CN109525991B - Method, distribution server and system for network login - Google Patents

Method, distribution server and system for network login Download PDF

Info

Publication number
CN109525991B
CN109525991B CN201811626463.3A CN201811626463A CN109525991B CN 109525991 B CN109525991 B CN 109525991B CN 201811626463 A CN201811626463 A CN 201811626463A CN 109525991 B CN109525991 B CN 109525991B
Authority
CN
China
Prior art keywords
mobile terminal
network
free
traffic
proxy server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811626463.3A
Other languages
Chinese (zh)
Other versions
CN109525991A (en
Inventor
陈耀攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811626463.3A priority Critical patent/CN109525991B/en
Publication of CN109525991A publication Critical patent/CN109525991A/en
Application granted granted Critical
Publication of CN109525991B publication Critical patent/CN109525991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet

Abstract

The invention discloses a method, a distribution server and a system for network login, wherein the method comprises the following steps: the distribution server receives query information for querying the current free remaining traffic information of the mobile terminal through a network of a mobile communication operator; the distribution server responds to the query information, free residual flow information which the mobile terminal currently has is sent to the mobile terminal through a network of a mobile communication operator, and the mobile terminal is enabled to confirm whether the mobile terminal can log in the network through the proxy server in a flow-free mode or not based on the free residual flow information; the data transmission mark in the network login process is marked with a flow-free mark, and all or part of data flow generated in the network login process of the mobile terminal is counted into a designated service provider by a mobile network operator based on the flow-free mark. Through the technical scheme, the technical problem that a large amount of data traffic is consumed when the mobile terminal performs network login in the prior art is solved.

