CN104902462A - Traffic-saving method for accessing network by mobile terminal and mobile terminal - Google Patents

Traffic-saving method for accessing network by mobile terminal and mobile terminal Download PDF

Info

Publication number
CN104902462A
CN104902462A CN201510377213.0A CN201510377213A CN104902462A CN 104902462 A CN104902462 A CN 104902462A CN 201510377213 A CN201510377213 A CN 201510377213A CN 104902462 A CN104902462 A CN 104902462A
Authority
CN
China
Prior art keywords
mobile terminal
data
network
proxy server
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510377213.0A
Other languages
Chinese (zh)
Other versions
CN104902462B (en
Inventor
肖成凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 360 Zhiling Technology Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510377213.0A priority Critical patent/CN104902462B/en
Priority to CN201811629915.3A priority patent/CN109587270B/en
Publication of CN104902462A publication Critical patent/CN104902462A/en
Application granted granted Critical
Publication of CN104902462B publication Critical patent/CN104902462B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of communication and discloses a traffic-saving method for accessing a network by a mobile terminal and the mobile terminal and aims at solving the technical problem in the prior art that users of the mobile terminal access the network by consuming a large amount of data traffic of the mobile terminal. The method comprises the following steps that a data access request is transmitted to a proxy server by a mobile communication operator, so that the proxy server transmits the data access request to a resource compression server, wherein the data access request is used for acquiring requested data from a resource server by the resource compression server and compressing the requested data; the compressed requested data transmitted by the proxy server are received by the network of the network communication operator; all or partial data traffic generated by accessing the network by the mobile terminal through the proxy server is counted into a designated service provider by a mobile network operator based on a traffic-free identifier. The traffic-saving method achieves the technical effect of reducing data traffic consumed for accessing the network by the mobile terminal.

