CN105813071B - Traffic sharing method and device, and terminal - Google Patents

Traffic sharing method and device, and terminal Download PDF

Info

Publication number
CN105813071B
CN105813071B CN201410836190.0A CN201410836190A CN105813071B CN 105813071 B CN105813071 B CN 105813071B CN 201410836190 A CN201410836190 A CN 201410836190A CN 105813071 B CN105813071 B CN 105813071B
Authority
CN
China
Prior art keywords
sharing
access
flow
terminal
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410836190.0A
Other languages
Chinese (zh)
Other versions
CN105813071A (en
Inventor
袁金凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410836190.0A priority Critical patent/CN105813071B/en
Publication of CN105813071A publication Critical patent/CN105813071A/en
Application granted granted Critical
Publication of CN105813071B publication Critical patent/CN105813071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a traffic sharing method, a traffic sharing device and a traffic sharing terminal. Wherein, the method comprises the following steps: the method comprises the steps that a sharing end receives a flow sharing request from an access end, wherein the sharing end is a terminal which allows flow to be provided for other users to use, the access end is a terminal which requests to use the flow of other users, and the flow sharing request carries identity information of the access end; and the sharing end uses the identity information to carry out identity authentication on the access end, and shares the flow to the access end for use under the condition that the authentication is passed. By the invention, the user with insufficient flow can directly access the terminal of the user with rich flow in a dialing or short message mode without checking the password.

