CN104980909A - Method for network resource access, resource compression server, and network access system - Google Patents

Method for network resource access, resource compression server, and network access system Download PDF

Info

Publication number
CN104980909A
CN104980909A CN201510377009.9A CN201510377009A CN104980909A CN 104980909 A CN104980909 A CN 104980909A CN 201510377009 A CN201510377009 A CN 201510377009A CN 104980909 A CN104980909 A CN 104980909A
Authority
CN
China
Prior art keywords
mobile terminal
data
server
network
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510377009.9A
Other languages
Chinese (zh)
Other versions
CN104980909B (en
Inventor
袁晓波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510377009.9A priority Critical patent/CN104980909B/en
Publication of CN104980909A publication Critical patent/CN104980909A/en
Application granted granted Critical
Publication of CN104980909B publication Critical patent/CN104980909B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention, which relates to the communication field, discloses a method for network resource access, a resource compression server, and a network access system. Therefore, a technical problem that lots of data traffic of the mobile terminal needs to be consumed when the user accesses the network by using the mobile terminal in the prior art can be solved. The method comprises: a resource compression server receives a data access request initiated by a mobile terminal; when the mobile terminal has the flow-free authority, the resource compression server controls the mobile terminal to access a resource server in a flow-free mode and all or parts of data flows for network access by the mobile terminal are not included in a designated service provider by a mobile network operator in the flow-free state; and when the mobile terminal does not have the flow-free authority, the resource compression server controls the mobile terminal to access the network in a flow-saving mode, wherein the data of network access by the mobile terminal are compressed data in the flow-saving state. Therefore, a technical effect of reduction of a data flow consumed by network access by the mobile terminal can be realized.