Description

Method, distribution server and system for network login
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, a distribution server, and a system for performing network login.
Background
With the continuous development of science and technology, communication technology has also gained rapid development, and the variety of electronic products is also more and more, and people also enjoy various facilities that scientific and technological development brought. People can enjoy comfortable life brought along with the development of communication technology through various types of mobile terminals. For example, mobile terminals such as smart phones and tablet computers have become an important part of people's lives, and users can log in networks, browse webpages, download music and the like through the mobile terminals, so that pressure caused by modern fast-paced lives is relieved.
In general, a mobile terminal has a network login function, and the mobile terminal needs to consume data traffic of a user of the mobile terminal when logging in a network, and pays a fee to an operator providing a network service according to the consumed data traffic. In the prior art, the data traffic used by the user can only be charged through an operator, so that in the prior art, the user of the mobile terminal needs to consume a large amount of data traffic of the mobile terminal when logging in a network; the network traffic of the mobile terminal is expensive, so that the user of the mobile terminal is forced to pay a large amount of cost for the mobile terminal, and thus, the enthusiasm of the user for logging in the network is obviously reduced, and the popularization and the development of the mobile internet technology are not facilitated.
Disclosure of Invention
In view of the above, the present invention has been made to provide a method, a distribution \ proxy server and a system for network login that overcome or at least partially solve the above-mentioned problems.
According to an aspect of the present invention, there is provided a method for performing network login, which is applied to a mobile terminal, the method including:
before the mobile terminal responds to a network login instruction, judging whether the current free residual flow of the mobile terminal is larger than a preset amount;
if so, the mobile terminal sends a network login request for logging in a network to a proxy server through a network of a mobile communication operator, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
the mobile terminal receives login result data which is acquired by the proxy server from a resource server based on the network login request through a network of a mobile communication operator;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal through the proxy server is included in a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, before the determining whether the current free remaining traffic of the mobile terminal is greater than a preset amount, the method further includes:
the mobile terminal inquires the free residual flow from a distribution server through a network of a mobile communication operator; or
The mobile terminal obtains the flow consumed by the communication with the proxy server, and obtains the free residual flow based on the consumed flow and the free total flow which the mobile terminal has.
Optionally, the method further comprises:
when the login result data indicate that the login is successful, the mobile terminal sends a data access request for accessing the network to the proxy server through a network of a mobile communication operator, wherein the data access request comprises the communication identifier;
the mobile terminal receives the data access request from the resource server through the network of the mobile communication operator, and the proxy server acquires the requested data from the resource server based on the data access request.
Optionally, before sending the network login request to the proxy server to log in to the network, the method further includes:
the mobile terminal acquires the proxy server distributed by a distribution server in the game server accessing process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
The mobile terminal acquires a preset label distributed by the proxy server in the game server accessing process, the preset label is carried when data transmission is carried out in the game server accessing process, and the preset label is the flow-free identification.
Optionally, before sending the network login request to the proxy server to log in to the network, the method further includes:
and the mobile terminal sends the communication identification and the identity authentication information of the mobile terminal to a distribution server, so that the distribution server distributes the proxy server to the processes of logging in a network and accessing the network after successful logging in after verifying that the communication identification of the mobile terminal has the traffic-free authority.
Optionally, before sending the network login request to the proxy server to log in to the network, the method further includes:
the mobile terminal receives temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the network login request for logging in the network to the proxy server specifically includes:
and the mobile terminal sends a network login request carrying the temporary verification information to the proxy server so that the proxy server verifies the validity of the network login request based on the temporary verification information.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal logs in the network through the proxy server to a specified service provider based on the traffic-free identifier, specifically:
the data traffic of a specific proportion in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the data traffic of a specific amount in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
Optionally, the preset amount is specifically: the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, after the determining whether the current free remaining traffic of the mobile terminal is greater than a preset amount, the method further includes:
and if the current free residual flow of the mobile terminal is not greater than the preset amount, the mobile terminal sends the network login request to an operator server of a mobile communication operator so as to log in a network through the operator server.
Optionally, after the determining whether the current free remaining traffic of the mobile terminal is greater than a preset amount, the method further includes:
and if the current free residual flow of the mobile terminal is not greater than the preset amount, generating and displaying prompt information for prompting the user to increase the free residual flow.
According to another aspect of the present invention, there is provided a mobile terminal including:
the judging module is used for judging whether the current free residual flow of the mobile terminal is larger than a preset amount or not before responding to a network login instruction;
a first sending module, configured to send, when the determining module determines that the mobile terminal is the mobile terminal, a network login request for logging in a network to a proxy server through a network of a mobile communication operator, where the network login request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
a first obtaining module, configured to receive, through a network of a mobile communications operator, login result data obtained by the proxy server from a resource server based on the network login request;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal through the proxy server is included in a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile terminal further includes:
a control module, configured to query a distribution server for the free remaining traffic through a network of a mobile communication operator before determining whether the current free remaining traffic of the mobile terminal is greater than a preset amount; or
And obtaining the consumed flow for communicating with the proxy server, and obtaining the free residual flow based on the consumed flow and the free total flow which the mobile terminal has.
Optionally, the mobile terminal further includes:
a second sending module, configured to send, to the proxy server through a network of a mobile communication operator, a data access request for accessing the network when the login result data indicates that the login is successful, where the data access request includes the communication identifier;
a second obtaining module, configured to receive, through a network of a mobile communication operator, the proxy server and obtain, based on the data access request, the requested data from the resource server.
Optionally, the mobile terminal further includes:
a third obtaining module, configured to obtain, before the network login request for logging in a network is sent to a proxy server, the proxy server allocated by a distribution server for the game server accessing process, where an IP address of the proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And acquiring a preset label distributed by the proxy server for the game server accessing process, wherein the preset label is carried when data transmission is carried out in the game server accessing process, and the preset label is the flow-free identifier.
Optionally, the mobile terminal further includes:
and the third sending module is used for sending the communication identifier and the identity authentication information of the mobile terminal to the distribution server before sending the network login request for logging in the network to the proxy server, so that the proxy server is distributed for the network login and the network access process after successful login after the distribution server verifies that the communication identifier of the mobile terminal has the traffic-free permission.
Optionally, the mobile terminal further includes:
a first receiving module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a network login request for logging in a network to a proxy server, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic-free right;
the second sending module is specifically configured to:
and sending a network login request carrying the temporary verification information to the proxy server so that the proxy server verifies the validity of the network login request based on the temporary verification information.
Optionally, the mobile network operator adds all or part of data traffic generated in the process of logging in the network by the mobile terminal through the proxy server to the designated service provider based on the traffic-free identifier, specifically:
the data traffic of a specific proportion in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the data traffic of a specific amount in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
Optionally, the preset amount specifically includes: the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, the mobile terminal further includes:
and the fourth sending module is used for sending the network login request to an operator server of a mobile communication operator to log in a network through the operator server if the current free residual flow of the mobile terminal is not greater than the preset amount after judging whether the current free residual flow of the mobile terminal is greater than the preset amount.
Optionally, the mobile terminal further includes:
and the first generation module is used for generating and displaying prompt information for prompting a user to increase the free residual flow if the current free residual flow of the mobile terminal is not greater than the preset amount after judging whether the current free residual flow of the mobile terminal is greater than the preset amount.
According to another aspect of the present invention, there is provided a method for controlling a mobile terminal to perform network login, the method comprising:
the distribution server receives query information for querying the current free remaining traffic information of the mobile terminal through a network of a mobile communication operator;
the distribution server responds to the query information and sends free residual flow information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communication operator, so that the mobile terminal confirms whether the mobile terminal can log in the network through a proxy server in a flow-free mode or not based on the free residual flow information;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal is included in a specified service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further comprises:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal sent by the mobile terminal;
the distribution server verifies whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
and when determining that the communication identifier of the mobile terminal has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal.
Optionally, when determining that the communication identifier of the mobile terminal has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal, which specifically includes:
the distribution server obtains the free residual flow information of the communication identification of the mobile terminal which is charged by adopting a charging mode of the specified service provider;
the distribution server judges whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution server distributes the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the preset amount is specifically: the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, after the distribution server determines whether the free remaining traffic of the mobile terminal is greater than a preset amount based on the free remaining traffic information, the method further includes:
if the free residual flow of the mobile terminal is not larger than the preset amount, sending first prompt information for prompting a user to increase the free residual flow to the mobile terminal, and/or sending second prompt information for prompting the user that the current free residual flow of the user is insufficient to log in a network through an operator server of a mobile communication operator to the mobile terminal.
Optionally, after the proxy server is allocated to the mobile terminal, the method further includes:
the method comprises the steps that a proxy server receives a network login request which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
the proxy server obtains corresponding login result data from a resource server according to a network login request from the mobile terminal, and transmits the login result data to the mobile terminal through a network of a mobile communication operator.
Optionally, the method further comprises:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the receiving of the network login request of the mobile terminal specifically includes: the proxy server receives the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the obtaining of the corresponding login result data from the resource server specifically includes: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires the login result data from the resource server.
Optionally, all or part of data traffic generated during the process of logging in the network by the mobile terminal is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
Optionally, before the receiving the network login request of the mobile terminal, the method further includes: the proxy server sends a preset tag to the mobile terminal, the preset tag is carried when data transmission is carried out in the network login process, and the preset tag is the flow-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
Optionally, all or part of data traffic generated during the process of logging in the network by the mobile terminal is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
Optionally, the method further comprises: and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period, and obtains the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the method further comprises:
the proxy server sends the data traffic information consumed by the mobile terminal to a distribution server;
and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
According to another aspect of the present invention, there is provided a distribution server comprising:
a second receiving module, configured to receive, through a network of a mobile communication operator, query information for querying current free remaining traffic information of the mobile terminal;
a fifth sending module, configured to send, in response to the query information, free remaining traffic information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communications operator, so that the mobile terminal determines, based on the free remaining traffic information, whether the mobile terminal can log in a network through a proxy server in the traffic-free manner;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal is included in a specified service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further includes:
a third receiving module, configured to receive the communication identifier and the authentication information of the mobile terminal sent by the mobile terminal;
the verification module is used for verifying whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier of the mobile terminal is determined to have the traffic exemption right.
Optionally, the allocation module specifically includes:
an obtaining unit, configured to obtain the free remaining traffic information that is charged by the communication identifier of the mobile terminal in a charging manner of the specified service provider;
the judging unit is used for judging whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the preset amount specifically includes:
the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, the distribution server further includes:
a sixth sending module, configured to send, after the distribution server determines, based on the free remaining traffic information, whether the free remaining traffic of the mobile terminal is greater than a preset amount, first prompt information for prompting a user to increase the free remaining traffic to the mobile terminal if the free remaining traffic of the mobile terminal is not greater than the preset amount, and/or send, to the mobile terminal, second prompt information for prompting the user that the current free remaining traffic is insufficient to request to log in a network through an operator server of a mobile communications operator.
According to another aspect of the present invention, there is provided a network entry system, including:
a distribution server;
the proxy server specifically comprises:
a fourth receiving module, configured to receive a network login request, which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, where the network login request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
and the fourth acquisition module is used for acquiring corresponding login result data from a resource server according to the network login request from the mobile terminal and transmitting the login result data to the mobile terminal through the network of a mobile communication operator.
Optionally, the distribution server further includes:
the second generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the proxy server;
the fourth receiving module is specifically configured to: receiving the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the fourth obtaining module is specifically configured to: and when the data access request is verified to be legal through the temporary verification information, obtaining the login result data from the resource server.
Optionally, all or part of the data traffic generated during the process of the mobile terminal logging in the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
Optionally, the proxy server further includes:
a seventh sending module, configured to send a preset tag to the mobile terminal before the network login request of the mobile terminal is received, where the preset tag is carried during data transmission in the network login process, and the preset tag is the traffic-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
Optionally, all or part of the data traffic generated during the process of the mobile terminal logging in the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
Optionally, the proxy server further includes:
and the acquisition module is used for counting the data traffic information consumed by the mobile terminal according to a preset counting period and acquiring the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the proxy server further includes:
an eighth sending module, configured to send the data traffic information consumed by the mobile terminal to a distribution server;
the distribution server further includes:
and the determining module is used for determining the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
According to the method for network login, the distribution server receives query information for querying the current free residual flow information of the mobile terminal, responds to the query information and sends the current free residual flow information of the mobile terminal to the mobile terminal through the network of the mobile communication operator, so that the mobile terminal confirms whether the mobile terminal can log in the network through the proxy server in a flow-free mode or not based on the free residual flow information; the traffic-free identification is marked on the data transmission label in the network login process, all or part of data traffic generated in the network login process of the mobile terminal is included in a designated service provider by a mobile network operator based on the traffic-free identification, and therefore traffic consumption of the mobile terminal in the network login process can be reduced, the technical problem that a large amount of data traffic of the mobile terminal needs to be consumed when the mobile terminal logs in the network in the prior art is solved, and the beneficial effect of reducing traffic consumption of the mobile terminal is achieved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a method for controlling a mobile terminal to perform network entry according to an embodiment of the present invention
FIG. 2 illustrates an interactive method for network entry by a mobile terminal according to one embodiment of the present invention;
FIG. 3 illustrates a flow diagram of a method for network entry by a mobile terminal in accordance with one embodiment of the present invention;
FIG. 4 illustrates a mobile terminal according to one embodiment of the present invention;
FIG. 5 illustrates a distribution server according to one embodiment of the present invention;
fig. 6 illustrates a system for network entry according to one embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method, a distribution server and a system for network login, which are used for solving the technical problem that a large amount of data traffic of a mobile terminal needs to be consumed when the mobile terminal in the prior art logs in a network.
The interactive method for a mobile terminal to perform network login introduced in the embodiment of the present invention is, as shown in fig. 1, an interactive diagram of the method, and a device related to the method includes: the system comprises a mobile terminal, a distribution server, a proxy server and a resource server, wherein the mobile terminal is, for example: mobile phones, tablet computers, and the like, and a user of the mobile terminal is a terminal user; the distribution server is mainly used for providing identity authentication for the mobile terminal and selecting the proxy server; the proxy server is mainly used for providing network access service for the mobile terminal with the internet surfing flow-free authority; resource servers are typically provided by network content providers for providing rich and diverse network contents to end users using network resources of the internet, such as: videos, web pages, pictures, and the like.
Referring to fig. 1, the interactive method for a mobile terminal to perform network login includes the following steps:
step S101: the distribution server receives query information for querying the current free remaining traffic information of the mobile terminal through a network of a mobile communication operator;
step S102: the distribution server responds to the query information, free residual flow information which the mobile terminal currently has is sent to the mobile terminal through a network of a mobile communication operator, and the mobile terminal is enabled to confirm whether the mobile terminal can log in the network through the proxy server in a flow-free mode or not based on the free residual flow information;
the data transmission mark in the network login process is marked with a flow-free mark, and all or part of data flow generated in the network login process of the mobile terminal is counted into a designated service provider by a mobile network operator based on the flow-free mark.
As an alternative embodiment, after the mobile terminal confirms that the mobile terminal can log in the network through the proxy server in a traffic-free manner based on the free remaining traffic information, the mobile terminal logs in the network through the proxy server distributed by the distribution server. Process of logging on to network through proxy server referring to fig. 2, comprising the following steps:
step S210: the method comprises the steps that a proxy server receives a network login request which is sent by a mobile terminal through a network of a mobile communication operator and is used for logging in the network, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
step S220: the proxy server acquires corresponding login result data from the resource server according to a network login request from the mobile terminal;
step S230: the proxy server transmits the login result data to the mobile terminal through the network of the mobile communication operator.
Certainly, after logging in the network successfully, the mobile terminal may also access the network through the proxy server, and the process of accessing the network through the proxy server is the same as the process of logging in the network, and includes: the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority; the proxy server acquires corresponding requested data from the resource server according to the data access request from the mobile terminal and transmits the requested data to the mobile terminal.
As an optional embodiment, before the proxy server receives the network login request, the mobile terminal needs to determine a proxy server providing a network access service for the mobile terminal, wherein the mobile terminal may directly send the communication identifier of the mobile terminal to the distribution server, the distribution server determines whether the communication identifier has the traffic exemption right, and when the distribution server determines that the communication identifier has the traffic exemption right, the proxy server is allocated to the mobile terminal, otherwise, the proxy server is not allocated to the mobile terminal.
As an alternative embodiment, the process of determining the proxy server continues with reference to fig. 2, and includes the following steps:
step S201: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal;
step S202: the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
step S203: and when determining that the communication identifier has the traffic-free right, the distribution server allocates a proxy server for the mobile terminal.
For example, before step S201, the mobile terminal may bind the communication identifier of the mobile terminal in the distribution server in advance through registration or the like, for example: the mobile terminal can firstly apply for a traffic-free service from a distribution server, after receiving the application from the mobile terminal, the distribution server determines whether to distribute a traffic-free authority to the communication identifier of the mobile terminal according to some preset conditions (for example, whether the software initiating the application is predetermined software, whether the mobile terminal uses the predetermined software, whether the communication identifier is registered in a specified service provider, and the like), and if the distribution server determines to distribute the traffic-free authority to the mobile terminal, the distribution server sends a UserKey (user password) to the mobile terminal as identity authentication information; further, in order to ensure that the communication identifier of the mobile terminal is not falsely used by other users, the distribution server may first send a verification code to the communication identifier, and the user of the mobile terminal allocates the identity verification information to the mobile terminal only after successfully filling the verification code; in addition, there is usually a traffic limitation when providing a flow-free service for a network login process of a mobile terminal, where the traffic limitation refers to allocating a specific traffic for each predetermined period of time for the mobile terminal, if a total traffic that the mobile terminal uses cumulatively in the network login process does not exceed the specific traffic, it is allocated with a flow-free authority if it meets the flow-free requirement, and if the total traffic that the mobile terminal uses in the network login process exceeds the specific traffic, it is not allocated with a flow-free authority, for example; 30M free traffic, 50M free traffic, etc. may be allocated for a mobile terminal for one month.
Further if the mobile terminal needs to log on to the network, for example: when the operation that the user of the mobile terminal starts the browser is detected, the mobile terminal sends the communication identification and the authentication information of the mobile terminal to the distribution server.
In step S202, the distribution server determines whether the received authentication information of the communication identifier matches with the pre-stored authentication information of the communication identifier, and if so, it indicates that the corresponding mobile terminal has the traffic exemption permission, otherwise, it indicates that the corresponding mobile terminal does not have the traffic exemption permission.
In step S203, since the distribution server has a traffic limit for the traffic-free permission allocated to the mobile terminal, for this reason, after determining that the mobile terminal has the traffic-free permission, the distribution server needs to determine that the remaining traffic is greater than the preset amount, and only when the remaining traffic is greater than the preset amount, the distribution server allocates the proxy server to the mobile terminal, where the processing procedure specifically includes the following steps: the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; judging whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information; and when the free residual flow is larger than the preset amount, distributing the proxy server for the mobile terminal.
One of the roles of the distribution server is to count the free remaining traffic information identified by the communication in general. The preset quantity may specifically be a flow demand quantity of a resource page to be currently logged in by the mobile terminal, for example, if a flow demand of a resource page "download application" to be currently logged in by a user is 20M, the preset quantity is 20M; alternatively, the preset amount is a minimum fixed amount required for logging in the network, for example, the preset amount is: 0M, 1M, 512K and the like, wherein if the free residual flow is larger than the preset amount, the flow-free residual flow can meet the requirement of the network login under the normal condition, so that a proxy server can be allocated to the flow-free residual flow; on the contrary, if the free remaining traffic is not greater than the preset amount, it indicates that the free remaining traffic cannot satisfy the current network access under normal conditions, and therefore the proxy server is not allocated to the free remaining traffic.
When the free remaining traffic is not greater than the preset amount, the distribution server may send a first prompt message for prompting the user to increase the free remaining traffic to the mobile terminal, for example, the first prompt message may be "respect user, your free remaining traffic is insufficient, please increase your free remaining traffic"; in addition, the distribution server may further send, to the mobile terminal, second prompt information for prompting the user that the current free remaining traffic is insufficient to log in to the network through an operator server of the mobile communication operator, for example, the second prompt information may be "respect user, your free remaining traffic is insufficient, please log in to the network through the operator server of the mobile communication operator".
When the distribution server allocates the proxy server to the mobile terminal, the distribution server may select a proxy server closest to the physical location of the mobile terminal from the plurality of proxy servers to allocate to the mobile terminal, may select a proxy server with the lightest network load to allocate to the mobile terminal, or select a proxy server with the lowest network delay to allocate to the mobile terminal, or the like, or may select the distribution server by taking comprehensive consideration of at least two policies among the plurality of distribution policies, and as to what manner the distribution server adopts to allocate the proxy server to the mobile terminal, the embodiments of the present invention are not listed in detail and are not limited.