Description

Method for mobile terminal to access network in flow-saving mode and mobile terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a method for a mobile terminal to access a network in a stream-saving manner and a mobile terminal.
Background
With the continuous development of science and technology, electronic technology has also gained rapid development, and the variety of electronic products is also more and more, and people also enjoy various conveniences brought by the development of science and technology. People can enjoy comfortable life brought along with the development of science and technology through various types of mobile terminals. For example, mobile terminals such as smart phones and tablet computers have become an important part of people's lives, and users can listen to music, play games and the like by using the mobile terminals such as smart phones and tablet computers, so as to relieve pressure brought by modern fast-paced lives.
In general, a mobile terminal has a network access function, and the mobile terminal needs to consume data traffic of a user of the mobile terminal when accessing a network, and pays a fee to an operator providing a network service according to the consumed data traffic. In the prior art, the data traffic used by the user can only be charged by an operator, so that the technical problem that the user of the mobile terminal needs to consume a large amount of data traffic of the mobile terminal when accessing the network in the prior art is caused;
since the network traffic of the mobile terminal is expensive, the user of the mobile terminal is forced to pay a large amount of cost for the mobile terminal, so that the enthusiasm of the user for accessing the network is obviously reduced, and the popularization and the development of the mobile internet technology are not facilitated.
Disclosure of Invention
In view of the above, the present invention is proposed in order to provide a method for a mobile terminal to have a reduced-flow access to a network and a mobile terminal that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a method for provincial flow access to a network, comprising:
the method comprises the steps that a proxy server receives a data access request of a mobile terminal for accessing a network through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet;
the proxy server sends the data access request to a resource compression server so that the resource compression server acquires the requested data from a resource server based on the data access request and compresses the requested data;
the proxy server receives the compressed requested data sent by the resource compression server;
the proxy server sends the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further includes:
the resource compression server compresses the requested data in a lossy compression mode; and/or the presence of a gas in the gas,
and the resource compression server compresses the requested data in a lossless compression mode.
Optionally, the resource compression server compresses the requested data in a lossy compression manner, including:
when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
and when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the code data to the mobile terminal.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specific service provider based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the method further includes:
the proxy server sends a preset tag to the mobile terminal, the preset tag is carried when the mobile terminal carries out data transmission in the network access process, and the preset tag is the flow-free identifier; or,
the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
Optionally, the method further includes:
and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period, and obtains the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the method further includes:
the proxy server sends the data traffic information consumed by the mobile terminal to a distribution server;
and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Optionally, the method further includes:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal;
the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
and when determining that the communication identifier has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, when determining that the communication identifier has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal, which specifically includes:
the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of the specified service provider;
the distribution server judges whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information;
and the distribution server distributes the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the method further includes:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, and specifically comprises the following steps: the proxy server receives the data access request carrying the identity authentication information sent by the mobile terminal;
the proxy server sends the data access request to a resource compression server, and the method comprises the following steps:
the proxy server verifies the validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, after the proxy server prompts that the mobile terminal has logged off, the distribution server logs off the temporary authentication information.
Optionally, if the proxy server prompts that the mobile terminal has logged off, the method further includes:
the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to a distribution server;
and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, after the allocating the proxy server to the mobile terminal, the method further includes:
the distribution server sends the free residual flow information to the proxy server;
the sending, by the proxy server, the data access request to a resource compression server specifically includes: after receiving the data access request, the proxy server judges whether the latest free residual flow of the mobile terminal is greater than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
According to another aspect of the present invention, there is provided a proxy server including:
the mobile terminal comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving a data access request of the mobile terminal for accessing a network through a network of a mobile communication operator, the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority;
the first sending module is used for sending the data access request to a resource compression server so that the resource compression server obtains requested data from a resource server based on the data access request and compresses the requested data;
a second receiving module, configured to receive the compressed requested data sent by the resource compression server;
a second sending module, configured to send the compressed requested data to the mobile terminal through the network of the mobile communications carrier;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specific service provider based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the proxy server further includes:
a third sending module, configured to send a preset tag to the mobile terminal, where the preset tag is carried when the mobile terminal performs data transmission in a network access process, and the preset tag is the traffic-free identifier; or,
the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
According to another aspect of the present invention, there is provided a network access system, including the proxy server and the resource compression server described in any embodiment of the present invention, wherein the resource compression server includes a first compression module, configured to compress the requested data in a lossy compression manner; and/or the presence of a gas in the gas,
and the second compression module is used for compressing the requested data in a lossless compression mode.
Optionally, the first compression module is configured to:
when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
and when the requested data contains code data, removing redundant codes in the code data and then sending the code data to the mobile terminal.
Optionally, the proxy server further includes:
the first statistical module is used for counting data traffic information consumed by the mobile terminal according to a preset statistical period and obtaining the latest free residual traffic information of the mobile terminal with the traffic-free permission.
Optionally, the system further includes: a distribution server;
the proxy server further comprises: a fourth sending module, configured to send the data traffic information consumed by the mobile terminal to the distribution server;
the distribution server includes: and the determining module is used for determining the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Optionally, the distribution server further includes:
the third receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal;
the verification module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the allocation module specifically includes:
the obtaining unit is used for obtaining free residual flow information of the communication identifier charged by adopting a charging mode of the specified service provider;
the judging unit is used for judging whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information;
and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the distribution server further includes:
the generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the proxy server;
the first receiving module is specifically configured to receive, by the proxy server, the data access request carrying the authentication information and sent by the mobile terminal;
the sending module is specifically configured to verify the validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, the distribution server further includes:
and the logout module is used for logging out the temporary verification information after the proxy server prompts that the mobile terminal logs out.
Optionally, the proxy server further includes:
a fifth sending module, configured to send the initial internet surfing time, the end internet surfing time, and the consumed data traffic information of the mobile terminal to a distribution server if the proxy server prompts that the mobile terminal has logged off;
the distribution server further comprises a second statistical module used for carrying out statistics on the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, the distribution server further includes:
a sixth sending module, configured to send the free remaining traffic information to the proxy server;
the first sending module is used for judging whether the latest free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
Optionally, the method further includes: a mobile terminal as described in any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a method for a mobile terminal to access a network in a provincial flow, comprising:
sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a net surfing flow-free authority, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
receiving the compressed requested data sent by the proxy server through the network of the mobile communication operator, wherein the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the charging, by a mobile network operator, all or part of data traffic generated during a process in which the mobile terminal accesses the network through the proxy server into a specific service provider based on the traffic-free identifier includes:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specified service provider based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
Optionally, before sending the data access request to the proxy server through the network of the mobile communication carrier, the method further includes:
acquiring the proxy server distributed by a distribution server for the network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
And acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried when data transmission is carried out in the network access process, and the preset label is the flow-free identifier.
Optionally, before the sending, to the proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
and sending the communication identification and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes the proxy server to the network access process after verifying that the communication identification has the traffic-free authority based on the identity authentication information.
Optionally, before the sending, to the proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
receiving temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the data access request for accessing the network to the proxy server through the network of the mobile communication operator specifically includes:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
Optionally, a part of data traffic generated in a process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
Optionally, the crediting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
According to another aspect of the present invention, there is provided a mobile terminal including:
a seventh sending module, configured to send a data access request to a proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to enable the proxy server to send the data access request to a resource compression server, where the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
a fourth receiving module, configured to receive, through the network of the mobile communications carrier, the compressed requested data sent by the proxy server, where the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the charging, by a mobile network operator, all or part of data traffic generated during a process in which the mobile terminal accesses the network through the proxy server into a specific service provider based on the traffic-free identifier includes:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specified service provider based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
Optionally, the mobile terminal further includes: a first obtaining module, configured to obtain the proxy server allocated by a distribution server for the network access process, where an IP address of the proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And the second acquisition module is used for acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier.
Optionally, the mobile terminal further includes:
an eighth sending module, configured to send the communication identifier and the authentication information of the mobile terminal to a distribution server before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, so that the distribution server allocates the proxy server to the network accessing process after verifying that the communication identifier has the traffic exemption permission based on the authentication information.
Optionally, the mobile terminal further includes:
a third obtaining module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic exemption right;
the seventh sending module is specifically configured to:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
Optionally, a part of data traffic generated in a process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
Optionally, the crediting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
According to the method for saving the stream access network of the mobile terminal, provided by the invention, a data access request is sent to a proxy server through a network of a mobile communication operator, the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a traffic-free access right to the internet, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from the resource server and compress the requested data; receiving compressed requested data sent by a proxy server through a network of a mobile communication operator, wherein the compressed requested data is sent to the proxy server by a resource compression server; the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier. That is to say, when the mobile terminal accesses the network, the data traffic consumed by the specified service provider can be consumed wholly or partially, and the data traffic of the mobile terminal does not need to be consumed partially or completely, so that the technical problem that a large amount of traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect of reducing the data traffic consumed when the mobile terminal accesses the network is achieved; therefore, the enthusiasm of the user for accessing the network can be obviously improved, so that the wide spread of the network content on the Internet is facilitated;