Description

Method for accessing network resource, resource compression server and network access system
Technical Field
The present invention relates to the field of communications, and in particular, to a method for controlling a mobile terminal to access a network resource, a resource compression server, and a network access system.
Background
With the continuous development of science and technology, electronic technology has also gained rapid development, and the variety of electronic products is also more and more, and people also enjoy various conveniences brought by the development of science and technology. People can enjoy comfortable life brought along with the development of science and technology through various types of mobile terminals. For example, mobile terminals such as smart phones and tablet computers have become an important part of people's lives, and users can listen to music, play games and the like by using the mobile terminals such as smart phones and tablet computers, so as to relieve pressure brought by modern fast-paced lives.
In general, a mobile terminal has a network access function, and the mobile terminal needs to consume data traffic of a user of the mobile terminal when accessing a network, and pays a fee to an operator providing a network service according to the consumed data traffic. In the prior art, the data traffic used by the user can only be charged by an operator, so that the technical problem that the user of the mobile terminal needs to consume a large amount of data traffic of the mobile terminal when accessing the network in the prior art is caused;
since the network traffic of the mobile terminal is expensive, the user of the mobile terminal is forced to pay a large amount of cost for the mobile terminal, so that the enthusiasm of the user for accessing the network is obviously reduced, and the popularization and the development of the mobile internet technology are not facilitated.
Disclosure of Invention
In view of the above, the present invention has been made to provide a method, a proxy server and a network access system for controlling access of a mobile terminal to a network resource, which overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a method for a mobile terminal to access a network resource, comprising:
when the network connection mode of the mobile terminal is a data connection mode, judging whether the mobile terminal has a traffic-free permission;
when the mobile terminal has the traffic-free right, controlling the mobile terminal to access a network in a traffic-free mode, wherein all or part of data traffic of the mobile terminal accessing the network in the traffic-free mode is included in a specified service provider by a mobile communication operator;
and when the mobile terminal does not have the traffic-free right, controlling the mobile terminal to access the network in a flow-saving mode, wherein the data of the network accessed by the mobile terminal in the flow-saving mode are compressed data.
Optionally, the method further includes:
judging whether the network connection mode of the mobile terminal is the data connection mode;
and when the network connection mode is not the data connection mode, controlling the mobile terminal to access the network in a direct connection mode.
Optionally, the controlling the mobile terminal to access the network in a stream-free manner specifically includes:
sending a data access request for accessing a network to a first proxy server through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right;
receiving requested data acquired by the first proxy server from a resource server based on the data access request;
the data transmission in the process of accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of accessing the network by the mobile terminal through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the first proxy server to a specific service provider based on the traffic-free identifier, including:
a data access request sent to the first proxy server contains a traffic-free identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-free identifier; and/or the presence of a gas in the gas,
data traffic for the requested data is credited to the designated facilitator based on the traffic-exempt identification.
Optionally, before the sending, to the first proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
acquiring the first proxy server distributed by a distribution server for the network access process, wherein the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
And acquiring a preset label distributed by the first proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier.
Optionally, the requested data is obtained from the resource server by the resource compression server, compressed and sent to the first proxy server.
Optionally, the mobile terminal and the first proxy server transmit data through a first transmission protocol; and/or the first proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, before the sending, to the first proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
and sending the communication identifier and the identity authentication information of the mobile terminal to a distribution server, so that the distribution server distributes the first proxy server to the network access process after verifying that the communication identifier has the traffic-free authority.
Optionally, before the sending, to the first proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
receiving temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the data access request for accessing the network to the first proxy server through the network of the mobile communication operator specifically includes:
and the first proxy server is provided with a data access request carrying the temporary verification information, so that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, the controlling the mobile terminal to access the network in a flow-saving manner specifically includes:
sending a data access request for accessing the network to a second proxy server;
and obtaining the requested data obtained by the second proxy server based on the data access request, wherein the requested data is obtained from the resource server by the resource compression server, compressed and then sent to the second proxy server.
Optionally, data transmission is performed between the resource compression server and the second proxy server through a Spdy protocol; and/or the mobile terminal and the second proxy server carry out data transmission through the Spdy protocol.
According to another aspect of the present invention, there is provided a mobile terminal including:
the first judging module is used for judging whether the mobile terminal has the traffic-free permission or not when the network connection mode of the mobile terminal is a data connection mode;
a first control module, configured to control the mobile terminal to access a network in a flow-free manner when the mobile terminal has the flow-free right, where all or part of data traffic of the mobile terminal accessing the network in the flow-free manner is accounted by a mobile communications operator in an assigned service provider;
and the second control module is used for controlling the mobile terminal to access the network in a flow-saving mode when the mobile terminal does not have the traffic-free right, wherein the data of the network accessed by the mobile terminal in the flow-saving mode are compressed data.
Optionally, the mobile terminal further includes:
the second judging module is used for judging whether the network connection mode of the mobile terminal is the data connection mode;
and the third control module is used for controlling the mobile terminal to access the network in a direct connection mode when the network connection mode is not the data connection mode.
Optionally, the first control module specifically includes:
a first sending unit, configured to send a data access request for accessing a network to a first proxy server through a network of the mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access to internet;
a first receiving unit, configured to receive requested data acquired by the first proxy server from a resource server based on the data access request;
the data transmission in the process of accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of accessing the network by the mobile terminal through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the first proxy server to a specific service provider based on the traffic-free identifier, including:
a data access request sent to the first proxy server contains a traffic-free identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-free identifier; and/or the presence of a gas in the gas,
data traffic for the requested data is credited to the designated facilitator based on the traffic-exempt identification.
Optionally, the mobile terminal further includes:
a first obtaining module, configured to obtain a first proxy server allocated by a distribution server for a network access process before sending a data access request for accessing a network to the first proxy server through a network of the mobile communications operator, where an IP address of the first proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And acquiring a preset label distributed by the first proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier.
Optionally, the requested data is obtained from the resource server by the resource compression server, compressed and sent to the first proxy server.
Optionally, the mobile terminal and the first proxy server transmit data through a first transmission protocol; and/or the first proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the mobile terminal further includes:
the first sending module is used for sending the communication identifier and the identity verification information of the mobile terminal to a distribution server before sending a data access request for accessing the network to the first proxy server through the network of the mobile communication operator, so that the distribution server distributes the first proxy server to the network access process after verifying that the communication identifier has the traffic-exempt authority.
Optionally, the mobile terminal further includes:
a first receiving module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a data access request for accessing a network to a first proxy server through a network of the mobile communications operator, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic exemption right;
the first sending unit is specifically configured to:
and the first proxy server is provided with a data access request carrying the temporary verification information, so that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, the second control module specifically includes:
a second sending unit, configured to send a data access request for accessing the network to the second proxy server;
and the obtaining unit is used for obtaining the requested data obtained by the second proxy server based on the data access request, and the requested data is obtained from the resource server by the resource compression server and is sent to the second proxy server after being compressed.
Optionally, data transmission is performed between the resource compression server and the second proxy server through a Spdy protocol; and/or the mobile terminal and the second proxy server carry out data transmission through the Spdy protocol.
According to another aspect of the present invention, there is provided a method for controlling access of a mobile terminal to network resources, comprising:
a resource compression server receives a data access request initiated by a mobile terminal;
when the mobile terminal has the traffic-free right, the resource compression server controls the mobile terminal to access a resource server in a flow-free mode, and all or part of data traffic of the mobile terminal accessing a network in the flow-free mode is accounted into a specified service provider by a mobile communication operator;
and when the mobile terminal does not have the traffic-free right, the resource compression server controls the mobile terminal to access the network in a flow-saving mode, wherein the data of the network accessed by the mobile terminal in the flow-saving mode are compressed data.
Optionally, the resource compression server controls the mobile terminal to access the resource server in a stream-free manner, which specifically includes:
the resource compression server acquires corresponding requested data from the resource server according to the data access request from the mobile terminal;
the resource compression server transmits the requested data to the mobile terminal through a first proxy server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the resource compression server transmits the requested data to the mobile terminal via the first proxy server, specifically:
the resource compression server compresses the requested data;
and the resource compression server sends the compressed requested data to the mobile terminal through the first proxy server.
Optionally, the data transmission in the process of the mobile terminal accessing the network is marked with a traffic-free identifier, and all or part of the data traffic in the process of the mobile terminal accessing the network is included in the designated service provider by the mobile communication operator based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises the flow-free identification, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identification; and/or the presence of a gas in the gas,
data traffic of the requested data is included in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
Optionally, before the receiving the data access request of the mobile terminal, the method further includes: the first proxy server sends a preset label to the mobile terminal, the preset label is carried when the mobile terminal carries out data transmission in the network access process, and the preset label is the flow-free identifier; or,
the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
Optionally, the method further includes:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal;
the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
and when determining that the communication identifier has the traffic-exempting right, the distribution server allocates the first proxy server to the mobile terminal.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the method further includes:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the first proxy server;
the first proxy server receives the data access request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information, and verifies the validity of the data access request based on the temporary verification information;
the resource compression server receives a data access request of the mobile terminal, and specifically comprises the following steps: and the resource compression server receives the data access request sent by the mobile terminal through the first proxy server, wherein the data access request sent to the resource compression server is sent by the first proxy server when the data access request is determined to be legal.
Optionally, after the first proxy server prompts that the mobile terminal has logged off, the distribution server logs off the temporary authentication information.
Optionally, the controlling, by the resource compression server, the mobile terminal to access the network in a flow-saving manner includes:
the resource compression server acquires the requested data from a resource server based on the data access request and compresses the requested data;
and the resource compression server sends the compressed requested data to the mobile terminal through a second proxy server.
Optionally, data transmission is performed between the mobile terminal and the second proxy server through a Spdy protocol; and/or data transmission is carried out between the second proxy server and the resource compression server through the Spdy protocol.
Optionally, the resource compression server performs compression processing on the requested data, specifically:
the resource compression server compresses the requested data in a lossy compression mode; and/or
And the resource compression server compresses the requested data in a lossless compression mode.
Optionally, the resource compression server compresses the requested data in a lossless compression manner, specifically:
when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
and when the requested data contains code data, the resource compression server removes redundant codes in the code data.
According to another aspect of the present invention, there is provided a resource compression server, including:
the second receiving module is used for receiving a data access request initiated by the mobile terminal;
the fourth control module is used for controlling the mobile terminal to access the resource server in a flow-free mode when the mobile terminal has a flow-free right, and all or part of data flow of the mobile terminal accessing the network in the flow-free mode is accounted into a specified service provider by a mobile communication operator;
and the fifth control module is used for controlling the mobile terminal to access the network in a flow-saving mode when the mobile terminal does not have the traffic-exempting right, wherein the data of the mobile terminal accessing the network in the flow-saving mode are compressed data.
Optionally, the fourth control module specifically includes:
the acquisition unit is used for acquiring corresponding requested data from the resource server according to the data access request from the mobile terminal;
a third sending unit, configured to transmit the requested data to the mobile terminal via the first proxy server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the third sending unit specifically includes:
a compression subunit, configured to perform compression processing on the requested data;
a sending subunit, configured to send the compressed requested data to the mobile terminal via the first proxy server.
Optionally, the data transmission in the process of the mobile terminal accessing the network is marked with a traffic-free identifier, and all or part of the data traffic in the process of the mobile terminal accessing the network is included in the designated service provider by the mobile communication operator based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises the flow-free identification, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identification; and/or the presence of a gas in the gas,
data traffic of the requested data is included in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
According to another aspect of the present invention, there is provided a network access system including:
a resource compression server according to any of the embodiments of the present invention;
a first proxy server comprising: the first sending module is used for sending a preset tag to the mobile terminal, wherein the preset tag is carried when the mobile terminal carries out data transmission in the network access process, and the preset tag is the traffic-free identifier; or,
the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
Optionally, the system further includes a distribution server, and the distribution server includes:
the second receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal;
the third judging module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and the allocation module is used for allocating the first proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the distribution server further includes:
the generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the first proxy server;
the first proxy server further comprises: a third receiving module, configured to receive the data access request carrying the communication identifier and the temporary verification information and sent by the mobile terminal, and verify validity of the data access request based on the temporary verification information;
the second receiving module is specifically configured to receive, by the resource compression server, the data access request sent by the first proxy server when it is determined that the data access request is legal.
Optionally, the distribution server further includes: and the logout module is used for logging out the temporary verification information after the first proxy server prompts that the mobile terminal logs out.
Optionally, the fifth control module specifically includes:
the compression unit is used for acquiring the requested data from a resource server based on the data access request and compressing the requested data;
a fourth sending unit, configured to send the compressed requested data to the mobile terminal via a second proxy server.
Optionally, data transmission is performed between the mobile terminal and the second proxy server through a Spdy protocol; and/or data transmission is carried out between the second proxy server and the resource compression server through the Spdy protocol.