As an optional embodiment, if the mobile terminal has the traffic exemption right, the distribution server may generate temporary authentication information (token) for the current network access process of the mobile terminal. In order to ensure that the subsequent mobile terminal can connect to the proxy server, the distribution server needs to send some data to the proxy server, and four data are listed below for description, but of course, in the implementation process, the following four cases are not limited. Firstly, a distribution server sends a communication identifier of a mobile terminal to a proxy server; the distributing server sends the communication identification and the temporary verification information of the mobile terminal to the proxy server; thirdly, the distribution server sends the communication identification and the free residual flow information of the mobile terminal to the proxy server; and fourthly, the distribution server sends the communication identification of the mobile terminal, the free residual flow information and the temporary verification information to the proxy server. Of course, when the distribution server actively sends the free remaining traffic information to the mobile terminal, the mobile terminal may determine whether its own free remaining traffic is greater than a preset amount based on the latest free remaining traffic information before responding to the network login instruction, and further determine whether to log in the network through the proxy server in a traffic-free manner. If the distribution server does not send the free remaining traffic information to the mobile terminal or does not send the latest free remaining traffic information to the mobile terminal, the mobile terminal may query the distribution server for the current free remaining traffic through the network of the mobile communication operator before responding to the network login instruction; alternatively, the traffic consumed by the mobile terminal for communicating with all the proxy servers is obtained (for example, the consumed traffic is counted by using its own traffic counting function), and the current free remaining traffic, that is, the current free remaining traffic is obtained based on the consumed traffic and the total free traffic that the mobile terminal has, that is, the current free remaining traffic is the total free traffic-the consumed traffic.
In addition, address information of the proxy server also needs to be provided for the mobile terminal, wherein the address information of the proxy server can be directly sent to the mobile terminal by the distribution server; the proxy server may also send the communication identifier of the mobile terminal to the mobile terminal through the communication identifier of the mobile terminal after receiving the communication identifier of the mobile terminal. As shown in step S204 of fig. 2, a procedure of the mobile terminal to which the address information of the proxy server is transmitted by the distribution server.
After the preparation is completed, in step S210, if the distribution server does not allocate temporary authentication information to the network access process in steps S201 to S203, the mobile terminal directly sends the network login request carrying the traffic-free identifier to the proxy server; if the distribution server distributes the temporary verification information to the network access process in the steps S201 to S203, the mobile terminal sends the network login request carrying the traffic-free identification and the temporary verification information to the proxy server.
The flow-free identifier may be a plurality of different forms of flow-free identifiers, and two of them are listed below for description, and certainly, in the specific implementation process, the flow-free identifier is not limited to the following two cases.
The method comprises the steps that after a proxy server receives a communication identifier of a mobile terminal sent by a distribution server and before a network login request sent by the mobile terminal is received, a preset tag is sent to the mobile terminal, the preset tag is carried when the mobile terminal logs in a network for data transmission, and the preset tag is a flow-free identifier.
And secondly, the IP address of the proxy server distributed by the distribution server for the mobile terminal is a preset IP address, and the preset IP address is the flow-free identifier.
In step S220, the proxy server may directly obtain corresponding login result data from the resource server after receiving the network login request sent by the mobile terminal, and based on different information sent to the proxy server before the distribution server, the proxy server may also perform some authentication processes first, and the following three authentication processes are listed for description, but of course, in the specific implementation process, the present invention is not limited to the following three cases.
The data sent by the distribution server to the proxy server comprises a communication identifier and temporary authentication information of the mobile terminal, in this case, the network login request sent by the mobile terminal also comprises the temporary authentication information, and the proxy server obtains login result data from the resource server when the network login request is authenticated to be legal through the temporary authentication information. The proxy server matches the temporary authentication information sent by the mobile terminal with the temporary authentication information sent by the distribution server, if the matching is successful, the network login request is legal, otherwise, the network login request is illegal. By the scheme, the security of the network access process can be ensured.
If the data sent by the distribution server to the proxy server comprises the communication identification of the mobile terminal and the free residual flow information, the proxy server firstly judges whether the latest free residual flow of the mobile terminal is greater than the preset amount based on the free residual flow information after receiving the network login request; and when the latest free residual flow information is larger than the preset amount, obtaining login result data from the resource server, and if the latest free residual flow information is not larger than the preset amount, informing the mobile terminal to enable the mobile terminal to access the resource server through another access path (for example, directly sending a network login request to the resource server). Through the scheme, the specified service provider can provide a specific amount of free data flow to the mobile terminal.
Since the distribution server judges that the free residual flow of the mobile terminal is greater than the preset amount before distributing the proxy server, when the proxy server receives the network login request for the first time, it is not necessary to judge whether the latest free residual flow (i.e. the free residual flow sent by the distribution server) is greater than the preset amount; the data traffic consumed by the network access request is directly counted, and then the data traffic is subtracted from the free residual traffic sent by the distribution server, so that the latest free data traffic can be obtained; whether the network login request is sent to the resource server can be determined by judging whether the latest free data flow is larger than a preset amount in the subsequent process.
In addition, the proxy server can also count the data traffic information consumed by the mobile terminal according to a preset counting period, and acquire the latest free residual traffic information with traffic-free permission of the mobile terminal.
For example, the preset statistical period may be, for example, a preset statistical time interval, the preset statistical time interval may be, for example, 30s, 50s, 1min, and the like, and the proxy server may set a timer, acquire, every time the preset time interval arrives, the data traffic consumed by the mobile terminal counted in the current time interval, and obtain the latest free remaining traffic information of the mobile terminal based on the data traffic statistics.
The preset statistical period is, for example: the method comprises the steps that preset statistical flow is 512k, 1M and the like, a proxy server can monitor data flow consumed by the mobile terminal, and when the preset statistical flow is consumed, the latest free residual flow information of the mobile terminal is determined according to the preset statistical flow.
Through the scheme, the latest residual flow information of the mobile terminal can be ensured to be obtained in time.
Of course, after the proxy server counts the data traffic information consumed by the mobile terminal in the counting period, the proxy server may transmit the data traffic information to the distribution server, and the distribution server may count the latest free remaining traffic information of the mobile terminal.
After obtaining the data traffic information consumed by the mobile terminal, the distribution server can also send the data traffic information to the mobile terminal or inform the data traffic information when the mobile terminal inquires; or after determining the latest free remaining traffic information of the mobile terminal, the distribution server can also send the latest free remaining traffic information to the mobile terminal, so that the mobile terminal can further know the current traffic use condition, and then a better network access strategy is selected. Or upon inquiry by the mobile terminal.
And thirdly, the data sent by the distribution server to the proxy server comprises the communication identification of the mobile terminal, the free residual flow information and the temporary verification information, and under the condition, the proxy server adopts the resource server to obtain login result data when the proxy server verifies that the network login request is legal through the temporary verification information and the latest free residual flow information is larger than the preset amount. By the scheme, the safety of the network access process can be guaranteed, and the appointed service provider can be guaranteed to provide the preset amount of free flow to the mobile terminal.
In step S230, the data in the process of the mobile terminal logging in the network includes uplink data and downlink data, where the uplink data is the data sent by the mobile terminal to the resource server (i.e., the network login request), and the downlink data is the data sent by the resource server to the mobile terminal (i.e., the login result data and the requested data), and the data traffic of at least one of the uplink data and the downlink data is counted in the data traffic consumed by the designated server. In the same way, the process of accessing the network by the mobile terminal also comprises uplink data and downlink data, wherein the data traffic of at least one kind of data is counted in the data traffic consumed by the appointed server.
For example, a network login request sent by the mobile terminal includes a traffic-free identifier, and data traffic corresponding to the network login request is credited to a specified service provider based on the traffic-free identifier; another example is: after the network login request carrying the traffic-free identifier is sent to the resource server, the login result data returned by the resource server also comprises the traffic-free identifier, and then the data traffic of the login result data is counted into the data traffic consumed by the specified server based on the traffic-free identifier.
In the specific implementation process, the data traffic in the network access process can be counted through a gateway arranged between the mobile terminal and the proxy server.
Aiming at the condition that the flow-free identifier is a preset IP, after receiving a network login request sent by a mobile terminal, a corresponding gateway (or a charging system connected with a corresponding network) judges whether the IP of a next node corresponding to the network login request is the preset IP, if so, the data flow of the next node is counted into the data flow of a specified service provider, after receiving login result data sent by a proxy server, the corresponding gateway (or the charging system connected with the corresponding network) judges whether the IP of the proxy server is the preset IP, and if so, the data flow of the proxy server is counted into the data flow of the specified service provider; when the traffic-free identifier is a preset tag, the corresponding gateway (or a charging system connected to the corresponding network) receives a network login request (or login result data sent by the proxy server) sent by the mobile terminal, and then determines whether the network login request (or login result data) contains the preset tag, and if the network login request (or login result data) contains the preset tag, the data traffic of the gateway is added to the data traffic of the specified service provider.
In the specific implementation process, a mobile network operator adds part of data traffic generated in the process that the mobile terminal logs in the network through the proxy server to a specified service provider based on the traffic-free identifier, and there may be a plurality of cases, three of which are listed below for introduction, and certainly, in the specific implementation process, the mobile terminal is not limited to the following three cases.
First, a specific percentage of data traffic is accounted for by a designated service provider during the mobile terminal's log-in process to the network.
For example, the specific ratios are, for example: 50%, 70%, etc., wherein when the mobile terminal has a traffic exemption right (for example, the data transmission carries a traffic exempt identifier) during logging in the network, the corresponding gateway (or a charging system connected to the corresponding network) credits a specific proportion of the gateway to a specified service provider, and credits the rest of the gateway to the communication identifier, for example: assuming that the mobile terminal consumes 10M of traffic in the network access process at this time, and the specific proportion is 50%, the charging system counts 5M of traffic into the designated service provider during charging, and counts the rest 5M of traffic into the communication identifier of the mobile terminal. Of course, the above data are by way of example only and not by way of limitation.
Second, a certain amount of data traffic during the mobile terminal's log-in to the network is accounted for by the designated service provider.
For example, the specific number is, for example: 10M, 20M and the like, wherein when the mobile terminal has a traffic-free right in the process of logging in the network, the corresponding gateway (or a charging system connected with the corresponding network) judges whether the data traffic in the process of logging in the network exceeds the specific quantity or not after the process of logging in the network is finished, and if the data traffic does not exceed the specific quantity, all the data traffic is counted in a specified service provider; if the number exceeds a certain number, no more than a portion of the data traffic is included in the designated service provider and more than a portion is included in the communication identification of the mobile terminal.
Thirdly, the data traffic of the specific contents is charged to the designated service provider during the mobile terminal logs in the network.
For example, the specific content is, for example: when the mobile terminal has a traffic-free right in a network login process, a corresponding gateway (or a charging system connected with a corresponding network) acquires data transmitted in the network login process, then determines data such as characters and pictures from the data transmitted in the network login process, and records the corresponding data traffic into a specified service provider; while for other types of content, for example: and the video records the corresponding data flow into the communication identifier of the mobile terminal.
As a possible implementation manner, the method for accounting in the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
For example, since the corresponding data traffic is charged to the specified service provider, and the mobile communication operator does not perform repeated charging for one network access process, the corresponding data traffic is not charged to the identifier of the mobile terminal, and therefore, when the mobile communication operator charges, the charge generated by the mobile communication operator is charged to the charge consumed by the account of the specified service provider, so as to charge the specified service provider.
As an alternative embodiment, with continued reference to fig. 2, the method further includes:
step S240: the proxy server judges whether a network login request of the mobile terminal is received within a preset time period;
step S250: and if the network login request of the mobile terminal is not received within the preset time period, prompting that the mobile terminal is logged out.
For example, the preset time period is, for example: 10min, 30min, 40min, etc., if the proxy server does not receive the network login request sent by the mobile terminal within the preset time period, it indicates that the network login process of the mobile terminal is finished, so a corresponding prompt message can be generated. Further, the proxy server may also send the hint information to the distribution server after generating the hint information.
In this case, if the temporary authentication information has been previously allocated by the distribution server for the network login procedure of this time, the distribution server cancels the temporary authentication information based on the prompt information transmitted by the proxy server, and the proxy server also cancels the temporary authentication information. By the scheme, the distributed temporary verification information can be ensured to be only used as the verification information in the network access process at the time, and new temporary verification information still needs to be generated in the next network access, so that the security of the network access is improved.
