user, the single card is in an activated state in the same time period, but the terminal is actually provided with the eSIM card and the pSIM card at the same time, and the eSIM card and the pSIM are required to be respectively subjected to function inspection during production so as to prevent defective products from flowing out. The eSIM card is activated by default and the pSIM card is disabled after upgrade to the factory version.
Fig. 1 is a schematic flow chart of a network switching method provided by an embodiment of the present disclosure, and the method is executed by a contract type terminal to switch an operator network, and the method mainly includes the following steps:
Step 101, acquiring contract expiration indication information of a first user identification card under the condition that the first user identification card is in an activated state and a second user identification card is in a disabled state, wherein the first user identification card is an embedded user identification card for providing a first communication network service, and the second user identification card is a pluggable user identification card for providing a second communication network service.
In some embodiments, obtaining the contract expiration indication information of the first subscriber identity card includes obtaining the contract expiration indication information sent by an operator server providing the first communication network service, where the contract expiration indication information is transmitted from the operator server to the terminal in a short message, a telephone, or the like, or obtaining the contract expiration indication information triggered by an after-sales service person through an interface operation.
Step 102, switching the first subscriber identity card to a disabled state and the second subscriber identity card to an active state according to the contract expiration indication information, so as to switch from the first communication network to the second communication network.
In some embodiments, the first subscriber identity card is switched to the disabled state and the second subscriber identity card is switched to the activated state according to the contract expiration indication information, so that after the first communication network is switched to the second communication network, the first subscriber identity card is kept to be in the disabled state and the second subscriber identity card is kept in the activated state all the time, that is, the activated states of the first subscriber identity card and the second subscriber identity card are not changed due to user operation.
In The exemplary embodiment, after The first subscriber identity card is switched to The disabled state and The second subscriber identity card is switched to The enabled state, the operation on The terminal does not affect The states of The first subscriber identity card and The second subscriber identity card, where The operation on The terminal includes, but is not limited to, operations such as upgrading Over-The-Air (Fota) of The terminal, restoring factory settings, etc., which do not change The enabled state of The SIM card, that is, restoring The state in which The eSIM card is enabled and The pSIM card is disabled when factory leaving.
In some embodiments, switching a first subscriber identity card to a disabled state and a second subscriber identity card to an active state according to contract expiration indication information to switch from a first communication network to a second communication network includes obtaining an unlocking code according to the contract expiration indication information, judging whether the unlocking code is legal, and switching the first subscriber identity card to the disabled state and the second subscriber identity card to the active state to switch from the first communication network to the second communication network if the unlocking code is legal. The unlocking code is used for executing validity verification of the switching operation, the switching operation is determined to be legal under the condition that the unlocking code is legal, and the switching operation is determined to be illegal under the condition that the unlocking code is illegal.
In some embodiments, obtaining the unlocking code according to contract expiration indication information comprises obtaining a target engineering instruction recorded through an interactive interface, wherein the target engineering instruction is used for indicating to enter a user identity identification card switching interface, displaying the user identity identification card switching interface according to the target engineering instruction and the contract expiration indication information, and obtaining the unlocking code recorded in the user identity identification card switching interface.
The interactive interface may be a hidden man-machine interactive interface displayed after being called by an explicit man-machine interactive interface such as a dialing interface, or may be an explicit man-machine interactive interface capable of being directly called. For example, a dialing interface is called in a standby state, and an engineering instruction is input through the dialing interface to call an interactive interface for switching the SIM card.
In some embodiments, judging whether the unlocking code is legal comprises encrypting the unlocking code to obtain an encryption value, judging whether the encryption value is identical to a reference value stored in a designated storage space, wherein the designated storage space comprises one of a safe partition and an unerased partition, judging that the unlocking code is legal when the encryption value is identical to the reference value, and judging that the unlocking code is illegal when the encryption value is not identical to the reference value.
In some embodiments, encrypting the unlock code to obtain an encrypted value includes double-layer encrypting the unlock code using a secure hash algorithm and a message digest algorithm to obtain an encrypted value.
The encryption algorithm used for encrypting the unlocking code is a predetermined algorithm, and is the same as the encryption algorithm used in the generation process of the reference value stored in the specified storage space of the terminal, and the encryption algorithm used is not limited in particular. Illustratively, the encryption algorithm is an algorithm with an irreversible encryption process, so as to prevent cracking and improve security.
The reference value is stored in a storage area with high confidentiality, such as a safe partition, an erasable partition and the like, so that even if the terminal is completely erased and downloaded, the reference value cannot be cracked, and the safety is ensured.