Description

Traffic sharing method and device, and terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a traffic sharing method and apparatus, and a terminal.
Background
With the popularization and popularity of terminals such as smart phones, the use of smart phones for internet access becomes a fashion and habit, and the traffic problems generated by mobile phone internet access always bother mobile phone users, for example, the problems of insufficient traffic, incomplete traffic, incapability of determining the position of a WiFi hotspot and the like, and users hope to be able to: the fixed flow of each month is more fully utilized, the WiFi hot spot which can be connected with the mobile phone can be found at any time under the condition that the residual flow is insufficient, and the incomplete flow can be shared to other people.
In traffic sharing, a user end sharing traffic to others is called a sharing end, and a user end sharing traffic of others is called an access end, and at present, in the prior art, traffic sharing can be completed mainly through the following two ways of quickly connecting WiFi:
(1) the WiFi password is issued in a mode of generating a two-dimensional code, or a WAP (Wireless application Protocol) Push mode, an NFC (Near field communication) mode and a WeChat transmission mode are used for issuing, and the access terminal analyzes corresponding password information and then carries out WiFi connection.
(2) The access terminal needs to acquire verification when being connected to the WiFi of the sharing terminal for the first time, related password information is stored in the database, and when the access terminal is connected for the second time, the stored password information is directly used for connection.
In both of these approaches, a shared traffic server platform in an intermediate location is required to listen for requests and responses from the access and shared ports.
At present, the two modes only need not input a password, but both need to perform password verification, and can be completed only by performing encoding and decoding and background verification after a server located in a background acquires the password, which inevitably needs to configure a special device in the server to complete the work of acquiring the password and verifying the password, thus leading to a complicated implementation process. Moreover, when the WiFi function of the shared terminal is turned off, if the access terminal wants to connect to the shared terminal, the access terminal cannot automatically turn on the WiFi function and connect.
However, the prior art does not provide an effective solution to the above technical problems.
Disclosure of Invention
The invention mainly aims to provide a traffic sharing method, a traffic sharing device and a traffic sharing terminal, and aims to overcome the defect that a method for completing a traffic sharing process by WiFi connection in a password verification mode in the prior art is too complicated.
In order to achieve the above object, the present invention provides a traffic sharing method, including: the method comprises the steps that a sharing end receives a flow sharing request from an access end, wherein the sharing end is a terminal which allows flow to be provided for other users to use, the access end is a terminal which requests to use the flow of other users, and the flow sharing request carries identity information of the access end; and the sharing end uses the identity information to carry out identity authentication on the access end, and shares the flow to the access end for use under the condition that the authentication is passed.
Preferably, the identity information comprises: a Media Access Control (MAC) address and/or a phone number of the access terminal.
Preferably, the sharing end performs identity authentication on the access end by using the identity information, and the method includes: the sharing end judges whether the MAC address and/or the telephone number of the access end are consistent with the MAC address and/or the telephone number of the access end which is stored in advance by the sharing end and allows the flow of the sharing end to be used; and if the judgment result is yes, confirming that the identity authentication of the access terminal is passed.
Preferably, the sharing end shares the traffic to the access end for use, and comprises: the sharing end judges whether the WiFi function is in an opening state or a closing state, and if the WiFi function is in the opening state, the access end is allowed to use the flow of the sharing end after being directly connected to the sharing end through the WiFi function.
Preferably, the sharing end shares the traffic to the access end for use, and further includes: if the access end is in the closed state, the sharing end judges whether the flow used by the access end from the sharing end reaches a first flow threshold value or whether the total flow shared by the sharing end for other users reaches a second flow threshold value; if the judgment result is negative, the sharing end opens the WiFi function and allows the access end to use the flow of the sharing end after being connected to the sharing end through the WiFi function; and if so, the sharing end keeps the closing state of the WiFi function, and the access end is prohibited from performing connection operation through the WiFi function.
Preferably, the transmission mode of the traffic sharing request includes: dialing a call or sending a short message.
The invention also provides a traffic sharing device, located at the sharing end, where the sharing end is a terminal that allows traffic to be provided to other users, and the device includes: the receiving module is used for receiving a flow sharing request from an access end, wherein the access end is a terminal requesting to use the flow of other users, and the flow sharing request carries the identity information of the access end; and the sharing module is used for carrying out identity authentication on the access terminal by using the identity information, and sharing the flow of the sharing terminal to the access terminal for use under the condition that the authentication is passed.