Optionally, the compressing subunit or the compressing unit is specifically configured to:
compressing the requested data in a lossy compression mode; and/or
And compressing the requested data in a lossless compression mode.
Optionally, the compressing subunit or the compressing unit is configured to:
when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
when the requested data contains code data, redundant codes in the code data are removed.
Optionally, the method further includes: a mobile terminal as described in any of the embodiments of the present invention.
According to the method for controlling the mobile terminal to access the network resources, provided by the invention, the resource compression server receives a data access request initiated by the mobile terminal; when the mobile terminal has the traffic-free right, the resource compression server controls the mobile terminal to access the resource server in a traffic-free mode, and all or part of data traffic of the mobile terminal accessing the network in the traffic-free mode is accounted into a specified service provider by a mobile communication operator; when the mobile terminal does not have the traffic-free right, the resource compression server controls the mobile terminal to access the network in a flow-saving mode, and data of the mobile terminal accessing the network in the flow-saving mode are compressed data. That is, under the condition that the mobile terminal has the traffic-free permission, in the process that the mobile terminal accesses the network, part or all of the consumed data traffic of the specified service provider is the data traffic of the specified service provider, and only a small amount of the data traffic of the mobile terminal needs to be consumed; and under the condition that the mobile terminal does not have the traffic-free authority, the flow saving can be realized by compressing the data of the mobile terminal accessing the network, so that the technical effect of reducing the data traffic of the mobile terminal consumed in the process of accessing the network by the mobile terminal is achieved.
In addition, the scheme has different permissions for the user and adopts different network access modes, so that the network access control of the mobile terminal is more accurate.
In addition, in the embodiment of the invention, after the distribution server determines that the mobile terminal has the traffic-free authority through the communication identifier and the identity authentication information of the mobile terminal, the first proxy server for the mobile terminal to access the network in a stream-free manner is allocated to the mobile terminal, so that a user who is not the mobile terminal can be prevented from falsely using the free traffic of the mobile terminal;
in addition, in the embodiment of the invention, the distribution server distributes the first proxy server to the mobile terminal when determining that the free residual flow of the communication identification is greater than the preset amount, so that the free data flow provided to the mobile terminal by the specified service provider can be accurately controlled;
in addition, in the embodiment of the invention, when the proxy server prompts that the mobile terminal logs out, the distribution server logs out the temporary authentication information, so that the temporary authentication information can be ensured to be used only in a process of accessing a network once, and a user who is not the mobile terminal can be further prevented from falsely using the free flow of the mobile terminal.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates an interaction diagram of a method of accessing a network resource according to one embodiment of the invention;
fig. 2 is a flowchart illustrating a method for controlling a mobile terminal to access a network in a flow-free manner according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a method for controlling a mobile terminal to access a network in a flow-saving manner according to an embodiment of the present invention;
FIG. 4 illustrates a block diagram of a mobile terminal according to one embodiment of the present invention;
FIG. 5 illustrates a block diagram of a resource compression server according to one embodiment of the invention;
fig. 6 shows a block diagram of a network access system according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method for controlling a mobile terminal to access network resources, a resource compression server and a network access system, which are used for solving the technical problem that a large amount of data traffic of the mobile terminal needs to be consumed when the mobile terminal accesses a network in the prior art.
The embodiment of the invention provides a method for accessing network resources, and equipment related to the method comprises the following steps: the system comprises a mobile terminal, a distribution server, a first proxy server, a second proxy server, a resource compression server and a resource server, wherein the mobile terminal is, for example: mobile phones, tablet computers, and the like, and a user of the mobile terminal is a terminal user; the distribution server is mainly used for providing identity authentication for the mobile terminal and selecting a first proxy server capable of providing a traffic-free right for the mobile terminal to access a network; the first proxy server is mainly used for providing network access service for the mobile terminal with the internet surfing flow-free authority; the second proxy server is mainly used for providing a network access server for the mobile terminal without the internet surfing flow-free authority; the resource compression server is mainly used for compressing uplink data sent by the mobile terminal and downlink data sent to the mobile terminal; resource servers are typically provided by network content providers for providing rich and diverse network contents to end users using network resources of the internet, such as: videos, web pages, pictures, and the like.
Referring to fig. 1, the method for accessing network resources includes the following steps:
step S101: when the network connection mode of the mobile terminal is a data connection mode, the mobile terminal judges whether the mobile terminal has a traffic-free permission;
step S102 a: when the mobile terminal has the traffic-free right, controlling the mobile terminal to access the network in a traffic-free mode, wherein all or part of data traffic of the mobile terminal accessing the network in the traffic-free mode is accounted into a specified service provider by a mobile communication operator;
step S102 b: and when the mobile terminal does not have the traffic-free right, controlling the mobile terminal to access the network in a flow-saving mode, wherein the data of the mobile terminal accessing the network in the flow-saving mode are compressed data.
As an alternative implementation, please continue to refer to fig. 1, the method further includes:
step S100: judging whether the network connection mode of the mobile terminal is a data connection mode;
step S102 c: and when the network connection mode is not the data connection mode, controlling the mobile terminal to access the network through a direct connection mode.
In step S100, for example, the mobile terminal may detect a network connection mode of the mobile terminal, where the network connection mode is, for example: data connection, wifi connection and the like, and then whether the network connection mode of the mobile terminal is the data connection mode can be judged.
In step S102c, since the network connection mode of the mobile terminal is not the data connection mode, for example: the wifi connection mode indicates that the mobile terminal does not need to use data traffic when accessing the network, and under the condition, the traffic-free permission of the mobile terminal does not need to be used naturally, so that the mobile terminal can be controlled to access the network in a direct connection mode.
In step S101, in an alternative embodiment, the specified service provider may provide traffic exemption rights for a specific type of communication identifier, for example: providing traffic exemption rights for a mobile terminal with a preset field (e.g., 189 XXXXXX) for the first few bits of the communication identification; another example is: the mobile terminal can directly judge whether the communication identifier meets the flow-free condition set by the specified service provider to determine whether the communication identifier has the flow-free permission.
In order to prevent the communication identifier of the mobile terminal from being misused and improve the security of network access, as another optional embodiment, the mobile terminal may bind the communication identifier of the mobile terminal in the distribution server in advance through a registration or the like, for example: the mobile terminal can firstly apply for a traffic-free service from a distribution server, after receiving the application from the mobile terminal, the distribution server determines whether to distribute a traffic-free authority to the communication identifier of the mobile terminal according to some preset conditions (for example, whether the software initiating the application is predetermined software, whether the mobile terminal uses the predetermined software, whether the communication identifier is registered in a specified service provider, and the like), and if the distribution server determines to distribute the traffic-free authority to the mobile terminal, the distribution server sends a UserKey (user password) to the mobile terminal as identity authentication information; further, in order to ensure that the communication identifier of the mobile terminal is not falsely used by other users, the distribution server may first send a verification code to the communication identifier, and the user of the mobile terminal may distribute the authentication information to the mobile terminal only after successfully filling the verification code. In this case, the mobile terminal can determine whether it has traffic exemption right by directly checking whether its communication identifier is registered in the distribution server.
In addition, when providing the flow-free service for the network access process of the mobile terminal, the distribution server may have no traffic limitation, or may have traffic limitation, where the absence of traffic limitation means that no matter how much traffic is used by the mobile terminal in the network access process, the flow-free right is provided to the mobile terminal as long as the flow-free requirement is met, for example: the distribution server may set the VIP identity for certain mobile terminals (e.g., mobile terminals manufactured by a particular manufacturer, mobile terminals using a particular type of operating system, etc.), thereby providing these mobile terminals with an unlimited amount of exemption; and there may be a traffic restriction for the non-VIP user, where the presence of the traffic restriction refers to allocating a specific traffic for each predetermined period of time for the mobile terminal, and if the total traffic that the mobile terminal cumulatively uses in accessing the network does not exceed the specific traffic, it is allocated with a traffic exemption right if it meets the traffic exemption requirement, and if the total traffic that the mobile terminal uses in accessing the network exceeds the specific traffic, it is not allocated with the traffic exemption right, for example; 30M free traffic, 50M free traffic, etc. may be allocated for a mobile terminal for one month.
In an alternative embodiment, if there is a traffic limit for the free traffic allocated to the mobile terminal by the distribution server, the user of the mobile terminal may also obtain the data traffic rewarded by the distribution server through some activities, such as: by the mobile terminal clicking a predetermined advertisement, clicking a predetermined web page, downloading a predetermined APP, etc., in this case, the distribution server may increase the data traffic allocated to the mobile terminal, e.g., 30M, 40M, etc. In step S102a, the method for controlling the mobile terminal to access the network in a flow-free manner, please refer to fig. 2, which includes:
step S210: the mobile terminal sends a data access request for accessing the network to the first proxy server through the network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the traffic-free permission of surfing the internet;
step S220: the mobile terminal receives the requested data which is acquired from the resource server by the first proxy server based on the data access request; the data transmission in the network access process is marked with a flow-free identifier, and all or part of data flow in the network access process is counted into a specified service provider by a mobile communication operator based on the flow-free identifier.
In step S220, in an optional implementation manner, the first proxy server directly sends the data access request to the resource server, and further directly obtains the requested data from the resource server, and then the first proxy server directly sends the requested data to the mobile terminal.
In another alternative implementation, with continued reference to fig. 2, the method further includes:
step S211: the first proxy server sends the data access request to a resource compression server;
step S212: the resource compression server data access request acquires the requested data from the resource server;
step S123: the resource compression server sends the requested data to the first proxy server.
As an optional implementation manner, before the first proxy server receives a data access request of the mobile terminal to access the network through the network of the mobile communication operator, the mobile terminal needs to determine the first proxy server providing the network access service for the mobile terminal, wherein the mobile terminal may directly send its communication identifier to the distribution server, the distribution server determines whether the communication identifier has the traffic exemption right, and when the distribution server determines that the communication identifier has the traffic exemption right, the first proxy server is allocated to the mobile terminal, otherwise, the first proxy server is not allocated to the mobile terminal.
As another alternative embodiment, to prevent the communication identifier of the mobile terminal from being misused and improve the security of network access, the process of determining the first proxy server continues to refer to fig. 2, which includes the following steps:
step S201: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal;
step S202: the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
step S203: and when determining that the communication identifier has the traffic-free right, the distribution server allocates a first proxy server for the mobile terminal.
In step S201, if the mobile terminal needs to access the network, for example: when the operation that the user of the mobile terminal starts the browser is detected, the mobile terminal sends the communication identification and the authentication information of the mobile terminal to the distribution server.
In step S202, the distribution server determines whether the received authentication information of the communication identifier matches with the pre-stored authentication information of the communication identifier, and if so, it indicates that the corresponding mobile terminal has the traffic exemption permission, otherwise, it indicates that the corresponding mobile terminal does not have the traffic exemption permission.
In step S203, if the distribution server does not have the flow limitation for the flow exemption authority allocated to the mobile terminal, the distribution server may directly allocate a first proxy server to the mobile terminal after determining that the mobile terminal has the flow exemption authority; if the distribution server has flow limitation for the traffic-free permission allocated to the mobile terminal, the distribution server needs to judge whether the remaining traffic exceeds a threshold value after determining that the mobile terminal has the traffic-free permission, and allocates a first proxy server to the mobile terminal when the remaining traffic exceeds the threshold value, wherein the processing process specifically comprises the following steps: the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; judging whether the free remaining traffic of the communication identifier is greater than a preset amount (such as a threshold value) based on the free remaining traffic information; and when the free residual flow is larger than the preset amount, distributing a first proxy server for the mobile terminal.
In general, one of the functions of the distribution server is to count the free remaining traffic information of the communication identifier, where the preset amount is, for example: 0M, 1M, 512K and the like, wherein if the free residual flow is larger than the preset amount, the flow-free residual flow can meet the network access in the normal condition, so that a first proxy server can be allocated to the flow-free residual flow; and if the free residual flow is not greater than the preset amount, the situation is shown that the free residual flow cannot meet the current network access under the normal condition, so that the first proxy server is not allocated to the free residual flow.
When the distribution server allocates the first proxy server to the mobile terminal, the distribution server may select a proxy server closest to the physical location of the mobile terminal from a plurality of proxy servers meeting the condition to allocate to the mobile terminal, may select a proxy server with the lightest network load to allocate to the mobile terminal, or select a proxy server with the lowest network delay to allocate to the mobile terminal, or the like, or may select the distribution server by taking comprehensive consideration of at least two policies among the plurality of distribution policies, and what manner the distribution server adopts to allocate the proxy server to the mobile terminal, which is not illustrated in detail in the embodiments of the present invention and is not limited.
As an optional embodiment, under the condition that the traffic exemption authority allocated for the mobile terminal has no traffic limitation, if the mobile terminal has the traffic exemption authority, the distribution server may generate temporary verification information (token) for the mobile terminal to access the network at this time; or, in a case where there is traffic limitation for the traffic exemption authority allocated to the mobile terminal, if the mobile terminal has the traffic exemption authority and the free remaining traffic of the mobile terminal is greater than a preset amount, the distribution server may also generate the temporary verification information.
In addition, in order to ensure that the subsequent mobile terminal can connect to the first proxy server, the distribution server needs to send some data to the first proxy server, and four data are listed below for description, and of course, in the implementation process, the following four cases are not limited. Firstly, a distribution server sends a communication identifier of a mobile terminal to a first proxy server; the distributing server sends the communication identification and the temporary verification information of the mobile terminal to the first proxy server; thirdly, the distribution server sends the communication identification and the free residual flow of the mobile terminal to the first proxy server; and fourthly, the distribution server sends the communication identification, the free residual flow and the temporary verification information of the mobile terminal to the first proxy server.
In addition, the address information of the first proxy server also needs to be provided for the mobile terminal, wherein the address information of the first proxy server can be directly transmitted to the mobile terminal by the distribution server; the first proxy server may also send the communication identifier of the mobile terminal to the mobile terminal through the communication identifier of the mobile terminal after receiving the communication identifier of the mobile terminal. As shown in step S204 of fig. 2, a procedure of the mobile terminal to which the address information of the first proxy server is transmitted by the distribution server.
Based on the steps, a traffic exempting channel among the mobile terminal, the first proxy server, the resource compression server and the resource server can be established, and after the traffic exempting channel is established, when the mobile terminal accesses the network through the network of the mobile communication operator, the mobile communication operator can count all or part of traffic consumed by the mobile terminal into a specified service provider.