and the scheme compresses the requested data and transmits the compressed requested data to the mobile terminal after obtaining the requested data, so that the response speed is improved, and the data traffic consumed by a specified service provider can be reduced.
In the scheme, after the distribution server determines that the mobile terminal has the traffic-free authority through the communication identifier and the identity authentication information of the mobile terminal, the proxy server for the mobile terminal to access the network in a traffic-free manner is allocated to the mobile terminal, so that a user who is not the mobile terminal can be prevented from falsely using the free traffic of the mobile terminal;
in addition, in the embodiment of the invention, the distribution server distributes the proxy server to the mobile terminal when determining that the free residual flow of the communication identification is greater than the preset amount, so that the free data flow provided by the specified service provider to the mobile terminal can be accurately controlled;
in addition, in the embodiment of the invention, when the proxy server prompts that the mobile terminal logs out, the distribution server logs out the temporary authentication information, so that the temporary authentication information can be ensured to be used only in a process of accessing a network once, and a user who is not the mobile terminal can be further prevented from falsely using the free flow of the mobile terminal.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 shows an interaction diagram of an interaction method of a provincial flow accessing network according to one embodiment of the present invention;
FIG. 2 shows a flow diagram of a method of provincial flow accessing a network according to one embodiment of the invention;
FIG. 3 shows a schematic diagram of a proxy server according to one embodiment of the invention;
FIG. 4 shows a schematic diagram of a network access system according to one embodiment of the invention;
FIG. 5 shows a flow diagram of a method for a mobile terminal to have a reduced-flow access to a network, according to one embodiment of the invention;
fig. 6 shows a schematic diagram of a mobile terminal according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method for a mobile terminal to access a network in a flow-saving manner and the mobile terminal, which are used for solving the technical problem that a large amount of data flow of the mobile terminal needs to be consumed when the mobile terminal in the prior art accesses the network.
An embodiment of the present invention provides an interaction method for a provincial flow to access a network, as shown in fig. 1, which is an interaction diagram of the method, and devices related to the method include: the system comprises a mobile terminal, a distribution server, a proxy server, a resource compression server and a resource server, wherein the mobile terminal is, for example: mobile phones, tablet computers, and the like, and a user of the mobile terminal is a terminal user; the distribution server is mainly used for providing identity authentication for the mobile terminal and selecting the proxy server; the proxy server is mainly used for providing network access service for the mobile terminal with the internet surfing flow-free authority; the resource compression server is mainly used for compressing uplink data sent by the mobile terminal and downlink data sent to the mobile terminal; resource servers are typically provided by network content providers for providing rich and diverse network contents to end users using network resources of the internet, such as: videos, web pages, pictures, and the like.
Referring to fig. 1, the method for interworking with the provincial flow access network includes the following steps:
step S110: the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority;
step S120: the proxy server sends the data access request to a resource compression server;
step S130: the resource compression server acquires the requested data from the resource server based on the data access request and compresses the requested data;
step S140: the proxy server receives compressed requested data sent by the resource compression server;
step S150: the proxy server sends the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
As an optional implementation manner, before the proxy server receives a data access request of the mobile terminal to access the network through the network of the mobile communication operator, the mobile terminal needs to determine the proxy server providing the network access service for the mobile terminal, wherein the mobile terminal may directly send its communication identifier to the distribution server, the distribution server determines whether the communication identifier has the traffic exemption right, when the distribution server determines that the communication identifier has the traffic exemption right, the proxy server is allocated to the mobile terminal, otherwise, the proxy server is not allocated to the mobile terminal.
As another alternative embodiment, to prevent the communication identifier of the mobile terminal from being misused and improve the security of network access, the process of determining the proxy server continues to refer to fig. 1, which includes the following steps:
step S101: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal;
step S102: the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
step S103: and when determining that the communication identifier has the traffic-free right, the distribution server allocates a proxy server for the mobile terminal.
For example, before step S101, the mobile terminal may bind, in advance, the communication identifier of the mobile terminal in the distribution server by means of registration or the like, for example: the mobile terminal can firstly apply for a traffic-free service from a distribution server, after receiving the application from the mobile terminal, the distribution server determines whether to distribute a traffic-free authority to the communication identifier of the mobile terminal according to some preset conditions (for example, whether the software initiating the application is predetermined software, whether the mobile terminal uses the predetermined software, whether the communication identifier is registered in a specified service provider, and the like), and if the distribution server determines to distribute the traffic-free authority to the mobile terminal, the distribution server sends a UserKey (user password) to the mobile terminal as identity authentication information; further, in order to ensure that the communication identifier of the mobile terminal is not falsely used by other users, the distribution server may first send a verification code to the communication identifier, and the user of the mobile terminal may distribute the authentication information to the mobile terminal only after successfully filling the verification code.
In addition, when providing the flow-free service for the network access process of the mobile terminal, the distribution server may have no traffic limitation, or may have traffic limitation, where the absence of traffic limitation means that no matter how much traffic is used by the mobile terminal in the network access process, the flow-free right is provided to the mobile terminal as long as the flow-free requirement is met, for example: the distribution server can set the VIP identity for the terminal identification of some mobile terminals (such as mobile terminals produced by a specific manufacturer, mobile terminals using a specific type of operating system and the like), and further provide the terminal identification of the mobile terminals with infinite free flow; and there may be a traffic restriction for the non-VIP user, where the presence of the traffic restriction refers to allocating a specific traffic for each predetermined period of time for the mobile terminal, and if the total traffic that the mobile terminal cumulatively uses in accessing the network does not exceed the specific traffic, it is allocated with a traffic exemption right if it meets the traffic exemption requirement, and if the total traffic that the mobile terminal uses in accessing the network exceeds the specific traffic, it is not allocated with the traffic exemption right, for example; 30M free traffic, 50M free traffic, etc. may be allocated for a mobile terminal for one month.
In an alternative embodiment, if there is a traffic limit for the free traffic allocated to the mobile terminal by the distribution server, the user of the mobile terminal may also obtain the data traffic rewarded by the distribution server through some activities, such as: by the mobile terminal clicking a predetermined advertisement, clicking a predetermined web page, downloading a predetermined APP, etc., in this case, the distribution server may increase the data traffic allocated to the mobile terminal, e.g., 30M, 40M, etc. Further if the mobile terminal needs to access the network, for example: when the operation that the user of the mobile terminal starts the browser is detected, the mobile terminal sends the communication identification and the authentication information of the mobile terminal to the distribution server.
In step S102, the distribution server determines whether the received authentication information of the communication identifier matches with the pre-stored authentication information of the communication identifier, and if so, indicates that the corresponding mobile terminal has the traffic exemption permission, otherwise indicates that the corresponding mobile terminal does not have the traffic exemption permission.
In step S103, if the distribution server does not have flow limitation for the traffic-free permission allocated to the mobile terminal, the distribution server may directly allocate a proxy server to the mobile terminal after determining that the mobile terminal has the traffic-free permission; if the distribution server has flow limitation for the traffic-free permission allocated to the mobile terminal, the distribution server needs to judge whether the remaining traffic exceeds a threshold value after determining that the mobile terminal has the traffic-free permission, and allocates a proxy server to the mobile terminal when the remaining traffic exceeds the threshold value, wherein the processing process specifically comprises the following steps: the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; judging whether the free remaining traffic of the communication identifier is greater than a preset amount (such as a threshold value) based on the free remaining traffic information; and when the free residual flow is larger than the preset amount, distributing the proxy server for the mobile terminal.
In general, one of the functions of the distribution server is to count the free remaining traffic information of the communication identifier, where the preset amount is, for example: 0M, 1M, 512K and the like, wherein if the free residual flow is larger than the preset amount, the flow-free residual flow can meet the network access in the normal condition, so that a proxy server can be allocated to the flow-free residual flow; and if the free residual flow is not greater than the preset amount, the situation is shown that the free residual flow cannot meet the current network access under the normal condition, so that the proxy server is not allocated to the free residual flow.
When the distribution server allocates the proxy server to the mobile terminal, the distribution server may select a proxy server closest to the physical location of the mobile terminal from the plurality of proxy servers to allocate to the mobile terminal, may select a proxy server with the lightest network load to allocate to the mobile terminal, or select a proxy server with the lowest network delay to allocate to the mobile terminal, or the like, or may select the distribution server by taking comprehensive consideration of at least two policies among the plurality of distribution policies, and as to what manner the distribution server adopts to allocate the proxy server to the mobile terminal, the embodiments of the present invention are not listed in detail and are not limited.
As an optional embodiment, under the condition that the traffic exemption authority allocated for the mobile terminal has no traffic limitation, if the mobile terminal has the traffic exemption authority, the distribution server may generate temporary verification information (token) for the mobile terminal to access the network at this time; or, in a case where there is traffic limitation for the traffic exemption authority allocated to the mobile terminal, if the mobile terminal has the traffic exemption authority and the free remaining traffic of the mobile terminal is greater than a preset amount, the distribution server may also generate the temporary verification information.
In addition, in order to ensure that the subsequent mobile terminal can connect to the proxy server, the distribution server needs to send some data to the proxy server, and four data are listed below for description, and of course, in the implementation process, the following four cases are not limited. Firstly, a distribution server sends a communication identifier of a mobile terminal to a proxy server; the distributing server sends the communication identification and the temporary verification information of the mobile terminal to the proxy server; thirdly, the distribution server sends the communication identification and the free residual flow of the mobile terminal to the proxy server; and fourthly, the distribution server sends the communication identification, the free residual flow and the temporary verification information of the mobile terminal to the proxy server.
In addition, address information of the proxy server also needs to be provided for the mobile terminal, wherein the address information of the proxy server can be directly sent to the mobile terminal by the distribution server; the proxy server may also send the communication identifier of the mobile terminal to the mobile terminal through the communication identifier of the mobile terminal after receiving the communication identifier of the mobile terminal. As shown in step S104 of fig. 1, a process of the mobile terminal to which the address information of the proxy server is transmitted by the distribution server.
Based on the steps, a traffic exempting channel between the mobile terminal, the proxy server, the resource compression server and the resource server can be established, and after the traffic exempting channel is established, when the mobile terminal accesses the network through the network of the mobile communication operator, the mobile communication operator can count the consumed traffic into a specified service provider.
In step S110, if the distribution server does not allocate the temporary verification information for the current network access process in steps S101 to S103, the mobile terminal directly sends the data access request to the proxy server; if the distribution server distributes the temporary verification information for the network accessing process in the steps S101 to S103, the mobile terminal sends the data access request carrying the temporary verification information to the proxy server. In step S120, the proxy server may directly send the data access request sent by the mobile terminal to the resource compression server after receiving the data access request, and based on different information sent to the proxy server before the distribution server, the proxy server may also perform some verification processes first, which is described below by listing three verification processes, but of course, in the specific implementation process, the data access request is not limited to the following three cases.