Preferably, the identity information comprises: a Media Access Control (MAC) address and/or a phone number of the access terminal; the sharing module comprises: the judging unit is used for judging whether the MAC address and/or the telephone number of the access end is consistent with the MAC address and/or the telephone number of the access end which is prestored in the sharing end and allows the flow of the sharing end to be used; and the determining unit is used for determining that the identity authentication of the access terminal is passed under the condition that the judgment result of the judging unit is yes.
The invention also provides a terminal, which allows the flow to be provided for other users to use, and the terminal comprises: the traffic sharing device.
The invention also provides a flow sharing method, which comprises the following steps: the access terminal sends a flow sharing request carrying identity information of the access terminal to the sharing terminal, so that the sharing terminal performs identity authentication on the access terminal by using the identity information, wherein the access terminal is a terminal requesting to use the flow of other users, and the sharing terminal is a terminal allowing the flow to be provided for other users; and under the condition that the authentication result of the sharing end is passed, the access end is connected to the sharing end through the WiFi function of the sharing end to share the flow of the sharing end.
The present invention also provides a traffic sharing apparatus, located at an access end, where the access end is a terminal requesting to use traffic of other users, including: a sending module, configured to send a traffic sharing request carrying identity information of an access terminal to a sharing terminal, so that the sharing terminal performs identity authentication on the access terminal using the identity information, where the sharing terminal is a terminal that allows traffic to be provided to other users; and the sharing module is used for connecting to the sharing end through the WiFi function of the sharing end under the condition that the authentication result of the sharing end is passed, and sharing the flow of the sharing end.
The present invention also provides a terminal, which is a terminal requesting to use the traffic of other users, and comprises: the traffic sharing device.
Compared with the prior art, the traffic sharing method, the traffic sharing device and the traffic sharing terminal can be used for quickly and automatically connecting WiFi equipment through dialing or short messages under the condition that WiFi of connected users is closed, can well share residual traffic, and can be used for quickly connecting when WiFi passwords or password changes of the users are unknown.
Drawings
Fig. 1 is a flow chart of a traffic sharing method according to a first embodiment of the present invention;
fig. 2 is a block diagram of a traffic sharing apparatus according to a first embodiment of the present invention;
FIG. 3 is a flow chart of a traffic sharing method according to a second embodiment of the present invention;
fig. 4 is a block diagram of a traffic sharing apparatus according to a second embodiment of the present invention;
FIG. 5 is a flow diagram of traffic sharing in accordance with a preferred embodiment of the present invention;
fig. 6 is a diagram illustrating a process for triggering a WiFi connection using a dial-up mode according to a preferred embodiment of the present invention; and
fig. 7 is a schematic diagram of a process of triggering WiFi connection in a short message manner according to a preferred embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
The embodiment of the invention provides a flow sharing method which can be applied to a flow sharing end capable of sharing flow to other users. Fig. 1 is a flowchart of a traffic sharing method according to a first embodiment of the present invention, and as shown in fig. 1, the flowchart includes the following steps (step S102-step S104):
step S102, the sharing end receives a traffic sharing request from the access end, where the sharing end is a terminal that allows providing traffic to other users, the access end is a terminal that requests to use traffic of other users, and the traffic sharing request carries identity information of the access end.
And step S104, the sharing end uses the identity information to carry out identity authentication on the access end, and the sharing end shares the flow to the access end for use under the condition that the authentication is passed.
Through the steps shown in fig. 1, the access terminal can use the flow of the sharing terminal as long as the access terminal passes the identity authentication of the sharing terminal, so that the trouble of password verification can be avoided.
In the embodiment of the present invention, the identity information may include: a Media Access Control (MAC) address and/or a phone number of the access terminal. Based on this, in the above step S104, the process of the sharing end performing identity authentication on the access end by using the identity information may be implemented as follows: the sharing end judges whether the MAC address and/or the telephone number of the access end are consistent with the MAC address and/or the telephone number of the access end which is stored in advance by the sharing end and allows the flow of the sharing end to be used; and if the judgment result is yes, confirming that the identity authentication of the access terminal is passed.