In step S210, if the distribution server does not allocate the temporary verification information for the current network access process in steps S201 to S203, the mobile terminal directly sends the data access request to the first proxy server; if the distribution server distributes the temporary verification information for the network accessing process in the steps S201 to S203, the mobile terminal sends the data access request carrying the temporary verification information to the first proxy server. In step S220, the proxy server may directly send the data access request sent by the mobile terminal to the resource compression server (or the resource server) after receiving the data access request, and based on different information sent to the first proxy server before the distribution server, the first proxy server may also perform some verification processes first, which will be described by listing three verification processes in the following, and of course, in the specific implementation process, the present invention is not limited to the following three cases.
The data sent by the distribution server to the first proxy server includes the communication identifier of the mobile terminal and the temporary authentication information, in this case, the data access request sent by the mobile terminal also includes the temporary authentication information, and the first proxy server sends the data access request to the resource compression server (or the resource server) when the data access request is authenticated to be legal through the temporary authentication information. The first proxy server matches the temporary verification information sent by the mobile terminal with the temporary verification information sent by the distribution server, if the matching is successful, the data access request is legal, otherwise, the data access request is illegal. By the scheme, the security of the network access process can be ensured.
The data sent by the distribution server to the first proxy server comprises a communication identifier of the mobile terminal and free residual flow information, and after receiving the data access request, the first proxy server firstly judges whether the latest free residual flow of the mobile terminal is greater than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server (or the resource server), and if the latest free residual flow information is not larger than the preset amount, informing the mobile terminal to allow the mobile terminal to access the resource server through another access path (for example, directly sending the data access request to the resource server, directly sending the data access request to the resource compression server, and the like). Through the scheme, the specified service provider can provide a specific amount of free data flow to the mobile terminal.
If the distribution server judges that the free residual flow of the mobile terminal is larger than the preset amount, the first proxy server does not need to judge whether the latest free residual flow (namely the free residual flow sent by the distribution server) is larger than the preset amount when receiving the data access request for the first time; the data traffic consumed by the network access request is directly counted, and then the data traffic is subtracted from the free residual traffic sent by the distribution server, so that the latest free data traffic can be obtained; whether to send the data access request to the resource compression server can be determined subsequently by judging whether the latest free data flow is larger than a preset amount.
In addition, the first proxy server may also count data traffic information consumed by the mobile terminal according to a preset counting period, and obtain the latest free remaining traffic information with traffic-free permission for the mobile terminal.
For example, the preset statistical period may be, for example, a preset statistical time interval, the preset statistical time interval may be, for example, 30s, 50s, 1min, and the like, and the first proxy server may set a timer, acquire, every time the preset time interval arrives, the data traffic consumed by the mobile terminal counted in the current time interval, and obtain the latest free remaining traffic information of the mobile terminal based on the data traffic statistics.
The preset statistical period is, for example: the first proxy server can monitor the data traffic consumed by the mobile terminal, and when the preset statistical traffic is consumed, the latest free residual traffic information of the mobile terminal is determined according to the preset statistical traffic.
Through the scheme, the latest residual flow information of the mobile terminal can be ensured to be obtained in time.
Of course, after the first proxy server counts the data traffic information consumed by the mobile terminal in the counting period, the first proxy server may transmit the data traffic information to the distribution server, and the distribution server may count the latest free remaining traffic information of the mobile terminal.
After obtaining the data traffic information consumed by the mobile terminal, the distribution server can also send the data traffic information to the mobile terminal or inform the data traffic information when the mobile terminal inquires; or after determining the latest free remaining traffic information of the mobile terminal, the distribution server can also send the latest free remaining traffic information to the mobile terminal, so that the mobile terminal can further know the current traffic use condition, and then a better network access strategy is selected. Or upon inquiry by the mobile terminal.
And thirdly, the data sent by the distribution server to the first proxy server comprises the communication identification of the mobile terminal, the free residual flow information and the temporary verification information, and under the condition, the first proxy server sends the data access request to the resource compression server when the first proxy server verifies that the data access request is legal through the temporary verification information and the latest free residual flow information is larger than the preset amount. By the scheme, the security of the network access process can be ensured, and the appointed service provider can be ensured to provide the preset amount of free flow to the mobile terminal.
In step 211, after receiving the data access request sent by the first proxy server, the resource compression server sends the data access request to the resource server, and further obtains the requested data from the resource server;
in step S213, the resource compressing server may directly transmit the requested data to the first proxy server after acquiring the requested data from the resource server, and then the first proxy server transmits the requested data to the mobile terminal. The resource compression server may also compress the requested data first, and then send the compressed requested data to the first proxy server, and then send the requested data compressed by the first proxy server to the mobile terminal.
In the implementation process, the requested data may be compressed in a plurality of ways, and two ways are listed below, but of course, in the implementation process, the compression process is not limited to the following two ways.
First, the resource compression server compresses the requested data by lossy compression.
For example, the lossy compression is also called destructive compression, that is, compression in which secondary information data is compressed, some quality is sacrificed to reduce the data amount, and the compression ratio is increased, wherein multiple lossy compression methods can be adopted for the requested data, and two of them are listed below for description, and of course, in the specific implementation process, the method is not limited to the following two cases.
When the requested data includes image data, the resource compression server reduces the display size of the image data from a first display size to a second display size suitable for the display unit of the mobile terminal.
For example, in order to be able to adapt to display units of various sizes, the image data located in the resource server is usually large in first display size, but the screen of the mobile terminal is usually small in size, so that the display size of the image data can be reduced to the second display size, and thus the data traffic consumed in the image data transmission process can be reduced, and the transmission rate of the image data can be improved.
And when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the redundant codes to the mobile terminal.
For example, the redundancy code is, for example: note statements in the code, in the code writing stage, a programmer usually adds some note statements in the code for convenience of reading the code, and these note statements have no influence on code analysis, so the resource compression server can delete the note statements in the code data included in the requested data.
Second, the resource compression server compresses the requested data in a lossless compression manner.
For example, lossless compression is to optimize the data storage mode of a file, and use an algorithm to represent repeated data information, so that the file can be completely restored without affecting the content of the file, and for digital images, no loss of image details is caused.
In addition, in the specific implementation process, the mobile terminal can also send uplink data (such as a data access request) to the resource compression server after lossless compression, and send the uplink data to the resource server after decompression by the resource compression server; if the received requested data is compressed requested data and the resource compression server performs lossless compression on the requested data, the mobile terminal may also perform decompression processing on the compressed requested data.
In step S220, the data in the process of accessing the network by the mobile terminal includes uplink data and downlink data, where the uplink data is data (e.g., a data access request) sent by the mobile terminal to the resource server, and the downlink data is data (e.g., requested data) sent by the resource server to the mobile terminal, where the data traffic of at least one of the uplink data and the downlink data is counted in the data traffic consumed by the designated service provider.
If the appointed service provider provides the uplink data flow-free for the mobile terminal, the data access request sent by the mobile terminal to the proxy server also carries a flow-free identifier, and the data flow corresponding to the data access request is counted in the appointed service provider based on the flow-free identifier; if the specified service provider provides the mobile terminal with the downlink data exempt stream, the requested data (or the compressed requested data) will carry the exempt stream identifier (for example, the first proxy server adds the exempt stream identifier), and the data stream of the compressed requested data can be included in the specified service provider by the mobile communication operator based on the exempt stream identifier.
The flow-free identifier may be a plurality of different forms of flow-free identifiers, and two of them are listed below for description, and certainly, in the specific implementation process, the flow-free identifier is not limited to the following two cases.
The first proxy server sends a preset label to the mobile terminal after receiving the communication identifier of the mobile terminal sent by the distribution server and before receiving the data access request sent by the mobile terminal, and the preset label is carried during data transmission in the process of accessing the network by the mobile terminal and is a flow-free identifier.
And secondly, the IP address of the first proxy server distributed by the distribution server for the mobile terminal is a preset IP address, and the preset IP address is the flow-free identifier.
In the specific implementation process, data traffic in the process of accessing the network can be counted through a gateway arranged between the mobile terminal and the first proxy server.
For the condition that the flow-free identifier is a preset IP, after receiving a data access request sent by a mobile terminal, a corresponding gateway (or a charging system connected with a corresponding network) judges whether the IP of a next node corresponding to the data access request is the preset IP, if so, the data flow of the next node is counted into the data flow of a specified service provider, after receiving the requested data sent by a first proxy server, the corresponding gateway (or the charging system connected with the corresponding network) judges whether the IP of the first proxy server is the preset IP, and if so, the data flow of the first proxy server is counted into the data flow of the specified service provider; in the case that the traffic-free identifier is a preset tag, after receiving a data access request (or receiving requested data sent by a first proxy server) sent by a mobile terminal, a corresponding gateway (or a charging system connected to a corresponding network) determines whether the data access request (or the requested data) contains the preset tag, and if the data access request (or the requested data) contains the preset tag, the corresponding gateway adds the data traffic into the data traffic of a specified service provider.
In the specific implementation process, the fact that all data traffic in the process of the mobile terminal accessing the network is included in the specified service provider means that in the process of accessing the network, the mobile network operator determines the data traffic in the process of accessing the mobile terminal and then all the data traffic is included in the specified service provider.
However, a mobile network operator may count part of data traffic generated during the mobile terminal accessing the network through the first proxy server into a specific service provider based on the traffic-free identifier, and there may be a plurality of cases, three of which are listed below for description, and certainly, in the specific implementation process, the cases are not limited to the following three cases.
First, a specific percentage of data traffic during a mobile terminal's network access is accounted for by a designated service provider.
For example, the specific ratios are, for example: 50%, 70%, etc., wherein when the mobile terminal has a traffic exemption right (for example, the data transmission carries a traffic exempt identifier) during accessing the network, the corresponding gateway (or a charging system connected to the corresponding network) credits a specific proportion of the gateway to a specified service provider, and credits the rest of the gateway to the communication identifier, for example: assuming that the mobile terminal consumes 10M of traffic in the process of accessing the network at this time, and the specific proportion is 50%, the charging system counts 5M of traffic into the designated service provider during charging, and counts the rest 5M of traffic into the communication identifier of the mobile terminal. Of course, the above data are by way of example only and not by way of limitation.
Second, a certain amount of data traffic during the mobile terminal's access to the network is accounted for by the designated service provider.
For example, the specific number is, for example: 10M, 20M, etc., wherein when the mobile terminal has a traffic exemption right in the process of accessing the network, the corresponding gateway (or a charging system connected with the corresponding network) judges whether the data traffic in the process of accessing the network exceeds the specific quantity after the process of accessing the network is finished, and if the data traffic does not exceed the specific quantity, all the data traffic is counted in a specified service provider; if the number exceeds a certain number, no more than a portion of the data traffic is included in the designated service provider and more than a portion is included in the communication identification of the mobile terminal.
Third, the data traffic of the specific content during the mobile terminal's access to the network is credited to the designated service provider.
For example, the specific content is, for example: when the mobile terminal has a traffic-free right in a network access process, the corresponding gateway (or a charging system connected with the corresponding network) acquires data transmitted in the network access process, then determines data such as characters and pictures from the data transmitted in the network access process, and records the corresponding data traffic into a specified service provider; while for other types of content, for example: and the video records the corresponding data flow into the communication identifier of the mobile terminal.
As a possible implementation manner, the method for accounting in the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
For example, since the corresponding data traffic is charged to the specified service provider, and the mobile communication operator does not perform repeated charging for one-time network access process, the corresponding data traffic is not charged to the identifier of the mobile terminal, and therefore, when the mobile communication operator charges, the charge generated by the mobile communication operator is charged to the charge consumed by the account of the specified service provider, so as to charge the specified service provider.
As an alternative embodiment, with continued reference to fig. 2, the method further includes:
step S230: the method comprises the steps that a first proxy server judges whether any data access request of a mobile terminal is received within a preset time period;
step S240: and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal is logged out.
For example, the preset time period is, for example: 10min, 30min, 40min and so on, if the proxy server does not receive any data access request sent by the mobile terminal within the preset time period, it indicates that the process of the mobile terminal accessing the network is finished, so a corresponding prompt message can be generated. Further, the first proxy server may also send the prompt message to the distribution server after generating the prompt message.
In this case, if the temporary authentication information is previously allocated to the current network access procedure by the distribution server, the distribution server cancels the temporary authentication information based on the prompt information transmitted from the proxy server, and the first proxy server also cancels the temporary authentication information. By the scheme, the distributed temporary verification information can be ensured to be only used as the verification information in the network access process at this time, and new temporary verification information still needs to be generated in the next network access, so that the security of the network access is improved.
As an alternative embodiment, if the first proxy server prompts that the mobile terminal has logged off, the method further comprises:
the first proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the distribution server;
and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
For example, the first proxy server may send the distribution server the information shown in table 1:
TABLE 1
Starting time End time Consumed data traffic information
2015-4-15 14:23 2015-4-15 14:44 1.6M
The total free data traffic distributed by the distribution server to the mobile terminal is assumed to be: 30M, and the mobile terminal has consumed 20M traffic before the network access, it may be determined that the free remaining traffic of the mobile terminal after the network access process is as follows: 10M-1.6M ═ 8.4M. Of course, the above data traffic is by way of example only and not by way of limitation.
In an optional implementation manner, the mobile terminal, the first proxy server, the resource compression server, and the resource server may all use the same transmission protocol for data transmission, for example: all using the Http protocol, all using the Http2 protocol, etc.