The data sent by the distribution server to the proxy server comprises the communication identification and the temporary verification information of the mobile terminal, in this case, the data access request sent by the mobile terminal also comprises the temporary verification information, and the proxy server sends the data access request to the resource compression server when the data access request is verified to be legal through the temporary verification information. The proxy server matches the temporary verification information sent by the mobile terminal with the temporary verification information sent by the distribution server, if the matching is successful, the data access request is legal, otherwise, the data access request is illegal. By the scheme, the security of the network access process can be ensured.
If the data sent by the distribution server to the proxy server comprises the communication identification of the mobile terminal and the free residual flow information, the proxy server firstly judges whether the latest free residual flow of the mobile terminal is greater than the preset amount based on the free residual flow information after receiving the data access request; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server, and if the latest free residual flow information is not larger than the preset amount, informing the mobile terminal to allow the mobile terminal to access the resource server through another access path (for example, directly sending the data access request to the resource server, or directly sending the data access request to the resource compression server, and the like). Through the scheme, the specified service provider can provide a specific amount of free data flow to the mobile terminal.
If the distribution server judges that the free residual flow of the mobile terminal is larger than the preset amount, the proxy server does not need to judge whether the latest free residual flow (namely the free residual flow sent by the distribution server) is larger than the preset amount when receiving the data access request for the first time; the data traffic consumed by the network access request is directly counted, and then the data traffic is subtracted from the free residual traffic sent by the distribution server, so that the latest free data traffic can be obtained; whether to send the data access request to the resource compression server can be determined subsequently by judging whether the latest free data flow is larger than a preset amount.
In addition, the proxy server can also count the data traffic information consumed by the mobile terminal according to a preset counting period, and acquire the latest free residual traffic information with traffic-free permission of the mobile terminal.
For example, the preset statistical period may be, for example, a preset statistical time interval, the preset statistical time interval may be, for example, 30s, 50s, 1min, and the like, and the proxy server may set a timer, acquire, every time the preset time interval arrives, the data traffic consumed by the mobile terminal counted in the current time interval, and obtain the latest free remaining traffic information of the mobile terminal based on the data traffic statistics.
The preset statistical period is, for example: the method comprises the steps that preset statistical flow is 512k, 1M and the like, a proxy server can monitor data flow consumed by the mobile terminal, and when the preset statistical flow is consumed, the latest free residual flow information of the mobile terminal is determined according to the preset statistical flow.
Through the scheme, the latest residual flow information of the mobile terminal can be ensured to be obtained in time.
Of course, after the proxy server counts the data traffic information consumed by the mobile terminal in the counting period, the proxy server may transmit the data traffic information to the distribution server, and the distribution server may count the latest free remaining traffic information of the mobile terminal.
After obtaining the data traffic information consumed by the mobile terminal, the distribution server can also send the data traffic information to the mobile terminal or inform the data traffic information when the mobile terminal inquires; or after determining the latest free remaining traffic information of the mobile terminal, the distribution server can also send the latest free remaining traffic information to the mobile terminal, so that the mobile terminal can further know the current traffic use condition, and then a better network access strategy is selected. Or upon inquiry by the mobile terminal.
And thirdly, the data sent to the proxy server by the distribution server comprises the communication identification of the mobile terminal, the free residual flow information and the temporary verification information, and under the condition, the proxy server sends the data access request to the resource compression server after verifying that the data access request is legal through the temporary verification information and the latest free residual flow information is larger than the preset amount. By the scheme, the security of the network access process can be ensured, and the appointed service provider can be ensured to provide the preset amount of free flow to the mobile terminal. In step 130, after receiving the data access request sent by the proxy server, the resource compression server sends the data access request to the resource server, and further obtains the requested data from the resource server; the resource compression server compresses the requested data after acquiring the requested data from the resource server, and in the specific implementation process, the requested data may be compressed in a plurality of ways, which are described below by way of example, but is not limited to the following two cases in the specific implementation process.
First, the resource compression server compresses the requested data by lossy compression.
For example, the lossy compression is also called destructive compression, that is, compression in which secondary information data is compressed, some quality is sacrificed to reduce the data amount, and the compression ratio is increased, wherein multiple lossy compression methods can be adopted for the requested data, and two of them are listed below for description, and of course, in the specific implementation process, the method is not limited to the following two cases.
When the requested data includes image data, the resource compression server reduces the display size of the image data from a first display size to a second display size suitable for the display unit of the mobile terminal.
For example, in order to be able to adapt to display units of various sizes, the image data located in the resource server is usually large in first display size, but the screen of the mobile terminal is usually small in size, so that the display size of the image data can be reduced to the second display size, and thus the data traffic consumed in the image data transmission process can be reduced, and the transmission rate of the image data can be improved.
And when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the redundant codes to the mobile terminal.
For example, the redundancy code is, for example: note statements in the code, in the code writing stage, a programmer usually adds some note statements in the code for convenience of reading the code, and these note statements have no influence on code analysis, so the resource compression server can delete the note statements in the code data included in the requested data.
Second, the resource compression server compresses the requested data in a lossless compression manner.
For example, lossless compression is to optimize the data storage mode of a file, and use an algorithm to represent repeated data information, so that the file can be completely restored without affecting the content of the file, and for digital images, no loss of image details is caused.
In step S150, the data in the process of accessing the network by the mobile terminal includes uplink data and downlink data, where the uplink data is data (e.g., a data access request) sent by the mobile terminal to the resource server, and the downlink data is data (e.g., requested data) sent by the resource server to the mobile terminal, where the data traffic of at least one of the uplink data and the downlink data is counted in the data traffic consumed by the designated service provider.
If the appointed service provider provides the uplink data flow-free for the mobile terminal, the data access request sent by the mobile terminal to the proxy server also carries a flow-free identifier, and the data flow corresponding to the data access request is counted in the appointed service provider based on the flow-free identifier; if the specified service provider provides the mobile terminal with the downlink data flow-free, the compressed requested data will carry a flow-free identifier (for example, the proxy server adds the flow-free identifier), and the data flow of the compressed requested data can be included in the specified service provider by the mobile communication operator based on the flow-free identifier.
The flow-free identifier may be a plurality of different forms of flow-free identifiers, and two of them are listed below for description, and certainly, in the specific implementation process, the flow-free identifier is not limited to the following two cases.
The method comprises the steps that after a proxy server receives a communication identifier of a mobile terminal sent by a distribution server and before a data access request sent by the mobile terminal is received, a preset label is sent to the mobile terminal, the preset label is carried when the mobile terminal accesses a network for data transmission, and the preset label is a flow-free identifier.
And secondly, the IP address of the proxy server distributed by the distribution server for the mobile terminal is a preset IP address, and the preset IP address is the flow-free identifier.
In the specific implementation process, data traffic in the process of accessing the network can be counted through a gateway arranged between the mobile terminal and the proxy server.
For the condition that the flow-free identifier is a preset IP, after receiving a data access request sent by a mobile terminal, a corresponding gateway (or a charging system connected with a corresponding network) judges whether the IP of a next node corresponding to the data access request is the preset IP, if so, the data flow of the next node is counted into the data flow of a specified service provider, after receiving the requested data sent by a proxy server, the corresponding gateway (or the charging system connected with the corresponding network) judges whether the IP of the proxy server is the preset IP, and if so, the data flow of the proxy server is counted into the data flow of the specified service provider; in the case that the traffic-free identifier is a preset tag, after receiving a data access request (or receiving requested data sent by a proxy server) sent by a mobile terminal, a corresponding gateway (or a charging system connected to a corresponding network) determines whether the data access request (or the requested data) contains the preset tag, and if the data access request (or the requested data) contains the preset tag, the data traffic of the gateway is added to the data traffic of a specified service provider.
In the specific implementation process, the fact that all data traffic in the process of the mobile terminal accessing the network is included in the specified service provider means that in the process of accessing the network, the mobile network operator determines the data traffic in the process of accessing the mobile terminal and then all the data traffic is included in the specified service provider.
However, a mobile network operator may count part of data traffic generated during the mobile terminal accessing the network through the proxy server into a specific service provider based on the traffic-free identifier, and there may be a plurality of cases, three of which are listed below for introduction, and certainly, in the specific implementation process, the cases are not limited to the following three cases.
First, a specific percentage of data traffic during a mobile terminal's network access is accounted for by a designated service provider.
For example, the specific ratios are, for example: 50%, 70%, etc., wherein when the mobile terminal has a traffic exemption right (for example, the data transmission carries a traffic exempt identifier) during accessing the network, the corresponding gateway (or a charging system connected to the corresponding network) credits a specific proportion of the gateway to a specified service provider, and credits the rest of the gateway to the communication identifier, for example: assuming that the mobile terminal consumes 10M of traffic in the process of accessing the network at this time, and the specific proportion is 50%, the charging system counts 5M of traffic into the designated service provider during charging, and counts the rest 5M of traffic into the communication identifier of the mobile terminal. Of course, the above data are by way of example only and not by way of limitation.
Second, a certain amount of data traffic during the mobile terminal's access to the network is accounted for by the designated service provider.
For example, the specific number is, for example: 10M, 20M, etc., wherein when the mobile terminal has a traffic exemption right in the process of accessing the network, the corresponding gateway (or a charging system connected with the corresponding network) judges whether the data traffic in the process of accessing the network exceeds the specific quantity after the process of accessing the network is finished, and if the data traffic does not exceed the specific quantity, all the data traffic is counted in a specified service provider; if the number exceeds a certain number, no more than a portion of the data traffic is included in the designated service provider and more than a portion is included in the communication identification of the mobile terminal.
Third, the data traffic of the specific content during the mobile terminal's access to the network is credited to the designated service provider.
For example, the specific content is, for example: when the mobile terminal has a traffic-free right in a network access process, the corresponding gateway (or a charging system connected with the corresponding network) acquires data transmitted in the network access process, then determines data such as characters and pictures from the data transmitted in the network access process, and records the corresponding data traffic into a specified service provider; while for other types of content, for example: and the video records the corresponding data flow into the communication identifier of the mobile terminal.
As a possible implementation manner, the method for accounting in the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
For example, since the corresponding data traffic is charged to the specified service provider, and the mobile communication operator does not perform repeated charging for one-time network access process, the corresponding data traffic is not charged to the identifier of the mobile terminal, and therefore, when the mobile communication operator charges, the charge generated by the mobile communication operator is charged to the charge consumed by the account of the specified service provider, so as to charge the specified service provider.