That is, the sharing end may preset a list of access ends that can use their traffic, and of course, the list is stored in the sharing end in the form of MAC and/or phone number, and in the authentication process, the result of the identity authentication may be determined only by judging whether the MAC and/or phone number of the access end that currently requests the power traffic is included in the list pre-stored in the sharing end.
For example, in practical application, an APK program is installed on a mobile phone of a user who has a large traffic and is willing to share the traffic, a white list (i.e., a mobile phone allowing to share the traffic) is set through the APK program, and the set users with the MAC addresses can be directly connected with WiFi through quick dialing or short messages without checking passwords. If the WiFi of the users sharing the traffic is already opened, the users can be directly connected. If WiFi is not turned on, WiFi connection may be automatically turned on within the flow limit.
In the step S104, the sharing of the traffic by the sharing node to the access node may be implemented by: the sharing terminal firstly judges whether the WiFi function is in an opening state or a closing state, and if the WiFi function is in the opening state, the access terminal can be allowed to be directly connected to the sharing terminal through the WiFi function and then use the flow of the sharing terminal.
Further, if the access terminal is in the closed state, the sharing terminal may further determine whether the flow rate used by the access terminal from the sharing terminal reaches a first flow rate threshold (that is, the sharing terminal may set an individual flow rate limit for each allowed access terminal sharing the flow rate thereof in advance to ensure that the flow rate shared by each access terminal does not exceed the limit), or determine whether the total flow rate shared by the sharing terminal for other users reaches a second flow rate threshold (that is, the sharing terminal may set a total flow rate limit for all the access terminals requesting the sharable flow rate in advance to ensure that the flow rate shared by all the access terminals does not exceed the allowed range of the sharing terminal), and if the determination result is negative, the sharing terminal opens the WiFi function and allows the access terminal to use the flow rate of the sharing terminal after being connected to the sharing terminal through the WiFi function, and if so, the sharing end keeps the closing state of the WiFi function, and the access end is prohibited from performing connection operation through the WiFi function.
In this embodiment of the present invention, the transmission manner of the traffic sharing request may include: dialing a call or sending a short message. That is, the access terminal may send a traffic sharing request to the sharing terminal by dialing a phone call or sending a short message, and of course, if the access terminal does not pass the identity authentication or has exceeded the first threshold or the second threshold, the sharing terminal may also reject its access.
Corresponding to the traffic sharing method shown in fig. 1, an embodiment of the present invention further provides a traffic sharing apparatus, located at a sharing end (the sharing end is a terminal that allows providing traffic to other users), for executing the traffic sharing method shown in fig. 1.
Fig. 2 is a block diagram of a traffic sharing apparatus according to a first embodiment of the present invention, and as shown in fig. 2, the apparatus may include: a receiving module 10 and a sharing module 20, wherein:
a receiving module 10, configured to receive a flow sharing request from an access end, where the access end is a terminal that requests to use flows of other users, and the flow sharing request carries identity information of the access end; and the sharing module 20 is configured to perform identity authentication on the access terminal by using the identity information, and share the flow of the sharing terminal to the access terminal for use when the authentication passes.
In the embodiment of the present invention, the identity information may include: a Media Access Control (MAC) address and/or a phone number of the access terminal. Further, the sharing module 20 may include: a judging unit 22, configured to judge whether the MAC address and/or the phone number of the access end are consistent with the MAC address and/or the phone number of the access end that is pre-stored in the sharing end and allows the flow of the sharing end to be used; and a determining unit 24, configured to determine that the identity authentication performed on the access terminal is passed if the determination result of the determining unit 22 is yes.
The embodiment of the present invention further provides a terminal (not described in conjunction with the drawings), which allows traffic to be provided to other users for use, and the terminal includes the traffic sharing apparatus shown in fig. 2.
Example two
The embodiment of the invention also provides a flow sharing method, which can be applied to the access end which can need to share the flow of other users. Fig. 3 is a flow chart of a traffic sharing method according to a second embodiment of the present invention, and as shown in fig. 3, the flow chart includes the following steps (step S302-step S304):
step S302, the access terminal sends a flow sharing request carrying the identity information of the access terminal to the sharing terminal, so that the sharing terminal performs identity authentication on the access terminal by using the identity information, wherein the access terminal is a terminal requesting to use the flow of other users, and the sharing terminal is a terminal allowing to provide the flow for other users.
And step S304, under the condition that the authentication result of the sharing end is passed, the access end is connected to the sharing end through the WiFi function of the sharing end to share the flow of the sharing end.