In another alternative embodiment, the mobile terminal, the first proxy server, the resource compression server, and the resource server may also use different transmission protocols for data transmission, for example: the first transmission protocol is adopted for transmission between the mobile terminal and the proxy server, and the second transmission protocol is adopted for compression and transmission between the first proxy server and the resource compression server, in this case, since the second transmission protocol can compress the data, the data transmission rate can be further increased, the reason why the first transmission protocol is still used between the mobile terminal and the first proxy server is to prevent the traffic-free identifier contained in the data (e.g., data access request, requested data) between the mobile terminal and the first proxy server from being recognized by the gateway (or charging system) that cannot be charged after being compressed by the second transmission protocol, by the scheme, the data transmission rate can be improved, and the traffic-free identification can be identified by the network (or the charging system). For example, the first transmission protocol is, for example: http protocol, or other protocols that do not require compression of the transmitted data and can be recognized by the gateway of the mobile communications operator; the second transmission protocol is for example: the Spdy protocol, or other protocols capable of compressing the transmitted data.
The distribution server and the first proxy server introduced in the embodiment of the invention can be two servers with completely independent physical positions; the system can also be two different function modules of the same server, and also can be two servers with completely independent positions between the first proxy server and the resource compression server, and also can be two different function modules of the same server, wherein, because the function of the resource compression server is more complex and the function of the first proxy server is simpler, if the first proxy server and the resource compression server are arranged as two servers with completely independent positions, the respective expansion and use of the first proxy server and the resource compression server can be facilitated, in addition, the distribution server, the first proxy server and the resource compression server can be three servers with completely independent positions, or can be three different function modules of the same server, and the specific composition structure of the distribution server, the first proxy server and the resource compression server is adopted, the embodiments of the invention are not limiting.
In an alternative embodiment, in step S102b, the controlling the mobile terminal to access the network in a flow-saving manner, please refer to fig. 3, which includes:
step S301: the mobile terminal sends the data access request to a second proxy server;
step S302: the second proxy server sends the data access request to the resource compression server;
step S303: the resource compression server acquires the requested data from the resource server;
step S304: the resource compression server compresses the requested data and sends the compressed requested data to the second proxy server;
step S305: and the second proxy server sends the compressed requested data to the mobile terminal.
In step S301, the mobile terminal may pre-store addresses of a plurality of proxy servers that can forward the data access request sent by the mobile terminal to the resource compression server, and then when determining that the mobile terminal does not have the traffic exemption right, the mobile terminal selects one proxy server from the plurality of proxy servers as the second proxy server, and a mechanism for selecting the second proxy server by the mobile terminal is similar to a mechanism for selecting the first proxy server by the distribution server for the mobile terminal, and therefore details are not described here again.
In step S304, the compression process of the requested data by the resource compression server is described above, and therefore is not described herein again.
After the second proxy server sends the compressed requested data to the mobile terminal in step S305, if the resource compression server performs lossless compression on the requested data, the mobile terminal may also perform decompression processing on the compressed requested data.
In the specific implementation process, the mobile terminal, the second proxy server, the resource compression server, and the resource server may also all use the same transmission protocol for data transmission, for example: http protocol, Spdy protocol, etc., wherein if the Spdy protocol is used for data transmission, the data transmission rate can be increased and the consumed data traffic can be reduced.
Of course, different transmission protocols may be used for transmission among the mobile terminal, the second proxy server, the resource compression server, and the resource server, for example: the embodiment of the present invention does not describe in detail and is not limited in the embodiment of the present invention, for which protocol is used for data transmission among the devices in the process of saving the flow, and the like, in which a Spdy protocol is used for data transmission among the mobile terminal, the second proxy server, and the resource compression server, and an Http protocol is used for data transmission between the resource compression server and the resource server.
Similarly, the second proxy server and the resource compression server may be two relatively independent servers, or may be different functional modules of the same server, which is not limited in the embodiment of the present invention.
According to the method for accessing network resources provided by the embodiment of the invention, the embodiment of the invention also provides a method for the mobile terminal to access the network resources, which comprises the following steps:
when the network connection mode of the mobile terminal is a data connection mode, judging whether the mobile terminal has a traffic-free permission; when the mobile terminal has the traffic-free right, controlling the mobile terminal to access the network in a traffic-free mode, wherein all or part of data traffic of the mobile terminal accessing the network in the traffic-free mode is accounted into a specified service provider by a mobile communication operator; and when the mobile terminal does not have the traffic-free right, controlling the mobile terminal to access the network in a flow-saving mode, wherein the data of the mobile terminal accessing the network in the flow-saving mode are compressed data.
Optionally, the method further comprises: judging whether the network connection mode of the mobile terminal is a data connection mode; and when the network connection mode is not the data connection mode, controlling the mobile terminal to access the network through a direct connection mode.
Optionally, controlling the mobile terminal to access the network in a stream-free manner specifically includes: sending a data access request for accessing the network to a first proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of a mobile terminal, and the communication identifier has a traffic-free access to the internet; receiving requested data acquired by a first proxy server from a resource server based on a data access request; the data transmission in the process of accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of accessing the network by the mobile terminal through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the first proxy server to the designated service provider based on the traffic-free identifier, including: the data access request sent to the first proxy server comprises a flow-free identifier, and the data flow corresponding to the data access request is counted in a specified service provider based on the flow-free identifier; and/or data traffic for the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, before sending the data access request for accessing the network to the first proxy server through the network of the mobile communication carrier, the method further includes: acquiring a first proxy server distributed by a distribution server for a network access process, wherein the IP address of the first proxy server is a preset IP address, and the preset IP address is a flow-free identifier; or acquiring a preset label distributed by the first proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is a flow-free identifier.
Optionally, the requested data is obtained from the resource server by the resource compression server, compressed and sent to the first proxy server.
Optionally, the mobile terminal and the first proxy server transmit data through a first transmission protocol; and/or the first proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, before sending the data access request for accessing the network to the first proxy server through the network of the mobile communication carrier, the method further includes: and sending the communication identifier and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes a first proxy server for the network access process after verifying that the communication identifier has the traffic-free authority.
Optionally, before sending the data access request for accessing the network to the first proxy server through the network of the mobile communication carrier, the method further includes: receiving temporary verification information distributed by a distribution server for the mobile terminal, wherein the temporary verification information is distributed to the mobile terminal when the distribution server determines that the mobile terminal has a traffic-free right; sending a data access request for accessing a network to a first proxy server through a network of a mobile communication operator, specifically: and the first proxy server is provided with a data access request carrying the temporary verification information, so that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, controlling the mobile terminal to access the network in a flow-saving manner specifically includes: sending a data access request for accessing the network to a second proxy server; and obtaining the requested data obtained by the second proxy server based on the data access request, wherein the requested data is obtained from the resource server by the resource compression server, compressed and then sent to the second proxy server.
Optionally, data transmission is performed between the resource compression server and the second proxy server through a Spdy protocol; and/or the data transmission is carried out between the mobile terminal and the second proxy server through the Spdy protocol.
According to the method for accessing network resources provided by the embodiment of the present invention, an embodiment of the present invention further provides a mobile terminal, please refer to fig. 4, including:
the first judging module 40 is configured to judge whether the mobile terminal has a traffic exemption right when the network connection mode of the mobile terminal is a data connection mode;
a first control module 41, configured to control the mobile terminal to access the network in a flow-free manner when the mobile terminal has a flow-free right, where all or part of data traffic of the mobile terminal accessing the network in the flow-free manner is accounted by a mobile communications operator in a specified service provider;
and a second control module 42, configured to control the mobile terminal to access the network in a flow-saving manner when the mobile terminal does not have the traffic-exempting right, where data of the mobile terminal accessing the network in the flow-saving manner is compressed data.
Optionally, the mobile terminal further includes: a second judging module 43, configured to judge whether the network connection mode of the mobile terminal is a data connection mode; and the third control module 44 is configured to control the mobile terminal to access the network in a direct connection mode when the network connection mode is not the data connection mode.
Optionally, the first control module 41 specifically includes: the first sending unit is used for sending a data access request for accessing the network to the first proxy server through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the traffic-free permission of surfing the internet; a first receiving unit, configured to receive requested data acquired by the first proxy server from the resource server based on the data access request; the data transmission in the process of accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of accessing the network by the mobile terminal through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the first proxy server to the designated service provider based on the traffic-free identifier, including: the data access request sent to the first proxy server comprises a flow-free identifier, and the data flow corresponding to the data access request is counted in a specified service provider based on the flow-free identifier; and/or data traffic for the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the mobile terminal further includes: a first obtaining module 45, configured to obtain a first proxy server allocated by a distribution server for a network access process before sending a data access request for accessing a network to the first proxy server through a network of a mobile communication operator, where an IP address of the first proxy server is a preset IP address, and the preset IP address is a traffic-free identifier; or acquiring a preset label distributed by the first proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is a flow-free identifier.
Optionally, the requested data is obtained from the resource server by the resource compression server, compressed and sent to the first proxy server.
Optionally, the mobile terminal and the first proxy server transmit data through a first transmission protocol; and/or the first proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the mobile terminal further includes: the first sending module 46 is configured to send the communication identifier and the authentication information of the mobile terminal to the distribution server before sending the data access request for accessing the network to the first proxy server through the network of the mobile communication operator, so that the distribution server allocates the first proxy server to the network access process after verifying that the communication identifier has the traffic exemption right.
Optionally, the mobile terminal further includes: a first receiving module 47, configured to receive temporary authentication information allocated by a distribution server to a mobile terminal before sending a data access request for accessing a network to a first proxy server through a network of a mobile communications operator, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has a traffic exemption right; the first sending unit is specifically configured to: and the first proxy server is provided with a data access request carrying the temporary verification information, so that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, the second control module 42 specifically includes: a second sending unit, configured to send a data access request for accessing the network to the second proxy server; and the obtaining unit is used for obtaining the requested data obtained by the second proxy server based on the data access request, and the requested data is obtained from the resource server by the resource compression server and is transmitted to the second proxy server after being compressed.
Optionally, data transmission is performed between the resource compression server and the second proxy server through a Spdy protocol; and/or the data transmission is carried out between the mobile terminal and the second proxy server through the Spdy protocol.
According to the method for accessing network resources provided by the embodiment of the invention, the embodiment of the invention also provides a method for controlling the mobile terminal to access the network resources, which comprises the following steps: a resource compression server receives a data access request initiated by a mobile terminal; when the mobile terminal has the traffic-free right, the resource compression server controls the mobile terminal to access the resource server in a traffic-free mode, and all or part of data traffic of the mobile terminal accessing the network in the traffic-free mode is accounted into a specified service provider by a mobile communication operator; when the mobile terminal does not have the traffic-free right, the resource compression server controls the mobile terminal to access the network in a flow-saving mode, and data of the mobile terminal accessing the network in the flow-saving mode are compressed data.
Optionally, the resource compression server controls the mobile terminal to access the resource server in a stream-free manner, which specifically includes: the resource compression server acquires corresponding requested data from the resource server according to the data access request from the mobile terminal; the resource compression server transmits the requested data to the mobile terminal through the first proxy server; the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier. Optionally, the resource compression server transmits the requested data to the mobile terminal via the first proxy server, specifically: the resource compression server compresses the requested data; the resource compression server transmits the compressed requested data to the mobile terminal via the first proxy server.
Optionally, the data transmission in the process of the mobile terminal accessing the network is marked with a traffic-free identifier, and all or part of the data traffic in the process of the mobile terminal accessing the network is included in a designated service provider by a mobile communication operator based on the traffic-free identifier, including: the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into a specified service provider based on the flow-free identifier; and/or, data traffic for the requested data is accounted for in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
Optionally, before receiving the data access request of the mobile terminal, the method further includes: the method comprises the steps that a first proxy server sends a preset label to a mobile terminal, the preset label is carried when data transmission is carried out in the process that the mobile terminal accesses a network, and the preset label is a flow-free identifier; or the IP address of the first proxy server is a preset IP address, and the preset IP address is a traffic-free identifier.
Optionally, the method further comprises: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal; the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal; and when determining that the communication identifier has the traffic-free right, the distribution server allocates a first proxy server for the mobile terminal.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the method further includes: the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the first proxy server; the first proxy server receives a data access request which is sent by the mobile terminal and carries the communication identification and the temporary verification information, and verifies the validity of the data access request based on the temporary verification information; the resource compression server receives a data access request of the mobile terminal, and specifically comprises the following steps: the resource compression server receives a data access request sent by the mobile terminal through the first proxy server, wherein the first proxy server sends the data access request to the resource compression server when determining that the data access request is legal.
Optionally, after the first proxy server prompts that the mobile terminal has logged off, the distribution server logs off the temporary authentication information.
Optionally, the resource compression server controls the mobile terminal to access the network in a flow-saving manner, which specifically includes: the resource compression server acquires the requested data from the resource server based on the data access request and compresses the requested data; and the resource compression server sends the compressed requested data to the mobile terminal through the second proxy server.
Optionally, data transmission is performed between the mobile terminal and the second proxy server through a Spdy protocol; and/or the second proxy server and the resource compression server carry out data transmission through the Spdy protocol.
Optionally, the resource compression server performs compression processing on the requested data, specifically: the resource compression server compresses the requested data in a lossy compression mode; and/or the resource compression server compresses the requested data in a lossless compression mode.
Optionally, the resource compression server compresses the requested data in a lossless compression manner, specifically: when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the resource compression server removes redundant codes in the code data when the requested data contains the code data.