As an alternative embodiment, with continued reference to fig. 1, the method further includes:
step S160: the proxy server judges whether any data access request of the mobile terminal is received within a preset time period;
step S170: and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal is logged out.
For example, the preset time period is, for example: 10min, 30min, 40min and so on, if the proxy server does not receive any data access request sent by the mobile terminal within the preset time period, it indicates that the process of the mobile terminal accessing the network is finished, so a corresponding prompt message can be generated. Further, the proxy server may also send the hint information to the distribution server after generating the hint information.
In this case, if the temporary authentication information is previously allocated to the current network access procedure by the distribution server, the distribution server cancels the temporary authentication information based on the prompt information transmitted from the proxy server, and the proxy server also cancels the temporary authentication information. By the scheme, the distributed temporary verification information can be ensured to be only used as the verification information in the network access process at this time, and new temporary verification information still needs to be generated in the next network access, so that the security of the network access is improved.
As an alternative embodiment, if the proxy server prompts that the mobile terminal has logged off, the method further comprises:
the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the distribution server;
and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
For example, the proxy server may send the distribution server the information shown in table 1:
TABLE 1
Starting time End time Consumed data traffic information
2015-4-1514:23 2015-4-1514:44 1.6M
The total free data traffic distributed by the distribution server to the mobile terminal is assumed to be: 30M, and the mobile terminal has consumed 20M traffic before the network access, it may be determined that the free remaining traffic of the mobile terminal after the network access process is as follows: 10M-1.6M ═ 8.4M. Of course, the above data traffic is by way of example only and not by way of limitation.
In an alternative implementation manner, the mobile terminal, the proxy server, the resource compression server, and the resource server may all use the same transmission protocol for data transmission, for example: all using the Http protocol, all using the Http2 protocol, etc.
In another alternative embodiment, the mobile terminal, the proxy server, the resource compression server, and the resource server may also use different transmission protocols for data transmission, for example: in the case that the first transmission protocol is adopted for transmission between the mobile terminal and the proxy server, and the second transmission protocol is adopted for compression and data transmission between the proxy server and the resource compression server, the data transmission rate can be further improved because the second transmission protocol can compress the data, and the reason that the first transmission protocol is still adopted between the mobile terminal and the proxy server is to prevent the flow-free identification contained in the data (such as data access request and requested data) passing through the mobile terminal and the proxy server from being identified by the gateway (or the charging system) which cannot be charged through the compression of the second transmission protocol, so that the scheme can improve the data transmission rate and ensure that the flow-free identification can be identified by the network (or the charging system). For example, the first transmission protocol is, for example: http protocol, or other protocols that do not require compression of the transmitted data and can be recognized by the gateway of the mobile communications operator; the second transmission protocol is for example: the Spdy protocol, or other protocols capable of compressing the transmitted data.
In addition, in the specific implementation process, the mobile terminal can also send uplink data (such as a data access request) to the resource compression server after lossless compression, and send the uplink data to the resource server after decompression by the resource compression server; if the received requested data is compressed requested data and the resource compression server performs lossless compression on the requested data, the mobile terminal may also perform decompression processing on the compressed requested data.
The distribution server and the proxy server introduced in the embodiment of the invention can be two servers with completely independent physical positions; or two different function modules of the same server, and likewise, two servers with completely independent positions can be arranged between the proxy server and the resource compression server, or two different function modules of the same server, wherein, because the function of the resource compression server is more complex and the function of the proxy server is simpler, if the proxy server and the resource compression server are arranged as two servers with completely independent positions, the proxy server and the resource compression server can be conveniently expanded and used respectively, in addition, the distribution server, the proxy server and the resource compression server can be three completely independent servers or three different functional modules of the same server, the embodiment of the present invention is not limited to what kind of composition structure is specifically adopted for the distribution server, the proxy server, and the resource compression server.
According to the interaction method for the provincial flow access network provided by the embodiment of the present invention, an embodiment of the present invention further provides a method for the provincial flow access network, please refer to fig. 2, which includes:
step S201: the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority;
step S202: the proxy server sends the data access request to the resource compression server so that the resource compression server acquires the requested data from the resource server based on the data access request and compresses the requested data;
step S203: the proxy server receives compressed requested data sent by the resource compression server;
step S204: the proxy server sends the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further comprises: the resource compression server compresses the requested data in a lossy compression mode; and/or the resource compression server compresses the requested data in a lossless compression mode.
Optionally, the resource compression server compresses the requested data in a lossy compression manner, including: when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the code data to the mobile terminal.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, including: the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into a specified service provider based on the flow-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, the method further comprises: the proxy server sends a preset label to the mobile terminal, the preset label is carried when data transmission is carried out in the process that the mobile terminal accesses a network, and the preset label is a flow-free identifier; or the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier.
Optionally, the method further comprises: and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period to obtain the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the method further comprises: the proxy server sends the data traffic information consumed by the mobile terminal to the distribution server; and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Optionally, the method further includes: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal; the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal; and when determining that the communication identifier has the traffic-free right, the distribution server allocates a proxy server for the mobile terminal.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, when determining that the communication identifier has the traffic exemption right, the distribution server allocates a proxy server to the mobile terminal, which specifically includes: the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; the distribution server judges whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information; and when the free residual flow is larger than the preset amount, the distribution server distributes the proxy server for the mobile terminal.
Optionally, the method further includes: the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server; the method comprises the following steps that a proxy server receives a data access request of a mobile terminal for accessing a network through a network of a mobile communication operator, and specifically comprises the following steps: the proxy server receives a data access request which is sent by the mobile terminal and carries identity authentication information; the proxy server sends the data access request to the resource compression server, and the method comprises the following steps: the proxy server verifies the validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, after the proxy server prompts that the mobile terminal has logged off, the distribution server logs off the temporary authentication information.
Optionally, if the proxy server prompts that the mobile terminal has logged off, the method further includes: the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the distribution server; and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, after the proxy server is allocated to the mobile terminal, the method further includes: the distribution server sends the free residual flow information to the proxy server; the method for sending the data access request to the resource compression server by the proxy server specifically comprises the following steps: after receiving the data access request, the proxy server judges whether the latest free residual flow of the mobile terminal is greater than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
According to the interaction method for the provincial flow access network provided by the embodiment of the present invention, an embodiment of the present invention further provides a proxy server, please refer to fig. 3, which includes:
a first receiving module 30, configured to receive a data access request of a mobile terminal accessing a network through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
a first sending module 31, configured to send the data access request to the resource compression server, so that the resource compression server obtains the requested data from the resource server based on the data access request and compresses the requested data;
a second receiving module 32, configured to receive the compressed requested data sent by the resource compression server;
a second sending module 33, configured to send the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, including: the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into a specified service provider based on the flow-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, the proxy server further includes: a third sending module 34, configured to send a preset tag to the mobile terminal, where the preset tag is carried when the mobile terminal performs data transmission in a network access process, and the preset tag is a traffic-free identifier; or the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier.
According to another aspect of the present invention, there is provided a network access system, referring to fig. 4, including a proxy server and a resource compression server according to any embodiment of the present invention, the resource compression server includes a first compression module 40, configured to compress requested data in a lossy compression manner; and/or the presence of a gas in the gas,
and a second compression module 41, configured to compress the requested data in a lossless compression manner.
Optionally, the first compression module 40 is configured to: when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adapted to a display unit of the mobile terminal; and/or when the requested data contains code data, removing redundant codes in the code data and then sending the code data to the mobile terminal.
Optionally, the proxy server further includes: the first statistical module 35 is configured to count data traffic information consumed by the mobile terminal according to a preset statistical period, and obtain the latest free remaining traffic information with a traffic-free permission of the mobile terminal.
Optionally, the system further comprises: a distribution server; the proxy server further includes: a fourth sending module 36, configured to send the data traffic information consumed by the mobile terminal to the distribution server; a distribution server, comprising: and the determining module 50 is configured to determine, based on the data traffic information consumed by the mobile terminal, the latest free remaining traffic information that the mobile terminal has the traffic-free right.
Optionally, the distribution server further includes: a third receiving module 51, configured to receive a communication identifier and authentication information of the mobile terminal; the verification module 52 is configured to verify whether the communication identifier has a traffic exemption right based on the communication identifier and the authentication information of the mobile terminal; and the allocating module 53 is configured to allocate a proxy server to the mobile terminal when it is determined that the communication identifier has the traffic exemption right.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the allocating module 53 specifically includes: the acquiring unit is used for acquiring free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; the judging unit is used for judging whether the free residual flow of the communication identification is larger than the preset amount or not based on the free residual flow information; and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the distribution server further includes: a generating module 54, configured to generate temporary verification information and send the temporary verification information to the mobile terminal and the proxy server;
the first receiving module 30 is specifically configured to receive, by the proxy server, a data access request carrying authentication information sent by the mobile terminal; a sending module 31, specifically configured to verify validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, the distribution server further includes: and the logout module 55 is used for logging out the temporary authentication information after the proxy server prompts that the mobile terminal logs out.
Optionally, the proxy server further includes: a fifth sending module 37, configured to send the initial internet surfing time, the end internet surfing time, and the consumed data traffic information of the mobile terminal to the distribution server if the proxy server prompts that the mobile terminal has logged off; the distribution server further comprises a second statistical module 56 for counting the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, the distribution server further includes: a sixth sending module 57, configured to send the free remaining traffic information to the proxy server; a first sending module 30, configured to determine whether a latest free remaining traffic of the mobile terminal is greater than a preset amount based on the free remaining traffic information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
Optionally, the method further includes: a mobile terminal as described in any of the embodiments of the present invention.