Through the steps shown in fig. 3, the access terminal can use the traffic of the sharing terminal as long as the access terminal passes the identity authentication of the sharing terminal, so that the trouble of password verification can be avoided.
Corresponding to the traffic sharing method shown in fig. 3, an embodiment of the present invention further provides a traffic sharing apparatus, located at an access terminal (the access terminal is a terminal that requests to use traffic of other users), for executing the flow sharing method shown in fig. 3.
Fig. 4 is a block diagram of a traffic sharing apparatus according to a second embodiment of the present invention, and as shown in fig. 4, the apparatus may include: a sending module 30 and a sharing module 40, wherein:
a sending module 30, configured to send a traffic sharing request carrying identity information of an access terminal to a sharing terminal, so that the sharing terminal performs identity authentication on the access terminal using the identity information, where the sharing terminal is a terminal that allows traffic to be provided to other users; and the sharing module 40 is configured to connect to the sharing end through the WiFi function of the sharing end when the authentication result of the sharing end is passed, and share the traffic of the sharing end.
The embodiment of the present invention further provides a terminal (not described in conjunction with the drawings), where the terminal is a terminal that requests to use traffic of other users, and the terminal includes the traffic sharing apparatus shown in fig. 4.
The following describes the implementation process of the first and second embodiments in detail with reference to fig. 5 to 7 and the preferred embodiment.
PREFERRED EMBODIMENTS
The traffic sharing method provided by the preferred embodiment allows some users with insufficient traffic to directly access terminals of users with rich flows through dialing or short message mode without checking passwords, and can also be directly opened and automatically connected under the condition that the WiFi function is closed, so that the traffic sharing method can be widely applied to small traffic sharing application scenarios such as families, units and the like.
Fig. 5 is a flow chart of traffic sharing according to a preferred embodiment of the present invention, as shown in fig. 5, the flow chart includes the following steps:
step S502, adding a telephone and an MAC address which are allowed to be directly accessed to a user into a white list on a mobile phone of a user with rich traffic, and setting a maximum traffic sharing value of the mobile phone;
step S504, when the user with insufficient flow prepares to connect with the WiFi of the user with rich flow, the user dials a phone or sends a short message;
step S506, the user with rich traffic receives the dialing or short message request, judges whether the user is in the set white list, if so, executes step S508, otherwise, executes step S504;
step S508, the user with abundant flow rate judges whether the flow rate set by the user is used up, if the judgment result is no, step S510 is executed, and if the judgment result is yes, step S504 is executed;
step 510, the user with rich traffic judges whether the WiFi of the user is started, if so, the step 512 is executed, and if not, the step 514 is executed;
step S512, the user with insufficient flow normally connects WiFi to surf the internet;
in step S514, the user with abundant traffic turns on WiFi, and optionally, further determines whether the user with insufficient traffic is allowed to connect WiFi.
The following describes the processes of making a call and sending a short message and completing traffic sharing respectively:
1. the process of completing the flow sharing by adopting the dialing mode comprises the following steps:
(1) the MAC address and the phone number (or only the MAC address or the phone number) of the user (i.e., the access terminal in the above embodiment) allowed to share the network are pre-stored in the mobile phone of the user with a large traffic (i.e., the sharing terminal in the above embodiment) through software, and are set in the white list, so that the maximum traffic that can be used by each user can be limited, or the total traffic that can be shared by the user with a large traffic can be limited.
(2) When a request access user prepares to access a shared WiFi user, a call is dialed to the shared WiFi user, when equipment of the shared WiFi user receives a dialing request, the access user is directly allowed to carry out WiFi connection according to whether the telephone number and/or the MAC address of the equipment are set as same as those in software, if yes, the access user is not checked for a password, the current residual flow value is inquired, a numerical value is returned to the user, if the flow exceeds a limit value (in practical application, which limit is carried out on the flow value can be determined according to needs), the user can be told that the flow exceeds the limit value in a dialing mode, and the access user is not allowed to carry out WiFi connection.
(3) Under the condition that the WiFi function of the sharing WiF user is turned off, if the access requesting user has not reached the upper limit value of the shared traffic (both the two popular upper limit values can be set as required in practical applications), the sharing WiF user may automatically turn on WiFi when receiving the dialing request, allow the access requesting user to make WiF connection, and refuse to request the access requesting user if the upper limit value of the shared traffic has been reached.
2. The process of completing the flow sharing by adopting the dialing mode comprises the following steps:
(1) the MAC address and the phone number (or only the MAC address or the phone number) of the user (i.e., the access terminal in the above embodiment) allowed to share the network are pre-stored in the mobile phone of the user with a large traffic (i.e., the sharing terminal in the above embodiment) through software, and are set in the white list, and the maximum traffic that can be used by each user may be limited, or the total traffic that can be shared by the user with a large traffic may be limited.