In some embodiments, after the step of switching the first user identification card to the disabled state and the second user identification card to the activated state is performed under the condition that the unlocking code is legal, setting the value of the unlocking flag bit to a first preset value under the condition that the switching is determined to be successful, outputting prompt information that the switching is successful, and setting the value of the unlocking flag bit to a second preset value under the condition that the unlocking code is illegal, outputting prompt information that the switching is not successful.
Illustratively, the first preset value is 1 and the second preset value is 0. It should be noted that, specific values of the first preset value and the second preset value are only illustrative, and may be set according to needs in practical application, and only two values need to be distinguished, that is, the first preset value and the second preset value are different.
In some embodiments, according to the contract expiration indication information, obtaining an unlock code includes:
Sending an unlocking code acquisition request message to a specified server according to the contract expiration indication information;
receiving a response message returned by the designated server according to the unlocking code acquisition request message;
and extracting the unlocking code carried in the response message.
The specific form of the unlock code acquisition request message and the response message is not limited, and may be a form of a short message or a voice message.
In an exemplary embodiment, fig. 2 is a schematic diagram illustrating an unlock code acquisition process in an embodiment of the disclosure, and mainly includes:
(1) The method comprises the steps of displaying a standby interface, obtaining a target engineering instruction input in the standby interface, entering a pSIM/eSIM switching interface through the target engineering instruction, prompting a user to exit the switching interface after the user has successfully switched to a pSIM card if an unlocking zone bit is 1, prompting the user to input an unlocking code if the unlocking zone bit is 0 and is not switched to the pSIM card;
(2) After prompting the user to input the unlocking code, acquiring the unlocking code input by the user through the switching interface and judging whether the unlocking code is correct, if so, executing the instruction of switching from the eSIM card to the pSIM card, setting the unlocking mark as 1, and if not, prompting the user whether to reselect and input, and continuing to input the unlocking code or exiting the switching interface according to the selected operation of the user on the switching interface.
In an exemplary embodiment, fig. 3 is a schematic diagram illustrating a process of generating and storing an unlock code in an embodiment of the disclosure, which mainly includes:
(1) Generating an unlocking code in the production process of the terminal, storing the unlocking code in a production database, encrypting the unlocking code to generate a reference value, and storing the generated reference value in a secure partition or an unerased partition of the terminal, wherein for example, the unlocking code is subjected to double-layer encryption of a secure hash algorithm (such as sha 256) and a message digest algorithm (such as MD 5) to obtain the reference value, and the encryption scheme is irreversible so that a password cannot be pushed backwards;
(2) The after-sales staff acquires the unlocking code and inputs the unlocking code through an interactive interface of the terminal, the terminal encrypts the input unlocking code in the same encryption mode as the generation of the reference value, compares the value obtained by encryption with the reference value stored in the terminal, if the value is consistent, executes the operation of switching the eSIM to the pSIM, and if the value is inconsistent, prompts an error.
By storing the unlocking code in the production database, the user cannot obtain the unlocking code by himself, the value obtained by encrypting the password is stored in the terminal instead of directly storing the password, and the encryption algorithm is irreversible, so that the password cannot be cracked, and the safety is ensured.
In the embodiment of the disclosure, a first user identification card and a second user identification card are set in a terminal, the first user identification card is in an activated state, the first user identification card is an embedded user identification card for providing a first communication network service, and the second user identification card is in a disabled state, the second user identification card is a pluggable user identification card for providing a second communication network service, under the condition that contract expiration indication information of the first user identification card is acquired, the first user identification card is switched to a disabled state and the second user identification card is switched to an activated state, so that the first communication network is switched to the second communication network. Therefore, the embedded first user identification card is ensured to provide the first communication network service in the contract period, normal service of contract operators in the contract period is ensured, and after contract expiration indication information of the first user identification card, the second user identification card providing the second communication network service can be activated and the first user identification card is disabled, so that the second user identification card which can be plugged and unplugged can be switched after the contract is expired, the second user identification card provided by each operator can be freely selected after the contract is expired, and the contract users can freely select the operators providing the service after the contract is expired.
The above steps of the methods are divided, for clarity of description, and may be combined into one step or split into multiple steps when implemented, so long as they include the same logic relationship, and all the steps are within the scope of the disclosure, and adding insignificant modification to the algorithm or the process or introducing insignificant design, but not changing the core design of the algorithm and the process, are within the scope of the disclosure.