Certainly, the proxy server receives the network login request within the preset time period and feeds back the login result data, and then the proxy server further judges whether the data access request of the mobile terminal is received within the preset time period after the login result data is fed back, and if not, the proxy server also prompts that the mobile terminal quits the login.
As an alternative embodiment, if the proxy server prompts that the mobile terminal has logged off, please continue to refer to fig. 2, the method further includes:
step S260: the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the distribution server;
step S270: and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
For example, the proxy server may send the distribution server the information shown in table 1:
TABLE 1
Starting time End time Consumed data traffic information
2015-4-15 14:23 2015-4-15 14:44 1.6M
The total free data traffic distributed by the distribution server to the mobile terminal is assumed to be: 30M, and the mobile terminal has consumed 20M traffic before the network access, it may be determined that the free remaining traffic of the mobile terminal after the network access process is: 10M-1.6M ═ 8.4M. Of course, the above data traffic is by way of example only and not by way of limitation.
The distribution server and the proxy server introduced in the embodiment of the invention can be two servers with completely independent physical positions; the present invention may also be two different functional modules of the same server, and the embodiment of the present invention is not limited thereto.
Based on the interaction method for network login provided by the embodiment of the invention, the embodiment of the invention provides a method for network login, the method is applied to a proxy server and a distribution server, and the method comprises the following steps:
the distribution server receives query information for querying the current free remaining traffic information of the mobile terminal through a network of a mobile communication operator;
the distribution server responds to the query information, free residual flow information which the mobile terminal currently has is sent to the mobile terminal through a network of a mobile communication operator, and the mobile terminal is enabled to confirm whether the mobile terminal can log in the network through the proxy server in a flow-free mode or not based on the free residual flow information;
the data transmission mark in the network login process is marked with a flow-free mark, and all or part of data flow generated in the network login process of the mobile terminal is counted into a designated service provider by a mobile network operator based on the flow-free mark.
Optionally, before receiving query information for querying current free remaining traffic information of the mobile terminal, the method further includes: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal, which are sent by the mobile terminal; the distribution server verifies whether the communication identification of the mobile terminal has the traffic-free permission or not based on the communication identification and the identity verification information; and when determining that the communication identifier of the mobile terminal has the traffic exemption right, the distribution server allocates a proxy server for the mobile terminal.
Optionally, when determining that the communication identifier of the mobile terminal has the traffic exemption right, the distribution server allocates a proxy server to the mobile terminal, which specifically includes: the distribution server acquires free residual flow information of the communication identifier of the mobile terminal, which is charged by adopting a charging mode of a specified service provider; the distribution server judges whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information; and when the free residual flow is larger than the preset amount, the distribution server distributes the proxy server for the mobile terminal.
Optionally, the preset amount is specifically: the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, after the distribution server determines whether the free remaining traffic of the mobile terminal is greater than the preset amount based on the free remaining traffic information, the method further includes:
and if the free residual flow of the mobile terminal is not greater than the preset amount, sending first prompt information for prompting the user to increase the free residual flow to the mobile terminal, and/or sending second prompt information for prompting the user that the current free residual flow of the user is insufficient to log in a network through an operator server of a mobile communication operator to the mobile terminal.
Optionally, after the proxy server is allocated to the mobile terminal, the method further includes:
the method comprises the steps that a proxy server receives a network login request which is sent by a mobile terminal through a network of a mobile communication operator and is used for logging in the network, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
the proxy server obtains corresponding login result data from the resource server according to the network login request from the mobile terminal, and transmits the login result data to the mobile terminal through the network of the mobile communication operator.
Optionally, after the distribution server determines that the communication identifier of the mobile terminal has the traffic exemption right, the method further includes:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
receiving a network login request of a mobile terminal, specifically: the proxy server receives a network login request which is sent by the mobile terminal and carries a communication identifier and temporary verification information;
acquiring corresponding login result data from the resource server, specifically comprising: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires login result data from the resource server.
Optionally, all or part of data traffic generated during the process of logging in the network by the mobile terminal is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by a specified service provider; alternatively, the first and second electrodes may be,
the specific amount of data traffic generated during the mobile terminal's log-in to the network is accounted for by the data traffic consumed by the designated service provider.
Optionally, before receiving the network login request of the mobile terminal, the method further includes: the proxy server sends a preset tag to the mobile terminal, the preset tag is carried when data transmission is carried out in the network login process, and the preset tag is a flow-free identifier; alternatively, the first and second electrodes may be,
the IP address of the proxy server with the preset IP address is a flow-free identifier, and the proxy server is used for receiving a network login request.
Optionally, all or part of data traffic generated during the process of logging in the network by the mobile terminal is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network contains the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by the appointed service provider; or
And data transmission in the process of logging in the network by the mobile terminal passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
Optionally, the method further comprises: and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period to obtain the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the method further comprises: the proxy server sends the data traffic information consumed by the mobile terminal to the distribution server; and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Based on the interaction method for performing network login provided in the embodiment of the present invention, another method for performing network login is also provided in the embodiment of the present invention, the method is applied to a mobile terminal, please refer to fig. 3, and the method includes:
s301: before responding to a network login instruction, the mobile terminal judges whether the current free residual flow of the mobile terminal is larger than a preset amount;
s302: if so, the mobile terminal sends a network login request for logging in the network to the proxy server through the network of the mobile communication operator, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has the traffic-free permission of surfing the internet;
s303: the mobile terminal receives login result data acquired by the proxy server from the resource server based on the network login request through a network of a mobile communication operator;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal through the proxy server is included in a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, before determining whether the current free remaining traffic of the mobile terminal is greater than the preset amount in S301, the method further includes:
the mobile terminal inquires the free residual flow from the distribution server through the network of the mobile communication operator; or
The mobile terminal obtains the consumed traffic for communicating with the proxy server, and obtains free residual traffic based on the consumed traffic and the free total traffic the mobile terminal has.
Optionally, after S303, the method further comprises:
when the login result data indicate that the login is successful, the mobile terminal sends a data access request for accessing the network to the proxy server through the network of the mobile communication operator, wherein the data access request comprises a communication identifier;
the mobile terminal acquires the requested data from the resource server based on the data access request through a network reception proxy server of the mobile communication operator.
Optionally, before sending the network login request to the proxy server to log in the network, the method further includes:
the method comprises the steps that a mobile terminal obtains a proxy server distributed by a distribution server in the process of accessing a game server, the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier; or
The mobile terminal acquires a preset label distributed by the proxy server in the process of accessing the game server, the preset label is carried when data transmission is carried out in the process of accessing the game server, and the preset label is a flow-free identifier.
Optionally, before sending the network login request to the proxy server to log in the network, the method further includes:
the mobile terminal sends the communication identification and the identity authentication information of the mobile terminal to the distribution server, so that the distribution server distributes the proxy server for the network login process and the network access process after the network login is successful after the distribution server verifies that the communication identification of the mobile terminal has the traffic-free authority.
Optionally, before sending the network login request to the proxy server for logging in the network in S302, the method further includes:
the mobile terminal receives temporary verification information distributed to the mobile terminal by a distribution server, wherein the temporary verification information is distributed to the mobile terminal when the distribution server determines that the mobile terminal has a traffic-free right;
sending a network login request for logging in a network to a proxy server, specifically:
the mobile terminal sends a network login request carrying the temporary authentication information to the proxy server, so that the proxy server verifies the validity of the network login request based on the temporary authentication information.
Optionally, the mobile network operator adds all or part of data traffic generated in the process of logging in the network by the mobile terminal through the proxy server to the designated service provider based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the data traffic consumed by a specified service provider in the process of logging in the network by the mobile terminal; alternatively, the first and second electrodes may be,
a specific amount of data traffic during the mobile terminal's log-in to the network is accounted for by the data traffic consumed by the designated service provider.
Optionally, the preset amount specifically is: the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, after determining whether the current free remaining traffic of the mobile terminal is greater than the preset amount, the method further includes: if the current free residual flow of the mobile terminal is not larger than the preset amount, the mobile terminal sends a network login request to an operator server of a mobile communication operator so as to log in a network through the operator server.
Optionally, after determining whether the current free remaining traffic of the mobile terminal is greater than the preset amount, the method further includes: and if the current free residual flow of the mobile terminal is not greater than the preset amount, generating and displaying prompt information for prompting the user to increase the free residual flow.
Based on the interaction method for network login provided in the embodiment of the present invention, another mobile terminal is further provided in the embodiment of the present invention, referring to fig. 4, where the mobile terminal includes:
a determining module 401, configured to determine whether a current free remaining traffic of the mobile terminal is greater than a preset amount before responding to a network login instruction;
a first sending module 402, configured to send, when the determining module 401 determines that the request is yes, a network login request for logging in a network to a proxy server through a network of a mobile communication operator, where the network login request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
a first obtaining module 403, configured to receive, through a network of a mobile communication operator, login result data obtained by the proxy server from a resource server based on the network login request;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal through the proxy server is included in a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile terminal further includes:
a control module, configured to query a distribution server for the free remaining traffic through a network of a mobile communication operator before determining whether the current free remaining traffic of the mobile terminal is greater than a preset amount; or
And obtaining the consumed flow for communicating with the proxy server, and obtaining the free residual flow based on the consumed flow and the free total flow which the mobile terminal has.
Optionally, the mobile terminal further includes:
a second sending module, configured to send, to the proxy server through a network of a mobile communication operator, a data access request for accessing the network when the login result data indicates that the login is successful, where the data access request includes the communication identifier;
a second obtaining module, configured to receive, through a network of a mobile communication operator, the proxy server and obtain, based on the data access request, the requested data from the resource server.
Optionally, the mobile terminal further includes:
a third obtaining module, configured to obtain, before the network login request for logging in a network is sent to a proxy server, the proxy server allocated by a distribution server for the game server accessing process, where an IP address of the proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And acquiring a preset label distributed by the proxy server for the game server accessing process, wherein the preset label is carried when data transmission is carried out in the game server accessing process, and the preset label is the flow-free identifier.
Optionally, the mobile terminal further includes:
and the third sending module is used for sending the communication identifier and the identity authentication information of the mobile terminal to the distribution server before sending the network login request for logging in the network to the proxy server, so that the proxy server is distributed for the network login and the network access process after successful login after the distribution server verifies that the communication identifier of the mobile terminal has the traffic-free permission.
Optionally, the mobile terminal further includes:
a first receiving module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a network login request for logging in a network to a proxy server, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic-free right;
the second sending module is specifically configured to:
and sending a network login request carrying the temporary verification information to the proxy server so that the proxy server verifies the validity of the network login request based on the temporary verification information.
Optionally, the mobile network operator adds all or part of data traffic generated in the process of logging in the network by the mobile terminal through the proxy server to the designated service provider based on the traffic-free identifier, specifically:
the data traffic of a specific proportion in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the data traffic of a specific amount in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
Optionally, the preset amount specifically includes: the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, the mobile terminal further includes:
and the fourth sending module is used for sending the network login request to an operator server of a mobile communication operator to log in a network through the operator server if the current free residual flow of the mobile terminal is not greater than the preset amount after judging whether the current free residual flow of the mobile terminal is greater than the preset amount.
Optionally, the mobile terminal further includes:
and the first generation module is used for generating and displaying prompt information for prompting a user to increase the free residual flow if the current free residual flow of the mobile terminal is not greater than the preset amount after judging whether the current free residual flow of the mobile terminal is greater than the preset amount.
Based on the interaction method for network login provided in the embodiment of the present invention, another distribution server is further provided in the embodiment of the present invention, please refer to fig. 5, where the distribution server includes:
a second receiving module 501, configured to receive query information for querying current free remaining traffic information of the mobile terminal through a network of a mobile communication operator;
a fifth sending module 502, configured to send, in response to the query information, free remaining traffic information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communications operator, so that the mobile terminal determines, based on the free remaining traffic information, whether the mobile terminal can log in a network through a proxy server in the traffic-free manner;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal is included in a specified service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further includes:
a third receiving module, configured to receive the communication identifier and the authentication information of the mobile terminal sent by the mobile terminal;
the verification module is used for verifying whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier of the mobile terminal is determined to have the traffic exemption right.
Optionally, the allocation module specifically includes:
an obtaining unit, configured to obtain the free remaining traffic information that is charged by the communication identifier of the mobile terminal in a charging manner of the specified service provider;
the judging unit is used for judging whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the preset amount specifically includes:
the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
Optionally, the distribution server further includes:
a sixth sending module, configured to send, after the distribution server determines, based on the free remaining traffic information, whether the free remaining traffic of the mobile terminal is greater than a preset amount, first prompt information for prompting a user to increase the free remaining traffic to the mobile terminal if the free remaining traffic of the mobile terminal is not greater than the preset amount, and/or send, to the mobile terminal, second prompt information for prompting the user that the current free remaining traffic is insufficient to request to log in a network through an operator server of a mobile communications operator.
Based on the interaction method for network login provided in the embodiment of the present invention, another system for network login is also provided in the embodiment of the present invention, please refer to fig. 6, where the system includes:
a distribution server 500;
the proxy server 600 specifically includes:
a fourth receiving module, configured to receive a network login request, which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, where the network login request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
and the fourth acquisition module is used for acquiring corresponding login result data from a resource server according to the network login request from the mobile terminal and transmitting the login result data to the mobile terminal through the network of a mobile communication operator.
Optionally, the distribution server further includes:
the second generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the proxy server;
the fourth receiving module is specifically configured to: receiving the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the fourth obtaining module is specifically configured to: and when the data access request is verified to be legal through the temporary verification information, obtaining the login result data from the resource server.
Optionally, all or part of the data traffic generated during the process of the mobile terminal logging in the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
Optionally, the proxy server further includes:
a seventh sending module, configured to send a preset tag to the mobile terminal before the network login request of the mobile terminal is received, where the preset tag is carried during data transmission in the network login process, and the preset tag is the traffic-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
Optionally, all or part of the data traffic generated during the process of the mobile terminal logging in the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
Optionally, the proxy server further includes:
and the acquisition module is used for counting the data traffic information consumed by the mobile terminal according to a preset counting period and acquiring the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the proxy server further includes:
an eighth sending module, configured to send the data traffic information consumed by the mobile terminal to a distribution server;
the distribution server further includes:
and the determining module is used for determining the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
One or more technical solutions in the embodiments of the present application can achieve at least the following technical effects:
receiving query information for querying current free residual flow information of the mobile terminal through a distribution server, responding to the query information, and sending the current free residual flow information of the mobile terminal to the mobile terminal through a network of a mobile communication operator, so that the mobile terminal confirms whether the mobile terminal can log in the network through a proxy server in a flow-free manner based on the free residual flow information; the traffic-free identification is marked on the data transmission label in the network login process, all or part of data traffic generated in the network login process of the mobile terminal is included in a designated service provider by a mobile network operator based on the traffic-free identification, and therefore traffic consumption of the mobile terminal in the network login process can be reduced, the technical problem that a large amount of data traffic of the mobile terminal needs to be consumed when the mobile terminal logs in the network in the prior art is solved, and the beneficial effect of reducing traffic consumption of the mobile terminal is achieved.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that microprocessors or Digital Signal Processors (DSPs) may be used in practice to implement some or all of the functionality of some or all of the components of a distribution server, proxy server, according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses, C1, a method for controlling a mobile terminal to perform network login, comprising:
the distribution server receives query information for querying the current free remaining traffic information of the mobile terminal through a network of a mobile communication operator;
the distribution server responds to the query information and sends free residual flow information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communication operator, so that the mobile terminal confirms whether the mobile terminal can log in the network through a proxy server in a flow-free mode or not based on the free residual flow information;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal is included in a specified service provider by a mobile network operator based on the flow-free identifier.
C2, the method according to C1, further comprising:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal sent by the mobile terminal;
the distribution server verifies whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
and when determining that the communication identifier of the mobile terminal has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal.
C3, the method according to C2, wherein the allocating, by the distribution server, the proxy server to the mobile terminal when determining that the communication identifier of the mobile terminal has the traffic exemption right includes:
the distribution server obtains the free residual flow information of the communication identification of the mobile terminal which is charged by adopting a charging mode of the specified service provider;
the distribution server judges whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution server distributes the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
C4, the method according to C3, wherein the preset amounts are specifically:
the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
C5, the method according to C3, wherein the method further comprises, after the distribution server determines whether the free remaining traffic of the mobile terminal is greater than a preset amount based on the free remaining traffic information:
if the free residual flow of the mobile terminal is not larger than the preset amount, sending first prompt information for prompting a user to increase the free residual flow to the mobile terminal, and/or sending second prompt information for prompting the user that the current free residual flow of the user is insufficient to log in a network through an operator server of a mobile communication operator to the mobile terminal.
C6, the method according to any of C2 to C5, wherein, after assigning the proxy server to the mobile terminal, the method further comprises:
the method comprises the steps that a proxy server receives a network login request which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
the proxy server obtains corresponding login result data from a resource server according to a network login request from the mobile terminal, and transmits the login result data to the mobile terminal through a network of a mobile communication operator.
C7, the method according to C6, the method further comprising:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the receiving of the network login request of the mobile terminal specifically includes: the proxy server receives the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the obtaining of the corresponding login result data from the resource server specifically includes: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires the login result data from the resource server.
C8, the method according to any of C1 to C5, wherein all or part of the data traffic generated during the login process of the mobile terminal to the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
C9, the method according to C6, wherein before the receiving the network login request of the mobile terminal, the method further comprises: the proxy server sends a preset tag to the mobile terminal, the preset tag is carried when data transmission is carried out in the network login process, and the preset tag is the flow-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
C10, the method according to C9, wherein the mobile network operator credits all or part of the data traffic generated during the mobile terminal logging into the network to the designated service provider based on the traffic-free id, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
C11, the method according to any of C9, wherein the method further comprises:
and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period, and obtains the latest free residual traffic information with the traffic-free permission of the mobile terminal.
C12, the method according to C11, the method further comprising:
the proxy server sends the data traffic information consumed by the mobile terminal to a distribution server;
and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
D13, a distribution server, comprising:
a second receiving module, configured to receive, through a network of a mobile communication operator, query information for querying current free remaining traffic information of the mobile terminal;
a fifth sending module, configured to send, in response to the query information, free remaining traffic information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communications operator, so that the mobile terminal determines, based on the free remaining traffic information, whether the mobile terminal can log in a network through a proxy server in the traffic-free manner;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal is included in a specified service provider by a mobile network operator based on the flow-free identifier.
D14, the distribution server according to D13, further comprising:
a third receiving module, configured to receive the communication identifier and the authentication information of the mobile terminal sent by the mobile terminal;
the verification module is used for verifying whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier of the mobile terminal is determined to have the traffic exemption right.
D15, the distribution server according to D14, wherein the distribution module specifically includes:
an obtaining unit, configured to obtain the free remaining traffic information that is charged by the communication identifier of the mobile terminal in a charging manner of the specified service provider;
the judging unit is used for judging whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
D16, the distribution server according to D15, characterized in that, the preset amount specifically is:
the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
D17, the distribution server according to D15, characterized in that the distribution server further comprises:
a sixth sending module, configured to send, after the distribution server determines, based on the free remaining traffic information, whether the free remaining traffic of the mobile terminal is greater than a preset amount, first prompt information for prompting a user to increase the free remaining traffic to the mobile terminal if the free remaining traffic of the mobile terminal is not greater than the preset amount, and/or send, to the mobile terminal, second prompt information for prompting the user that the current free remaining traffic is insufficient to request to log in a network through an operator server of a mobile communications operator.
E18, a network entry system, comprising:
the distribution server according to any one of D13 to D17;
the proxy server specifically comprises:
a fourth receiving module, configured to receive a network login request, which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, where the network login request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
and the fourth acquisition module is used for acquiring corresponding login result data from a resource server according to the network login request from the mobile terminal and transmitting the login result data to the mobile terminal through the network of a mobile communication operator.
E19, the system according to E18, characterized in that the distribution server further comprises:
the second generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the proxy server;
the fourth receiving module is specifically configured to: receiving the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the fourth obtaining module is specifically configured to: and when the data access request is verified to be legal through the temporary verification information, obtaining the login result data from the resource server.
E20, the system according to E18, wherein all or part of the data traffic generated during the process of the mobile terminal logging in the network is included in a designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
E21, the system according to E18, characterized in that the proxy server further comprises:
a seventh sending module, configured to send a preset tag to the mobile terminal before the network login request of the mobile terminal is received, where the preset tag is carried during data transmission in the network login process, and the preset tag is the traffic-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
E22, the system according to E21, wherein all or part of the data traffic generated during the process of the mobile terminal logging in the network is included in a designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
E23, the system according to E21, characterized in that the proxy server further comprises:
and the acquisition module is used for counting the data traffic information consumed by the mobile terminal according to a preset counting period and acquiring the latest free residual traffic information with the traffic-free permission of the mobile terminal.
E24, the system according to E23, characterized in that the proxy server further comprises:
an eighth sending module, configured to send the data traffic information consumed by the mobile terminal to a distribution server;
the distribution server further includes:
and the determining module is used for determining the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.