(2) When a request access user prepares to access WiFi, a short message is sent to a sharing WiFi user, when equipment of the sharing WiFi user receives a short message request, a password does not need to be checked for the request access user, the WiFi connection is directly allowed to be carried out for the access user according to whether a telephone number and/or an MAC address of the equipment are the same as those set in software or not, the current residual flow value is inquired, a numerical value is returned to the user, if the flow exceeds a limit value (in practical application, which limit is carried out on the flow value can be determined according to needs), the mode of sending the short message can be adopted to tell that the flow limit value is exceeded for the user, and the user is not allowed to connect WiFi.
(3) Under the condition that the WiFi function of the shared WiFi user is closed, if the access request user does not reach the upper limit value of the shared flow (the two popular upper limit values can be set as required in practical application), the shared WiFi user can automatically open WiFi to allow the access request user to carry out WiF connection when receiving the short message request, and if the access request user reaches the upper limit value of the shared flow, the access request user is refused.
For the technical implementation process of completing the traffic sharing method by using the above-mentioned calling mode or sending short message mode, the following further description is made from the software implementation level by combining the application framework layer and the application program layer.
Please refer to fig. 6 and 7 (fig. 6 is a schematic diagram illustrating a process of triggering WiFi connection using a dial-up mode according to a preferred embodiment of the present invention, and fig. 7 is a schematic diagram illustrating a process of triggering WiFi connection using a short message mode according to a preferred embodiment of the present invention). In the software implementation level, when dialing, a Dual Tone Multi Frequency (DTMF) signaling is needed, the DTMF coder/decoder converts the information or number generated by the keystroke into a Dual Tone signal for transmission during coding, and the DTMF coder/decoder detects the information or number generated by the base key during decoding. It should be noted that the dialing mode and the short message mode use different encoding and decoding, the dialing mode transmits DTMF signaling, and the short message mode transmits PDU strings, so the dialing mode requires DTMF signaling encoding and decoding, and the short message mode requires PDU string encoding and decoding.
Whether the triggering is through sending a short message or dialing a phone call, both parties need to be defined in advance, for example, after the phone call is dialed, a key 11 is pressed or the content of the sent short message is 'connection WiFi _ XXX', the opposite party performs decoding verification and opens connection WiFi after receiving the short message, the short message content is encoded by using PDU, the content of the dialing key of the dialing the phone call is encoded by using DTMF, the opposite party performs PDU decoding or DTMF decoding after receiving the short message, and if the appointed content is obtained, WiFi connection is performed.
In the android system of the mobile phone, when a call is made or a short message is sent, firstly, an application framework layer receives an AT instruction of the opposite side, the AT instruction is analyzed, then the content is uploaded to an application program layer, the application program layer transmits the message between activities by using an Intent mechanism, and verification is carried out, if the verification is carried out, the message is sent to a WiFi module, and the WiFi module is disconnected and WiFi is opened.
Preferably, in the preferred embodiment, the above-mentioned calling mode and the short message sending mode may be expanded, and the shared traffic may be triggered by a WeChat mode (if the user needing to access has traffic, the user may be WeChat), and the traffic sharing process may be specifically implemented as follows:
(1) the MAC address and the phone number (or only the MAC address or the phone number) of the user (i.e., the access terminal in the above embodiment) allowed to share the network are pre-stored in the mobile phone of the user with a large traffic (i.e., the sharing terminal in the above embodiment) through software, and are set in the white list, so that the maximum traffic that can be used by each user can be limited, or the total traffic that can be shared by the user with a large traffic can be limited.
(2) When a request access user prepares to access WiFi, a WeChat request is sent to a sharing WiFi user, when equipment for sharing WiFi receives the WeChat request, a password does not need to be checked for the request access user, the request access user is directly allowed to carry out WiFi connection according to whether a telephone number and/or an MAC address of the equipment are the same as those set in software or not, the current residual flow value is inquired, a numerical value is returned to the user, and if the flow exceeds a limit value (in practical application, which limit is carried out on the flow value can be determined according to needs), the user can be informed that the flow limit value is exceeded in a WeChat mode, and the user is not allowed to connect WiFi.
(3) Under the condition that the WiFi function of the shared WiFi user is closed, if the access request user does not reach the upper limit value of the shared flow (the two popular upper limit values can be set as required in practical application), the shared WiFi user can automatically open WiFi when receiving a WeChat request, the access request user is allowed to connect WiF, and if the upper limit value of the shared flow is reached, the access request user is refused.