The embodiment of the disclosure provides a network switching device, which is applied to a terminal, wherein the terminal comprises a first user identity identification card and a second user identity identification card, and the implementation of the device can be referred to the related description of the embodiment of the method and is not repeated here. Fig. 4 is a schematic structural diagram of the device, mainly including:
The acquisition module 401 is configured to acquire contract expiration indication information of the first subscriber identity card when the first subscriber identity card is in an activated state and the second subscriber identity card is in a deactivated state, where the first subscriber identity card is an embedded subscriber identity card for providing a first communication network service;
And a switching module 402, configured to switch the first subscriber identity card to a disabled state and the second subscriber identity card to an activated state according to the contract expiration indication information, so as to switch from the first communication network to the second communication network.
In some embodiments, the switching module 402 is further to:
And switching the first user identification card into a disabled state and the second user identification card into an activated state according to the contract expiration indication information so as to keep the first user identification card in the disabled state and the second user identification card in the activated state all the time after switching from the first communication network to the second communication network.
In some embodiments, the switching module 402 is to:
Acquiring an unlocking code according to the contract expiration indication information;
judging whether the unlocking code is legal or not;
And under the condition that the unlocking code is legal, switching the first user identity identification card into a disabled state and switching the second user identity identification card into an activated state so as to switch from the first communication network to the second communication network.
In some embodiments, the switching module 402 is to:
acquiring a target engineering instruction input through an interactive interface, wherein the target engineering instruction is used for indicating to enter a user identity identification card switching interface;
Displaying the user identity identification card switching interface according to the target engineering instruction and the contract expiration indication information;
and acquiring the unlocking code input in the user identity identification card switching interface.
In some embodiments, the switching module 402 is to:
Encrypting the unlocking code to obtain an encryption value;
judging whether the encrypted value is the same as a reference value stored in a designated storage space or not, wherein the designated storage space comprises one of a safe partition and a non-erasable partition;
judging that the unlocking code is legal under the condition that the encryption value is the same as the reference value;
and under the condition that the encryption value is different from the reference value, judging that the unlocking code is illegal.
In some embodiments, the switching module 402 is further to:
After the step of switching the first user identity identification card to a disabled state and the step of switching the second user identity identification card to an active state are executed under the condition that the unlocking code is legal, setting the value of an unlocking zone bit to a first preset value under the condition that the switching is determined to be successful, and outputting prompt information that the switching is successful;
And under the condition that the unlocking code is illegal, setting the value of the unlocking zone bit as a second preset value, and outputting prompt information of successful non-switching.
In some embodiments, the switching module 402 is to:
and carrying out double-layer encryption on the unlocking code by adopting a secure hash algorithm and a message digest algorithm to obtain an encrypted value.
In some embodiments, the switching module 402 is to:
Sending an unlocking code acquisition request message to a specified server according to the contract expiration indication information;
receiving a response message returned by the designated server according to the unlocking code acquisition request message;
and extracting the unlocking code carried in the response message.
The functions or modules included in the apparatus provided by the embodiments of the present disclosure may be used to perform the methods described in the method embodiments, and specific implementation and technical effects thereof may refer to the descriptions of the method embodiments above, which are not repeated herein for brevity.
In this embodiment, each module is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of a plurality of physical units. In addition, in order to highlight the innovative part of the present disclosure, elements that are not so close to solving the technical problem presented in the present disclosure are not introduced in the present embodiment, but it does not indicate that other elements are not present in the present embodiment.
Referring to fig. 5, an embodiment of the present disclosure provides an electronic device including:
At least one processor 501;
A memory 502 having at least one program stored thereon, which when executed by the at least one processor causes the at least one processor to perform the above-described method;
at least one I/O interface 503, coupled between the processor and the memory, is configured to enable information interaction of the processor with the memory.
The processor 501 is a device with data processing capability, including but not limited to a Central Processing Unit (CPU), the memory 502 is a device with data storage capability, including but not limited to a random access memory (RAM, more specifically SDRAM, DDR, etc.), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a FLASH memory (FLASH), and an I/O interface (read/write interface) 503 is connected between the processor 501 and the memory 502, so as to enable information interaction between the processor 501 and the memory 502, including but not limited to a data Bus (Bus), etc.
In some embodiments, processor 501, memory 502, and I/O interface 503 are interconnected by a bus, which in turn is connected to other components of a computing device.
The present embodiment also provides a computer readable medium, on which a computer program is stored, where the program when executed by a processor implements the method provided in the present embodiment, and specific steps of the method are not described herein in detail to avoid repetitive description.
Those of ordinary skill in the art will appreciate that all or some of the steps in the methods, systems, functional modules/units in the apparatus as applied above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components, for example, one physical component may have a plurality of functions, or one function or step may be cooperatively performed by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the embodiments and form different embodiments.
It is to be understood that the above embodiments are merely exemplary embodiments employed to illustrate the principles of the present disclosure, however, the present disclosure is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the disclosure, and are also considered to be within the scope of the disclosure.