According to the interaction method for the provincial flow access network provided by the embodiment of the present invention, an embodiment of the present invention further provides a method for the mobile terminal to access the network in the provincial flow, please refer to fig. 5, which includes:
step S501: sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of a mobile terminal, and the communication identifier has an internet surfing flow-free authority so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to acquire requested data from the resource server and compress the requested data;
step S502: receiving compressed requested data sent by a proxy server through a network of a mobile communication operator, wherein the compressed requested data is sent to the proxy server by a resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, where the traffic-free identifier includes: the data access request sent to the proxy server contains a traffic-free identifier, and the data traffic corresponding to the data access request is counted in a specified service provider based on the traffic-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: when the fact that the data in the process that the mobile terminal accesses the network contain the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into a designated service provider; or the data transmission in the process that the mobile terminal accesses the network passes through the proxy server with the preset IP address, and when the mobile network operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
Optionally, before sending the data access request to the proxy server through the network of the mobile communication carrier, the method further includes: acquiring a proxy server distributed by a distribution server in a network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier; or acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is a flow-free identifier.
Optionally, before sending the data access request for accessing the network to the proxy server through the network of the mobile communication carrier, the method further includes: and sending the communication identifier and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes a proxy server for the network accessing process after verifying that the communication identifier has the traffic-free authority based on the identity authentication information.
Optionally, before sending the data access request for accessing the network to the proxy server through the network of the mobile communication carrier, the method further includes: receiving temporary verification information distributed by a distribution server for the mobile terminal, wherein the temporary verification information is distributed to the mobile terminal when the distribution server determines that the mobile terminal has a traffic-free right; sending a data access request for accessing a network to a proxy server through a network of a mobile communication operator, specifically: and the proxy server is used for containing the data access request carrying the temporary verification information so as to ensure that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: the data flow of a specific proportion is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of a specific quantity is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of the specific content during the mobile terminal accessing the network is charged to the designated service provider.
Optionally, the accounting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
According to the interaction method for the provincial flow access network provided in the embodiment of the present invention, an embodiment of the present invention further provides a mobile terminal, please refer to fig. 6, which includes:
a seventh sending module 60, configured to send a data access request to the proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission for surfing the internet, so that the proxy server sends the data access request to the resource compression server, and the data access request is used for the resource compression server to obtain requested data from the resource server and compress the requested data;
a fourth receiving module 61, configured to receive, through a network of a mobile communications carrier, compressed requested data sent by a proxy server, where the compressed requested data is sent to the proxy server by a resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, where the traffic-free identifier includes: the data access request sent to the proxy server contains a traffic-free identifier, and the data traffic corresponding to the data access request is counted in a specified service provider based on the traffic-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: when the fact that the data in the process that the mobile terminal accesses the network contain the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into a designated service provider; or the data transmission in the process that the mobile terminal accesses the network passes through the proxy server with the preset IP address, and when the mobile network operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
Optionally, the mobile terminal further includes: a first obtaining module 62, configured to obtain a proxy server allocated by a distribution server for a network access process, where an IP address of the proxy server is a preset IP address, and the preset IP address is a traffic-free identifier; or the second obtaining module 63 is configured to obtain a preset tag allocated by the proxy server for the network access process, where the preset tag is carried during data transmission in the network access process, and the preset tag is a traffic-free identifier.
Optionally, the mobile terminal further includes: an eighth sending module 64, configured to send the communication identifier and the authentication information of the mobile terminal to the distribution server before sending the data access request for accessing the network to the proxy server through the network of the mobile communication operator, so that the distribution server allocates the proxy server to the network accessing process after verifying that the communication identifier has the traffic exempting authority based on the authentication information.
Optionally, the mobile terminal further includes: a third obtaining module 65, configured to receive temporary verification information allocated by the distribution server to the mobile terminal before sending a data access request for accessing the network to the proxy server through the network of the mobile communications operator, where the temporary verification information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has a traffic exemption right; the seventh sending module 60 is specifically configured to: and the proxy server is used for containing the data access request carrying the temporary verification information so as to ensure that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: the data flow of a specific proportion is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of a specific quantity is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of the specific content during the mobile terminal accessing the network is charged to the designated service provider.
Optionally, the accounting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
One or more embodiments of the invention have at least the following beneficial effects:
in the embodiment of the invention, the data access request is sent to the proxy server through the network of the mobile communication operator, the data access request comprises the communication identifier of the mobile terminal, the communication identifier has the internet surfing flow-free authority, so that the proxy server sends the data access request to the resource compression server, and the data access request is used for the resource compression server to acquire the requested data from the resource server and compress the requested data; receiving compressed requested data sent by a proxy server through a network of a mobile communication operator, wherein the compressed requested data is sent to the proxy server by a resource compression server; the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier. That is to say, when the mobile terminal accesses the network, the data traffic consumed by the specified service provider can be consumed wholly or partially, and the data traffic of the mobile terminal does not need to be consumed partially or completely, so that the technical problem that the traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect of reducing the data traffic consumed when the mobile terminal accesses the network is achieved; therefore, the enthusiasm of the user for downloading can be obviously improved, and the wide spread of the network content on the Internet is facilitated;
in the scheme, after the distribution server determines that the mobile terminal has the traffic-free authority through the communication identifier and the identity authentication information of the mobile terminal, the proxy server for the mobile terminal to access the network in a traffic-free manner is allocated to the mobile terminal, so that a user who is not the mobile terminal can be prevented from falsely using the free traffic of the mobile terminal;
in addition, in the embodiment of the invention, the distribution server distributes the proxy server to the mobile terminal when determining that the free residual flow of the communication identification is greater than the preset amount, so that the free data flow provided by the specified service provider to the mobile terminal can be accurately controlled;
in addition, in the embodiment of the invention, when the proxy server prompts that the mobile terminal logs out, the distribution server logs out the temporary authentication information, so that the temporary authentication information can be ensured to be used only in a process of accessing a network once, and a user who is not the mobile terminal can be further prevented from falsely using the free flow of the mobile terminal.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that microprocessors or Digital Signal Processors (DSPs) may be used in practice to implement some or all of the functions of some or all of the components of a mobile terminal, a proxy server, a distribution server, a resource compression server, and a network access system according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses, A1, a method for a mobile terminal to access a network in a provincial flow, which comprises the following steps:
sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a net surfing flow-free authority, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
receiving the compressed requested data sent by the proxy server through the network of the mobile communication operator, wherein the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
A2, the method according to a1, wherein the compressed requested data is specifically: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
A3, the method as claimed in a1, wherein the mobile network operator includes all or part of data traffic generated during the mobile terminal accessing the network through the proxy server, and the mobile network operator includes the following steps:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
A4, the method as in A3, wherein all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
A5, the method as claimed in a4, wherein before the sending a data access request to a proxy server through a network of a mobile communication carrier, the method further comprises:
acquiring the proxy server distributed by a distribution server for the network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
And acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried when data transmission is carried out in the network access process, and the preset label is the flow-free identifier.
A6, the method according to any of a1-a5, wherein before the sending a data access request for accessing a network to a proxy server through a network of a mobile communication carrier, the method further comprises:
and sending the communication identification and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes the proxy server to the network access process after verifying that the communication identification has the traffic-free authority based on the identity authentication information.
A7, the method as claimed in a6, wherein before the sending a data access request for accessing a network to a proxy server through a network of a mobile communication carrier, the method further comprises:
receiving temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the data access request for accessing the network to the proxy server through the network of the mobile communication operator specifically includes:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
A8, the method according to any one of a1-a5, wherein part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
A9, the method according to any one of a1-a5, wherein the crediting into a designated facilitator comprises: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
B10, a mobile terminal, comprising:
a seventh sending module, configured to send a data access request to a proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to enable the proxy server to send the data access request to a resource compression server, where the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
a fourth receiving module, configured to receive, through the network of the mobile communications carrier, the compressed requested data sent by the proxy server, where the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
B11, the mobile terminal as in B10, wherein the compressed requested data is specifically: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
B12, the mobile terminal according to B11, wherein the mobile network operator includes all or part of data traffic generated during the process of accessing the network through the proxy server, and the mobile terminal includes the following steps:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
B13, the mobile terminal according to B12, wherein all or part of data traffic generated during the process of the mobile terminal accessing the network through the proxy server is included in a designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
B14, the mobile terminal according to B13, characterized in that the mobile terminal further comprises: a first obtaining module, configured to obtain the proxy server allocated by a distribution server for the network access process, where an IP address of the proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And the second acquisition module is used for acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier.
B15, the mobile terminal according to any of B10-B14, characterized in that the mobile terminal further comprises:
an eighth sending module, configured to send the communication identifier and the authentication information of the mobile terminal to a distribution server before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, so that the distribution server allocates the proxy server to the network accessing process after verifying that the communication identifier has the traffic exemption permission based on the authentication information.
B16, the mobile terminal according to B15, characterized in that the mobile terminal further comprises:
a third obtaining module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic exemption right;
the seventh sending module is specifically configured to:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
B17, the mobile terminal according to any of B10-B14, wherein a part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
B18, the mobile terminal according to any of B10-B14, wherein said crediting to a designated service provider comprises: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.

Claims (10)

1. A method for a mobile terminal to access a network in a flow-saving manner, comprising:
sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a net surfing flow-free authority, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
receiving the compressed requested data sent by the proxy server through the network of the mobile communication operator, wherein the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
2. The method of claim 1, wherein the compressed requested data is specifically: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
3. The method of claim 1, wherein the accounting of all or a portion of data traffic generated by the mobile terminal during network access through the proxy server into a designated service provider by a mobile network operator based on the traffic-free identity comprises:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
4. The method according to claim 3, wherein all or part of data traffic generated during the mobile terminal accessing the network through the proxy server is included in a specific service provider by a mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
5. The method of claim 4, wherein prior to the sending of the data access request to the proxy server over the network of the mobile communications carrier, the method further comprises:
acquiring the proxy server distributed by a distribution server for the network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
And acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried when data transmission is carried out in the network access process, and the preset label is the flow-free identifier.
6. The method of any of claims 1-5, wherein prior to sending a data access request to access a network to a proxy server over a network of a mobile communications carrier, the method further comprises:
and sending the communication identification and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes the proxy server to the network access process after verifying that the communication identification has the traffic-free authority based on the identity authentication information.
7. The method of claim 6, wherein before the sending a data access request for accessing a network to a proxy server through a network of a mobile communication carrier, the method further comprises:
receiving temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the data access request for accessing the network to the proxy server through the network of the mobile communication operator specifically includes:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
8. The method according to any of claims 1-5, wherein a part of data traffic generated during the mobile terminal accessing the network through the proxy server is included in a specific service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
9. The method of any of claims 1-5, wherein said crediting to a designated facilitator comprises: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
10. A mobile terminal, comprising:
a seventh sending module, configured to send a data access request to a proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to enable the proxy server to send the data access request to a resource compression server, where the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
a fourth receiving module, configured to receive, through the network of the mobile communications carrier, the compressed requested data sent by the proxy server, where the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
CN201510377213.0A 2015-06-30 2015-06-30 A kind of method and mobile terminal saving stream access network for mobile terminal Active CN104902462B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510377213.0A CN104902462B (en) 2015-06-30 2015-06-30 A kind of method and mobile terminal saving stream access network for mobile terminal
CN201811629915.3A CN109587270B (en) 2015-06-30 2015-06-30 Method for mobile terminal to access network in flow-saving mode and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510377213.0A CN104902462B (en) 2015-06-30 2015-06-30 A kind of method and mobile terminal saving stream access network for mobile terminal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201811629915.3A Division CN109587270B (en) 2015-06-30 2015-06-30 Method for mobile terminal to access network in flow-saving mode and mobile terminal