Claims (22)

1. A method for controlling a mobile terminal to perform network login, comprising:
the distribution server receives query information for querying the current free remaining traffic information of the mobile terminal through a network of a mobile communication operator;
the distribution server responds to the query information and sends free residual flow information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communication operator, so that the mobile terminal confirms whether the mobile terminal can log in the network through a proxy server in a flow-free mode or not based on the free residual flow information;
wherein, the data transmission in the network login process is marked with a flow-free identification, and all or part of data flow generated in the network login process of the mobile terminal is included in a designated service provider by a mobile network operator based on the flow-free identification
The distribution server receives the communication identification and the identity authentication information of the mobile terminal sent by the mobile terminal;
the distribution server verifies whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
when the distribution server determines that the communication identifier of the mobile terminal has the traffic-free right, the distribution server allocates the proxy server to the mobile terminal;
when the distribution server distributes the proxy server to the mobile terminal, selecting the proxy server closest to the physical position of the mobile terminal from a plurality of proxy servers to distribute the proxy server to the mobile terminal; or selecting the proxy server with the lightest network load to be distributed to the mobile terminal; or selecting the proxy server with the lowest network delay to be distributed to the mobile terminal.
2. The method according to claim 1, wherein the allocating, by the distribution server, the proxy server to the mobile terminal when determining that the communication identifier of the mobile terminal has the traffic exemption right includes:
the distribution server obtains the free residual flow information of the communication identification of the mobile terminal which is charged by adopting a charging mode of the specified service provider;
the distribution server judges whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution server distributes the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
3. The method according to claim 2, characterized in that said preset amounts are in particular:
the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
4. The method of claim 2, wherein after the distribution server determines whether the free remaining traffic of the mobile terminal is greater than a preset amount based on the free remaining traffic information, the method further comprises:
if the free residual flow of the mobile terminal is not larger than the preset amount, sending first prompt information for prompting a user to increase the free residual flow to the mobile terminal, and/or sending second prompt information for prompting the user that the current free residual flow of the user is insufficient to log in a network through an operator server of a mobile communication operator to the mobile terminal.
5. The method according to any of claims 1 to 4, wherein after allocating the proxy server to the mobile terminal, the method further comprises:
the method comprises the steps that a proxy server receives a network login request which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, wherein the network login request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
the proxy server obtains corresponding login result data from a resource server according to a network login request from the mobile terminal, and transmits the login result data to the mobile terminal through a network of a mobile communication operator.
6. The method of claim 5, wherein the method further comprises:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the receiving of the network login request of the mobile terminal specifically includes: the proxy server receives the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the obtaining of the corresponding login result data from the resource server specifically includes: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires the login result data from the resource server.
7. The method according to any of claims 1 to 4, wherein all or part of the data traffic generated during the mobile terminal logging in the network is included in a specific service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
8. The method of claim 5, wherein prior to said receiving the network entry request of the mobile terminal, the method further comprises: the proxy server sends a preset tag to the mobile terminal, the preset tag is carried when data transmission is carried out in the network login process, and the preset tag is the flow-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
9. The method according to claim 8, wherein all or part of the data traffic generated during the mobile terminal logging in the network is included in a specific service provider by a mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
10. The method of claim 8, wherein the method further comprises:
and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period, and obtains the latest free residual traffic information with the traffic-free permission of the mobile terminal.
11. The method of claim 10, wherein the method further comprises:
the proxy server sends the data traffic information consumed by the mobile terminal to a distribution server;
and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
12. A distribution server, comprising:
a second receiving module, configured to receive, through a network of a mobile communication operator, query information for querying current free remaining traffic information of the mobile terminal;
a fifth sending module, configured to send, in response to the query information, free remaining traffic information currently owned by the mobile terminal to the mobile terminal through a network of a mobile communications operator, so that the mobile terminal determines, based on the free remaining traffic information, whether the mobile terminal can log in a network through a proxy server in a traffic-free manner;
the data transmission in the network login process is marked with a flow-free identifier, and all or part of data flow generated in the network login process of the mobile terminal is counted into a specified service provider by a mobile network operator based on the flow-free identifier;
a third receiving module, configured to receive the communication identifier and the authentication information of the mobile terminal sent by the mobile terminal;
the verification module is used for verifying whether the communication identifier of the mobile terminal has the traffic-free permission or not based on the communication identifier and the identity verification information;
the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier of the mobile terminal is determined to have the traffic-free right;
when the distribution server distributes the proxy server to the mobile terminal, selecting the proxy server closest to the physical position of the mobile terminal from a plurality of proxy servers to distribute the proxy server to the mobile terminal; or selecting the proxy server with the lightest network load to be distributed to the mobile terminal; or selecting the proxy server with the lowest network delay to be distributed to the mobile terminal.
13. The distribution server according to claim 12, wherein the distribution module specifically includes:
an obtaining unit, configured to obtain the free remaining traffic information that is charged by the communication identifier of the mobile terminal in a charging manner of the specified service provider;
the judging unit is used for judging whether the free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information;
and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
14. The distribution server according to claim 13, wherein the predetermined amount is specifically:
the method comprises the steps that the mobile terminal needs to log in the resource page currently to meet the flow demand or the minimum fixed quantity needed for logging in the network.
15. The distribution server of claim 13, wherein the distribution server further comprises:
a sixth sending module, configured to send, to the mobile terminal, first prompt information for prompting a user to increase free remaining traffic and/or after the distribution server determines, based on the free remaining traffic information, whether the free remaining traffic of the mobile terminal is greater than a preset amount, if the free remaining traffic of the mobile terminal is not greater than the preset amount,
and sending second prompt information for prompting the user that the current free residual flow is insufficient to log in a network through an operator server of a mobile communication operator to the mobile terminal.
16. A network entry system, comprising: the distribution server of any of claims 12 to 15;
the proxy server specifically comprises:
a fourth receiving module, configured to receive a network login request, which is sent by a mobile terminal through a network of a mobile communication operator and used for logging in the network, where the network login request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
and the fourth acquisition module is used for acquiring corresponding login result data from a resource server according to the network login request from the mobile terminal and transmitting the login result data to the mobile terminal through the network of a mobile communication operator.
17. The system of claim 16, wherein the distribution server further comprises:
the second generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the proxy server;
the fourth receiving module is specifically configured to: receiving the network login request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the fourth obtaining module is specifically configured to: and when the data access request is verified to be legal through the temporary verification information, obtaining the login result data from the resource server.
18. The system according to claim 16, wherein all or part of the data traffic generated during the mobile terminal logging in the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
the data traffic with a specific proportion generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider; alternatively, the first and second electrodes may be,
and the specific amount of data traffic generated in the process of logging in the network by the mobile terminal is counted into the data traffic consumed by the specified service provider.
19. The system of claim 16, wherein the proxy server further comprises:
a seventh sending module, configured to send a preset tag to the mobile terminal before the network login request of the mobile terminal is received, where the preset tag is carried during data transmission in the network login process, and the preset tag is the traffic-free identifier; alternatively, the first and second electrodes may be,
and the IP address of the proxy server with the preset IP address is the flow-free identifier, and the proxy server is used for receiving the network login request.
20. The system according to claim 19, wherein all or part of the data traffic generated during the mobile terminal logging into the network is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal logs in the network comprises the preset label is determined, the data flow in the process that the mobile terminal logs in the network is totally or partially counted into the data flow consumed by a specified service provider; or
And the data transmission in the process that the mobile terminal logs in the network passes through the proxy server with the preset IP address, and the data traffic flowing through the preset IP address is totally or partially counted into the data traffic consumed by the appointed service provider.
21. The system of claim 19, wherein the proxy server further comprises:
and the acquisition module is used for counting the data traffic information consumed by the mobile terminal according to a preset counting period and acquiring the latest free residual traffic information with the traffic-free permission of the mobile terminal.
22. The system of claim 21, wherein the proxy server further comprises:
an eighth sending module, configured to send the data traffic information consumed by the mobile terminal to a distribution server;
the distribution server further includes:
and the determining module is used for determining the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
CN201811626463.3A 2015-06-30 2015-06-30 Method, distribution server and system for network login Active CN109525991B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811626463.3A CN109525991B (en) 2015-06-30 2015-06-30 Method, distribution server and system for network login

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510377735.0A CN104980957B (en) 2015-06-30 2015-06-30 A kind of method, the distribution server and system carrying out network login
CN201811626463.3A CN109525991B (en) 2015-06-30 2015-06-30 Method, distribution server and system for network login

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510377735.0A Division CN104980957B (en) 2015-06-30 2015-06-30 A kind of method, the distribution server and system carrying out network login

Publications (2)

Publication Number Publication Date
CN109525991A CN109525991A (en) 2019-03-26
CN109525991B true CN109525991B (en) 2022-01-25

Family

ID=54276925

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201811626463.3A Active CN109525991B (en) 2015-06-30 2015-06-30 Method, distribution server and system for network login
CN201510377735.0A Active CN104980957B (en) 2015-06-30 2015-06-30 A kind of method, the distribution server and system carrying out network login

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201510377735.0A Active CN104980957B (en) 2015-06-30 2015-06-30 A kind of method, the distribution server and system carrying out network login

Country Status (1)

Country Link
CN (2) CN109525991B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111698100B (en) * 2020-06-15 2023-05-23 北京达佳互联信息技术有限公司 Data processing method, system and related equipment
CN112153629B (en) * 2020-10-16 2023-09-15 中国联合网络通信集团有限公司 Flow management method and device
CN116827915A (en) * 2022-03-28 2023-09-29 华为技术有限公司 Communication method, device and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1503606A1 (en) * 2003-07-31 2005-02-02 Siemens Mobile Communications S.p.A. Common radio resource management method in a multi-rat cellular telephone network
CN101800792A (en) * 2010-01-12 2010-08-11 华为终端有限公司 Mobile phone internet traffic counting and displaying method and device, and mobile phone
CN102098650A (en) * 2011-01-21 2011-06-15 中国联合网络通信集团有限公司 Content charging-based flow adaptive method and system
CN102207976A (en) * 2011-06-24 2011-10-05 厦门雅迅网络股份有限公司 Method for downloading and browsing webpage data
CN103260142A (en) * 2013-06-03 2013-08-21 亚信联创科技(中国)有限公司 Method and system for detecting network resource matching of user corresponding to mobile phone terminal
CN103841204A (en) * 2014-03-14 2014-06-04 北京奇虎科技有限公司 Traffic-free downloading method, device and system based on mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1503606A1 (en) * 2003-07-31 2005-02-02 Siemens Mobile Communications S.p.A. Common radio resource management method in a multi-rat cellular telephone network
CN101800792A (en) * 2010-01-12 2010-08-11 华为终端有限公司 Mobile phone internet traffic counting and displaying method and device, and mobile phone
CN102098650A (en) * 2011-01-21 2011-06-15 中国联合网络通信集团有限公司 Content charging-based flow adaptive method and system
CN102207976A (en) * 2011-06-24 2011-10-05 厦门雅迅网络股份有限公司 Method for downloading and browsing webpage data
CN103260142A (en) * 2013-06-03 2013-08-21 亚信联创科技(中国)有限公司 Method and system for detecting network resource matching of user corresponding to mobile phone terminal
CN103841204A (en) * 2014-03-14 2014-06-04 北京奇虎科技有限公司 Traffic-free downloading method, device and system based on mobile terminal

Also Published As

Publication number Publication date
CN104980957A (en) 2015-10-14
CN109525991A (en) 2019-03-26
CN104980957B (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN109525602B (en) Method, mobile terminal and system for accessing network based on flow-free platform
CN109462831B (en) Method, distribution server and system for accessing network by application program in mobile terminal
CN101527655B (en) Dynamic profiling system for data access control
CN101437048B (en) Method and system for pushing personalized page
CN104348798B (en) A kind of method, apparatus, dispatch server and system for distributing network
KR101638315B1 (en) System and method for providing advertisement based on web using wifi network
CN104967688A (en) Method for accessing to network by using flow-free platform, mobile terminal and system
CN109525991B (en) Method, distribution server and system for network login
CN109104445B (en) Anti-attack method and system for block chain-based service system
CN105847277A (en) Service account share management method and system used for third party application
CN105915648B (en) Resource scheduling method and device based on cache platform
CN109526009B (en) Communication method, mobile terminal and system
CN109428733B (en) Method and device for directional flow charging
CN109587270B (en) Method for mobile terminal to access network in flow-saving mode and mobile terminal
CN104980958B (en) A kind of method and mobile terminal carrying out network login
CN105120444B (en) A kind of image transfer method, proxy server and network access system
CN105142124B (en) A kind of Network Access Method and mobile terminal applied to mobile terminal
CN109525603B (en) Method for accessing network, proxy server and network access system
CN102333248A (en) Realizing method and system for dynamic distribution management platform service address
CN104902453A (en) Mobile terminal and method for controlling network access permission of mobile terminal
CN104954488A (en) Method and distribution server for network access control as well as network access system
CN101800964A (en) Charging method, device and system as well as content/service server
CN104955174A (en) Intelligent router and login method thereof
CN109963260A (en) A kind of method and device that determining business terminates
CN103686719A (en) Method and system for determining bearer control policy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220725

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230711

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right