According to the method for accessing network resources provided by the present invention, an embodiment of the present invention further provides a resource compression server, please refer to fig. 5, including:
a second receiving module 50, configured to receive a data access request initiated by a mobile terminal;
a fourth control module 51, configured to control the mobile terminal to access the resource server in a flow-free manner when the mobile terminal has a flow-free right, where all or part of data traffic of the mobile terminal accessing the network in the flow-free manner is accounted by the mobile communication operator into an assigned service provider;
and a fifth control module 52, configured to control the mobile terminal to access the network in a flow-saving manner when the mobile terminal does not have the traffic exemption right, where data of the mobile terminal accessing the network in the flow-saving manner is compressed data.
Optionally, the fourth control module 51 specifically includes: the acquisition unit is used for acquiring corresponding requested data from the resource server according to the data access request from the mobile terminal; a third sending unit, for transmitting the requested data to the mobile terminal via the first proxy server; the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the third sending unit specifically includes: the compression subunit is used for compressing the requested data; and the sending subunit is used for sending the requested data subjected to the compression processing to the mobile terminal through the first proxy server.
Optionally, the data transmission in the process of the mobile terminal accessing the network is marked with a traffic-free identifier, and all or part of the data traffic in the process of the mobile terminal accessing the network is included in a designated service provider by a mobile communication operator based on the traffic-free identifier, including: the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into a specified service provider based on the flow-free identifier; and/or, data traffic for the requested data is accounted for in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
According to the method for accessing network resources provided by the embodiment of the present invention, an embodiment of the present invention further provides a network access system, please refer to fig. 6, including:
a resource compression server according to any of the embodiments of the present invention;
a first proxy server comprising: the first sending module 60 is configured to send a preset tag to the mobile terminal, where the preset tag is carried during data transmission when the mobile terminal accesses a network, and the preset tag is a traffic-free identifier; or the IP address of the first proxy server is a preset IP address, and the preset IP address is a traffic-free identifier.
Optionally, the system further includes a distribution server, and the distribution server includes: a second receiving module 70, configured to receive a communication identifier and authentication information of the mobile terminal; a third judging module 71, configured to verify whether the communication identifier has a traffic exemption right based on the communication identifier and the authentication information of the mobile terminal; and the allocating module 72 is configured to allocate a first proxy server to the mobile terminal when it is determined that the communication identifier has the traffic exemption right.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the distribution server further includes: a generating module 73, configured to generate temporary verification information and send the temporary verification information to the mobile terminal and the first proxy server; the first proxy server, further comprising: a third receiving module 61, configured to receive a data access request carrying a communication identifier and temporary validation information and sent by the mobile terminal, and validate the validity of the data access request based on the temporary validation information;
the second receiving module 50 is specifically configured to receive, by the resource compression server, the data access request sent by the first proxy server when the data access request is determined to be legal.
Optionally, the distribution server further includes: and the logout module 74 is used for logging out the temporary authentication information after the first proxy server prompts that the mobile terminal logs out.
Optionally, the fifth control module 52 specifically includes: the compression unit is used for acquiring the requested data from the resource server based on the data access request and compressing the requested data; and a fourth transmitting unit for transmitting the compressed requested data to the mobile terminal via the second proxy server.
Optionally, data transmission is performed between the mobile terminal and the second proxy server through a Spdy protocol; and/or the second proxy server and the resource compression server carry out data transmission through the Spdy protocol.
Optionally, the compression subunit or the compression unit is specifically configured to: compressing the requested data in a lossy compression mode; and/or compressing the requested data in a lossless compression manner.
Optionally, the compression subunit or the compression unit is configured to: when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adapted to a display unit of the mobile terminal; and/or, when the requested data comprises code data, removing redundant codes in the code data.
Optionally, the method further includes: a mobile terminal as described in any of the embodiments of the present invention.
One or more embodiments of the invention have at least the following beneficial effects:
in the embodiment of the invention, the distribution server receives the communication identification and the identity authentication information which are sent by the mobile terminal through the network of the mobile communication operator; the distribution server judges whether the communication identification has the traffic-free permission or not based on the communication identification and the identity authentication information; when the distribution server determines that the communication identifier has the traffic-free right, a proxy server used for the mobile terminal to access the network in a flow-free mode is allocated to the mobile terminal, and all or part of data traffic of the mobile terminal accessing the network in the flow-free mode is counted by a mobile communication operator into data traffic consumed by a specified service provider. That is to say, when the mobile terminal accesses the network, the data traffic consumed by the specified service provider can be consumed wholly or partially, and the data traffic of the mobile terminal does not need to be consumed partially or completely, so that the technical problem that the traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect of reducing the data traffic consumed when the mobile terminal accesses the network is achieved; therefore, the enthusiasm of the user for downloading can be obviously improved, and the wide spread of the network content on the Internet is facilitated;
in the scheme, after the distribution server determines that the mobile terminal has the traffic-free authority through the communication identifier and the identity authentication information of the mobile terminal, the proxy server for the mobile terminal to access the network in a flow-free manner is allocated to the mobile terminal, so that a user who is not the mobile terminal can be prevented from falsely using the free traffic of the mobile terminal;
in addition, in the embodiment of the invention, the distribution server distributes the proxy server to the mobile terminal when determining that the free residual flow of the communication identification is greater than the preset amount, so that the free data flow provided by the specified service provider to the mobile terminal can be accurately controlled;
in addition, in the embodiment of the invention, when the proxy server prompts that the mobile terminal logs out, the distribution server logs out the temporary authentication information, so that the temporary authentication information can be ensured to be used only in a process of accessing a network once, and a user who is not the mobile terminal can be further prevented from falsely using the free flow of the mobile terminal.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that microprocessors or Digital Signal Processors (DSPs) may be used in practice to implement some or all of the functions of some or all of the components of a mobile terminal, a distribution server, a proxy server, a resource compression server, and a network access system according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses a1, a method for controlling a mobile terminal to access network resources, comprising:
a resource compression server receives a data access request initiated by a mobile terminal;
when the mobile terminal has the traffic-free right, the resource compression server controls the mobile terminal to access a resource server in a flow-free mode, and all or part of data traffic of the mobile terminal accessing a network in the flow-free mode is accounted into a specified service provider by a mobile communication operator;
and when the mobile terminal does not have the traffic-free right, the resource compression server controls the mobile terminal to access the network in a flow-saving mode, wherein the data of the network accessed by the mobile terminal in the flow-saving mode are compressed data.
A2, the method as in a1, wherein the controlling, by the resource compression server, the mobile terminal to access the resource server in a stream-free manner includes:
the resource compression server acquires corresponding requested data from the resource server according to the data access request from the mobile terminal;
the resource compression server transmits the requested data to the mobile terminal through a first proxy server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
A3, the method as claimed in a2, wherein the resource compression server transmits the requested data to the mobile terminal via a first proxy server, specifically:
the resource compression server compresses the requested data;
and the resource compression server sends the compressed requested data to the mobile terminal through the first proxy server.
A4, the method as claimed in a2 or A3, wherein the data transmission during the process of accessing the network by the mobile terminal is marked with a traffic-exempt identifier, and all or part of the data traffic during the process of accessing the network by the mobile terminal is included in the designated service provider by the mobile communication operator based on the traffic-exempt identifier, the method includes:
the data access request sent by the mobile terminal comprises the flow-free identification, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identification; and/or the presence of a gas in the gas,
data traffic of the requested data is included in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
A5, the method according to a2 or A3, wherein before the receiving a data access request of a mobile terminal, the method further comprises: the first proxy server sends a preset label to the mobile terminal, the preset label is carried when the mobile terminal carries out data transmission in the network access process, and the preset label is the flow-free identifier; or,
the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
A6, the method according to a2 or A3, wherein the method further comprises:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal;
the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
and when determining that the communication identifier has the traffic-exempting right, the distribution server allocates the first proxy server to the mobile terminal.
A7, the method as recited in a6, wherein data is transmitted between the mobile terminal and the proxy server via a first transport protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
A8, the method according to a7, wherein the first transmission protocol specifically is: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
A9, the method as defined in A8, further comprising:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the first proxy server;
the first proxy server receives the data access request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information, and verifies the validity of the data access request based on the temporary verification information;
the resource compression server receives a data access request of the mobile terminal, and specifically comprises the following steps: and the resource compression server receives the data access request sent by the mobile terminal through the first proxy server, wherein the data access request sent to the resource compression server is sent by the first proxy server when the data access request is determined to be legal.
A10, the method as claimed in a2 or A3, wherein the distributing server logs out the temporary validation information after the first proxy server prompts that the mobile terminal has logged out.
A11, the method as in a1, wherein the controlling, by the resource compression server, the mobile terminal to access the network in a provincial flow manner includes:
the resource compression server acquires the requested data from a resource server based on the data access request and compresses the requested data;
and the resource compression server sends the compressed requested data to the mobile terminal through a second proxy server.
A12, the method as recited in A11, wherein the data transmission between the mobile terminal and the second proxy server is performed by Spdy protocol; and/or data transmission is carried out between the second proxy server and the resource compression server through the Spdy protocol.
A13, the method as in A3 or a11, wherein the resource compression server compresses the requested data, specifically:
the resource compression server compresses the requested data in a lossy compression mode; and/or
And the resource compression server compresses the requested data in a lossless compression mode.
A14, the method as in a13, wherein the resource compression server compresses the requested data in a lossless compression manner, specifically:
when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
and when the requested data contains code data, the resource compression server removes redundant codes in the code data.
B15, a resource compression server, comprising:
the second receiving module is used for receiving a data access request initiated by the mobile terminal;
the fourth control module is used for controlling the mobile terminal to access the resource server in a flow-free mode when the mobile terminal has a flow-free right, and all or part of data flow of the mobile terminal accessing the network in the flow-free mode is accounted into a specified service provider by a mobile communication operator;
and the fifth control module is used for controlling the mobile terminal to access the network in a flow-saving mode when the mobile terminal does not have the traffic-exempting right, wherein the data of the mobile terminal accessing the network in the flow-saving mode are compressed data.
16. The resource compression server according to B15, wherein the fourth control module specifically includes:
the acquisition unit is used for acquiring corresponding requested data from the resource server according to the data access request from the mobile terminal;
a third sending unit, configured to transmit the requested data to the mobile terminal via the first proxy server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
B17, the resource compression server as defined in B16, wherein the third sending unit specifically includes:
a compression subunit, configured to perform compression processing on the requested data;
a sending subunit, configured to send the compressed requested data to the mobile terminal via the first proxy server.
B18, the resource compressing server according to B16 or B17, wherein the data transmission during the process of accessing the network by the mobile terminal is marked with a traffic-exempt identifier, and all or part of the data traffic during the process of accessing the network by the mobile terminal is included in the designated service provider by the mobile communication operator based on the traffic-exempt identifier, including:
the data access request sent by the mobile terminal comprises the flow-free identification, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identification; and/or the presence of a gas in the gas,
data traffic of the requested data is included in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
C19, a network access system, comprising:
b15-18;
a first proxy server comprising: the first sending module is used for sending a preset tag to the mobile terminal, wherein the preset tag is carried when the mobile terminal carries out data transmission in the network access process, and the preset tag is the traffic-free identifier; or,
the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
C20, the system according to C19, wherein the system further comprises a distribution server, the distribution server comprises:
the second receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal;
the third judging module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and the allocation module is used for allocating the first proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
C21, the system according to C20, wherein data is transmitted between the mobile terminal and the proxy server via a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
C22, the system according to C21, wherein the first transmission protocol is specifically: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
C23, the system according to C22, wherein the distribution server further comprises:
the generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the first proxy server;
the first proxy server further comprises: a third receiving module, configured to receive the data access request carrying the communication identifier and the temporary verification information and sent by the mobile terminal, and verify validity of the data access request based on the temporary verification information;
the second receiving module is specifically configured to receive, by the resource compression server, the data access request sent by the first proxy server when it is determined that the data access request is legal.
C24, the system according to C19, wherein the distribution server further comprises: and the logout module is used for logging out the temporary verification information after the first proxy server prompts that the mobile terminal logs out.
C25, the system according to C19, wherein the fifth control module comprises:
the compression unit is used for acquiring the requested data from a resource server based on the data access request and compressing the requested data;
a fourth sending unit, configured to send the compressed requested data to the mobile terminal via a second proxy server.
C26, the system according to C25, wherein the data transmission between the mobile terminal and the second proxy server is performed by the Spdy protocol; and/or data transmission is carried out between the second proxy server and the resource compression server through the Spdy protocol.
C27, the system according to C25, wherein a compression subunit or the compression unit is specifically adapted to:
compressing the requested data in a lossy compression mode; and/or
And compressing the requested data in a lossless compression mode.
C28, the system according to C27, wherein the compression subunit or the compression unit is adapted to:
when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
when the requested data contains code data, redundant codes in the code data are removed.
C29, the system according to C19, further comprising: a mobile terminal, the mobile terminal comprising:
the first judging module is used for judging whether the mobile terminal has the traffic-free permission or not when the network connection mode of the mobile terminal is a data connection mode;
a first control module, configured to control the mobile terminal to access a network in a flow-free manner when the mobile terminal has the flow-free right, where all or part of data traffic of the mobile terminal accessing the network in the flow-free manner is accounted by a mobile communications operator in an assigned service provider;
and the second control module is used for controlling the mobile terminal to access the network in a flow-saving mode when the mobile terminal does not have the traffic-free right, wherein the data of the network accessed by the mobile terminal in the flow-saving mode are compressed data.