Publications (2)

Publication Number Publication Date
CN104902462A true CN104902462A (en) 2015-09-09
CN104902462B CN104902462B (en) 2019-02-12

Family

ID=54034802

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510377213.0A Active CN104902462B (en) 2015-06-30 2015-06-30 A kind of method and mobile terminal saving stream access network for mobile terminal
CN201811629915.3A Active CN109587270B (en) 2015-06-30 2015-06-30 Method for mobile terminal to access network in flow-saving mode and mobile terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201811629915.3A Active CN109587270B (en) 2015-06-30 2015-06-30 Method for mobile terminal to access network in flow-saving mode and mobile terminal

Country Status (1)

Country Link
CN (2) CN104902462B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921699A (en) * 2015-12-25 2017-07-04 北京奇虎科技有限公司 A kind of Network Access Method, device and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650214B (en) * 2019-10-21 2022-07-05 北京知道创宇信息技术股份有限公司 Agent method, device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741579A (en) * 2008-11-17 2010-06-16 李占胜 New mobile communication data traffic charging mode
KR20100103768A (en) * 2009-03-14 2010-09-28 박대웅 Method for providing free telecommunication service using advertising and callback service system
CN103167554A (en) * 2011-12-09 2013-06-19 中国移动通信集团广东有限公司 Gateway traffic compressing method, device and network service supply system
CN103841204A (en) * 2014-03-14 2014-06-04 北京奇虎科技有限公司 Traffic-free downloading method, device and system based on mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8788612B1 (en) * 2006-08-07 2014-07-22 Unwired Planet, Llc Cache based enhancement to optimization protocol
CN104050292A (en) * 2014-06-30 2014-09-17 北京奇虎科技有限公司 Traffic-saving mode search service method, server, client and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741579A (en) * 2008-11-17 2010-06-16 李占胜 New mobile communication data traffic charging mode
KR20100103768A (en) * 2009-03-14 2010-09-28 박대웅 Method for providing free telecommunication service using advertising and callback service system
CN103167554A (en) * 2011-12-09 2013-06-19 中国移动通信集团广东有限公司 Gateway traffic compressing method, device and network service supply system
CN103841204A (en) * 2014-03-14 2014-06-04 北京奇虎科技有限公司 Traffic-free downloading method, device and system based on mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921699A (en) * 2015-12-25 2017-07-04 北京奇虎科技有限公司 A kind of Network Access Method, device and system

Also Published As

Publication number Publication date
CN109587270B (en) 2021-06-11
CN104902462B (en) 2019-02-12
CN109587270A (en) 2019-04-05

Similar Documents

Publication Publication Date Title
CN109525602B (en) Method, mobile terminal and system for accessing network based on flow-free platform
CN104967688A (en) Method for accessing to network by using flow-free platform, mobile terminal and system
CN105323240B (en) A kind of method and mobile terminal of monitoring data flow
CN104954490B (en) A kind of method and mobile terminal carrying out network access under defaulting subscriber state
CN104902454B (en) A kind of control the method for acquisition for mobile terminal data, gateway and network access system
CN105101140A (en) Traffic-saving method for visiting network, proxy server and network access system
CN104902453B (en) A kind of network access authority control method and mobile terminal for mobile terminal
CN109587270B (en) Method for mobile terminal to access network in flow-saving mode and mobile terminal
CN105142124B (en) A kind of Network Access Method and mobile terminal applied to mobile terminal
CN104954488B (en) A kind of method for network access control, the distribution server and network access system
CN104980958B (en) A kind of method and mobile terminal carrying out network login
CN105162753B (en) A kind of method and mobile terminal for mobile terminal to access network resources
CN105120445B (en) A kind of network access authority control method, the distribution server and network access system
CN105162754B (en) Access the method and mobile terminal of game server
CN109526009B (en) Communication method, mobile terminal and system
CN104980909B (en) A kind of method, resource compression service device and network access system accessing Internet resources
CN105101286B (en) A kind of flow statistical method and gateway, the method and system for accessing network
CN109525603B (en) Method for accessing network, proxy server and network access system
CN104954485A (en) Data communication method applied to mobile terminal, proxy server and communication system
CN105101144B (en) A kind of acquisition data method and mobile terminal for mobile terminal
CN104980908B (en) The Network Access Method of wireless Internet card and wireless Internet card
CN105142123B (en) Method, Distributor and the system of network access are carried out based on wireless Internet card
CN104967983B (en) A kind of method and mobile terminal for mobile terminal network visiting
CN105101117B (en) Data communications method, proxy server and communication system applied to mobile terminal
CN105101143A (en) Method for accessing network via account information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220720

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230704

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right
CP03 Change of name, title or address

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing 360 Zhiling Technology Co.,Ltd.

Country or region after: China

Address before: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee before: Beijing Hongxiang Technical Service Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address