The scenarios that can be applied in the preferred embodiment include scenarios that can implement traffic sharing in technologies such as smart phones, UFI (UCPM front OF INNOVATION forum) products, and CPE (Customer Premise Equipment) products.
Through the preferred embodiment, under the condition that WiFi of the connected user is closed, WiFi equipment can be quickly and automatically connected through dialing or short messages, residual traffic can be well shared, and quick connection can be carried out when WiFi passwords or password changes of the user are unknown.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A method for traffic sharing, comprising:
a sharing end receives a flow sharing request from an access end, wherein the sharing end is a terminal which allows flow to be provided for other users to use, the access end is a terminal which requests to use the flow of other users, and the flow sharing request carries identity information of the access end;
the sharing end uses the identity information to authenticate the identity of the access end, and under the condition that the authentication is passed, the sharing end shares the flow to the access end for use;
if the authentication is passed, the sharing end shares the flow to the access end for use, including:
and if the WiFi function of the sharing end is in a closed state, responding to the flow sharing request, the sharing end opens the WiFi function and allows the access end to use the flow of the sharing end after being connected to the sharing end through the WiFi function.
2. The method of claim 1, wherein the identity information comprises: and the media access of the access end controls the MAC address and/or the telephone number.
3. The method of claim 2, wherein the sharing end performs identity authentication on the access end by using the identity information, comprising:
the sharing end judges whether the MAC address and/or the telephone number of the access end are consistent with the MAC address and/or the telephone number of the access end which is prestored by the sharing end and allows the flow of the sharing end to be used;
and if so, confirming that the identity authentication performed on the access terminal passes.
4. The method of claim 1, wherein the sharing peer shares traffic to the access peer for use, comprising:
the sharing end judges whether the WiFi function is in an opening state or a closing state, and if the WiFi function is in the opening state, the access end is allowed to be directly connected to the sharing end through the WiFi function and then the flow of the sharing end is used.
5. The method of claim 4, wherein the sharing peer shares traffic to the access peer for use, further comprising:
if the access end is in the closed state, the sharing end judges whether the flow used by the access end from the sharing end reaches a first flow threshold value or whether the total flow shared by the sharing end for other users reaches a second flow threshold value;
if the judgment result is negative, the sharing end opens a WiFi function and allows the access end to use the flow of the sharing end after being connected to the sharing end through the WiFi function;
and if so, the sharing end keeps the closing state of the WiFi function, and the access end is prohibited from performing connection operation through the WiFi function.
6. The method according to any one of claims 1 to 5, wherein the traffic sharing request is transmitted in a manner including: dialing a call or sending a short message.
7. A traffic sharing apparatus at a sharing end, wherein the sharing end is a terminal that allows traffic to be provided to other users, the apparatus comprising:
a receiving module, configured to receive a flow sharing request from an access end, where the access end is a terminal that requests to use flows of other users, and the flow sharing request carries identity information of the access end;
the sharing module is used for carrying out identity authentication on the access end by using the identity information, and sharing the flow of the sharing end to the access end for use under the condition that the authentication is passed;
if the authentication is passed, the sharing end shares the flow to the access end for use, including:
and if the WiFi function of the sharing end is in a closed state, responding to the flow sharing request, the sharing end opens the WiFi function and allows the access end to use the flow of the sharing end after being connected to the sharing end through the WiFi function.
8. The apparatus of claim 7,
the identity information includes: the media of the access end is accessed to a control MAC address and/or a telephone number;
the sharing module comprises:
a judging unit, configured to judge whether the MAC address and/or the phone number of the access terminal is consistent with an MAC address and/or a phone number of an access terminal that allows the flow of the sharing terminal and is pre-stored in the sharing terminal;
and the determining unit is used for determining that the identity authentication performed on the access terminal passes under the condition that the judgment result of the judging unit is yes.
9. A terminal that allows traffic to be provided to other users, the terminal comprising: the traffic sharing device of claim 7 or 8.
CN201410836190.0A 2014-12-29 2014-12-29 Traffic sharing method and device, and terminal Active CN105813071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410836190.0A CN105813071B (en) 2014-12-29 2014-12-29 Traffic sharing method and device, and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410836190.0A CN105813071B (en) 2014-12-29 2014-12-29 Traffic sharing method and device, and terminal
PCT/CN2015/083113 WO2016107124A1 (en) 2014-12-29 2015-07-01 Traffic sharing method and device, and terminal