Claims (10)

1. A method for controlling access of a mobile terminal to network resources, comprising:
a resource compression server receives a data access request initiated by a mobile terminal;
when the mobile terminal has the traffic-free right, the resource compression server controls the mobile terminal to access a resource server in a flow-free mode, and all or part of data traffic of the mobile terminal accessing a network in the flow-free mode is accounted into a specified service provider by a mobile communication operator;
and when the mobile terminal does not have the traffic-free right, the resource compression server controls the mobile terminal to access the network in a flow-saving mode, wherein the data of the network accessed by the mobile terminal in the flow-saving mode are compressed data.
2. The method of claim 1, wherein the resource compression server controls the mobile terminal to access the resource server in a stream-free manner, and specifically comprises:
the resource compression server acquires corresponding requested data from the resource server according to the data access request from the mobile terminal;
the resource compression server transmits the requested data to the mobile terminal through a first proxy server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the first proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
3. The method according to claim 2, wherein the resource compression server transmits the requested data to the mobile terminal via a first proxy server, in particular:
the resource compression server compresses the requested data;
and the resource compression server sends the compressed requested data to the mobile terminal through the first proxy server.
4. The method as claimed in claim 2 or 3, wherein the data transmission during the access of the mobile terminal to the network is marked with a traffic-free identifier, and all or part of the data traffic during the access of the mobile terminal to the network is included in the designated service provider by the mobile communication operator based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises the flow-free identification, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identification; and/or the presence of a gas in the gas,
data traffic of the requested data is included in data traffic consumed by the specified facilitator based on the traffic-exempt identifier.
5. The method of claim 2 or 3, wherein prior to said receiving a data access request by a mobile terminal, the method further comprises: the first proxy server sends a preset label to the mobile terminal, the preset label is carried when the mobile terminal carries out data transmission in the network access process, and the preset label is the flow-free identifier; or,
the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
6. The method of claim 2 or 3, wherein the method further comprises:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal;
the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
and when determining that the communication identifier has the traffic-exempting right, the distribution server allocates the first proxy server to the mobile terminal.
7. The method of claim 6, wherein the data is transmitted between the mobile terminal and the proxy server via a first transport protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
8. The method according to claim 7, characterized in that said first transmission protocol is in particular: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
9. A resource compression server, comprising:
the second receiving module is used for receiving a data access request initiated by the mobile terminal;
the fourth control module is used for controlling the mobile terminal to access the resource server in a flow-free mode when the mobile terminal has a flow-free right, and all or part of data flow of the mobile terminal accessing the network in the flow-free mode is accounted into a specified service provider by a mobile communication operator;
and the fifth control module is used for controlling the mobile terminal to access the network in a flow-saving mode when the mobile terminal does not have the traffic-exempting right, wherein the data of the mobile terminal accessing the network in the flow-saving mode are compressed data.
10. A network access system, comprising:
the resource compression server of claim 9;
a first proxy server comprising: the first sending module is used for sending a preset tag to the mobile terminal, wherein the preset tag is carried when the mobile terminal carries out data transmission in the network access process, and the preset tag is the traffic-free identifier; or,
the IP address of the first proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
CN201510377009.9A 2015-06-30 2015-06-30 A kind of method, resource compression service device and network access system accessing Internet resources Active CN104980909B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510377009.9A CN104980909B (en) 2015-06-30 2015-06-30 A kind of method, resource compression service device and network access system accessing Internet resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510377009.9A CN104980909B (en) 2015-06-30 2015-06-30 A kind of method, resource compression service device and network access system accessing Internet resources

Publications (2)

Publication Number Publication Date
CN104980909A true CN104980909A (en) 2015-10-14
CN104980909B CN104980909B (en) 2019-05-21

Family

ID=54276886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510377009.9A Active CN104980909B (en) 2015-06-30 2015-06-30 A kind of method, resource compression service device and network access system accessing Internet resources

Country Status (1)

Country Link
CN (1) CN104980909B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246034A (en) * 2018-10-17 2019-01-18 上海连尚网络科技有限公司 A kind of method and apparatus for for mobile device distribution floating resources

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634386A (en) * 2013-11-22 2014-03-12 北京奇虎科技有限公司 Method and device for downloading application by client end application program
CN103841204A (en) * 2014-03-14 2014-06-04 北京奇虎科技有限公司 Traffic-free downloading method, device and system based on mobile terminal
CN104038916A (en) * 2014-06-24 2014-09-10 北京奇虎科技有限公司 Traffic optimization method and system performed on mobile terminal device and client
US20140301204A1 (en) * 2011-11-10 2014-10-09 Ntt Docomo, Inc. Mobile communication method, policy and charging rule server apparatus, and mobile management node
CN104468769A (en) * 2014-12-03 2015-03-25 北京奇虎科技有限公司 Method, device and system for acquiring network data content and client side

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140301204A1 (en) * 2011-11-10 2014-10-09 Ntt Docomo, Inc. Mobile communication method, policy and charging rule server apparatus, and mobile management node
CN103634386A (en) * 2013-11-22 2014-03-12 北京奇虎科技有限公司 Method and device for downloading application by client end application program
CN103841204A (en) * 2014-03-14 2014-06-04 北京奇虎科技有限公司 Traffic-free downloading method, device and system based on mobile terminal
CN104038916A (en) * 2014-06-24 2014-09-10 北京奇虎科技有限公司 Traffic optimization method and system performed on mobile terminal device and client
CN104468769A (en) * 2014-12-03 2015-03-25 北京奇虎科技有限公司 Method, device and system for acquiring network data content and client side

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246034A (en) * 2018-10-17 2019-01-18 上海连尚网络科技有限公司 A kind of method and apparatus for for mobile device distribution floating resources
CN109246034B (en) * 2018-10-17 2021-07-13 上海尚往网络科技有限公司 Method and equipment for allocating flow resources for mobile equipment

Also Published As

Publication number Publication date
CN104980909B (en) 2019-05-21

Similar Documents

Publication Publication Date Title
CN109525602B (en) Method, mobile terminal and system for accessing network based on flow-free platform
CN104967688A (en) Method for accessing to network by using flow-free platform, mobile terminal and system
CN104902454B (en) A kind of control the method for acquisition for mobile terminal data, gateway and network access system
CN104902030B (en) It is a kind of applied to the control method of intelligent remote controller, proxy server and control system
CN105323240A (en) Method for monitoring data traffic and mobile terminal
CN105101140A (en) Traffic-saving method for visiting network, proxy server and network access system
CN104954488B (en) A kind of method for network access control, the distribution server and network access system
CN104980958B (en) A kind of method and mobile terminal carrying out network login
CN105162753B (en) A kind of method and mobile terminal for mobile terminal to access network resources
CN104902453B (en) A kind of network access authority control method and mobile terminal for mobile terminal
CN105142124B (en) A kind of Network Access Method and mobile terminal applied to mobile terminal
CN109587270B (en) Method for mobile terminal to access network in flow-saving mode and mobile terminal
CN104980909B (en) A kind of method, resource compression service device and network access system accessing Internet resources
CN105120445B (en) A kind of network access authority control method, the distribution server and network access system
CN109526009B (en) Communication method, mobile terminal and system
CN104933614B (en) It is a kind of applied to the purchase method of mobile terminal, proxy server and system
CN105101286B (en) A kind of flow statistical method and gateway, the method and system for accessing network
CN109525603B (en) Method for accessing network, proxy server and network access system
CN105162754A (en) Method for access to game server, and mobile terminal
CN104954485A (en) Data communication method applied to mobile terminal, proxy server and communication system
CN105142123B (en) Method, Distributor and the system of network access are carried out based on wireless Internet card
CN104967983B (en) A kind of method and mobile terminal for mobile terminal network visiting
CN105101144A (en) Method for mobile terminal to obtain data and mobile terminal
CN105101117B (en) Data communications method, proxy server and communication system applied to mobile terminal
CN104980908A (en) Network access method of wireless network card and wireless network card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220721

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230712

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.