Publications (2)

Publication Number Publication Date
CN105813071A CN105813071A (en) 2016-07-27
CN105813071B true CN105813071B (en) 2020-09-15

Family

ID=56284091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410836190.0A Active CN105813071B (en) 2014-12-29 2014-12-29 Traffic sharing method and device, and terminal

Country Status (2)

Country Link
CN (1) CN105813071B (en)
WO (1) WO2016107124A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666669A (en) * 2016-07-29 2018-02-06 中兴通讯股份有限公司 A kind of data sharing method and device
CN106686596A (en) * 2017-03-13 2017-05-17 联想(北京)有限公司 Data network sharing method, main device and slave device
CN107197460A (en) * 2017-05-27 2017-09-22 惠州Tcl移动通信有限公司 A kind of method and system of network share
CN107343272A (en) * 2017-06-22 2017-11-10 努比亚技术有限公司 A kind of data traffic sharing method and mobile terminal
CN107295518A (en) * 2017-07-28 2017-10-24 中科创达软件科技(深圳)有限公司 A kind of wireless connection method and system, terminal device
CN108668275A (en) * 2018-03-09 2018-10-16 深圳捷豹电波科技有限公司 Flow shares implementation method and flow sharing means

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010045302A1 (en) * 2008-10-14 2010-04-22 Starent Networks, Corp Flow balancing in communications networks
CN102932958A (en) * 2011-08-12 2013-02-13 中兴通讯股份有限公司 Method, device and system for real-time data sharing
CN102546753A (en) * 2011-12-08 2012-07-04 上海博泰悦臻电子设备制造有限公司 Method and system for mobile terminal to share vehicle side network
CN102647802A (en) * 2012-03-28 2012-08-22 青岛海信移动通信技术股份有限公司 Wireless data sharing method and terminals for realizing sharing
CN103369527A (en) * 2012-04-01 2013-10-23 腾讯科技(深圳)有限公司 Method, device and system for WiFi (wireless fidelity) network sharing
CN102833831A (en) * 2012-08-21 2012-12-19 中兴通讯股份有限公司 Network card device, routing device, system and method for realizing dynamic dormancy and wakeup
CN103117906B (en) * 2013-02-27 2016-12-28 广东欧珀移动通信有限公司 A kind of mobile terminal shares flux monitoring method during Wi-Fi hotspot
CN103596121B (en) * 2013-10-30 2016-08-17 北京网河时代科技有限公司 The flow sharing method of Wireless Mobile Networks
CN103889029A (en) * 2014-03-24 2014-06-25 深圳市云猫信息技术有限公司 Network hotspot sharing method, client side, sharing side and management server

Also Published As

Publication number Publication date
CN105813071A (en) 2016-07-27
WO2016107124A1 (en) 2016-07-07

Similar Documents

Publication Publication Date Title
CN104159226B (en) Method for connecting network and device
CN103476092B (en) A kind of WIFI hot spot cut-in method and system based on mobile terminal
US20170222991A1 (en) MANAGEMENT OF PROFILES IN AN EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC)
CN102883320B (en) WiFi method for authenticating and its system
US8831581B2 (en) System and methods of initiating a call
JP4301997B2 (en) Authentication method for information appliances using mobile phones
TWI386100B (en) Communication apparatuses and methods for handling apparatus terminated communication request
US8244223B2 (en) Automated transfer of wireless provisioning parameters between existing and new devices
EP2761903B1 (en) Device association via video handshake
CN1965537B (en) Method and system for establishing an emergency connection in a local network
TWI386098B (en) Communication apparatus
CN104506561B (en) Terminal profile access control method and device
KR101125515B1 (en) A method and apparatus for providing mobile-to-mobile video capability to a network
US20150024688A1 (en) Automatic Pairing of a Vehicle and a Mobile Communications Device
US10848946B2 (en) Network access method, device, and system
US7129853B2 (en) System and method for remote control of a wireless handset
KR20150074005A (en) Calling an unready terminal
US20170034149A1 (en) Intelligent Communications Method, Terminal, and System
CN100466805C (en) Method for end-to-end enciphoring voice telecommunication
WO2014144263A1 (en) Handling multiple voice calls in multiple sim mobile phone
CN102869014A (en) Terminal and data communication method
CN104144463B (en) Wi Fi method for network access and system
CN102326422A (en) Non-validated emergency calls for all-ip 3gpp ims networks
US20110296501A1 (en) Connecting Devices to an Existing Secure Wireless Network
US20170161721A1 (en) Method and system for opening account based on euicc

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant