Disclosure of Invention
In view of the above, the present invention is proposed in order to provide a method for a mobile terminal to have a reduced-flow access to a network and a mobile terminal that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a method for provincial flow access to a network, comprising:
the method comprises the steps that a proxy server receives a data access request of a mobile terminal for accessing a network through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet;
the proxy server sends the data access request to a resource compression server so that the resource compression server acquires the requested data from a resource server based on the data access request and compresses the requested data;
the proxy server receives the compressed requested data sent by the resource compression server;
the proxy server sends the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further includes:
the resource compression server compresses the requested data in a lossy compression mode; and/or the presence of a gas in the gas,
and the resource compression server compresses the requested data in a lossless compression mode.
Optionally, the resource compression server compresses the requested data in a lossy compression manner, including:
when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or the presence of a gas in the gas,
and when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the code data to the mobile terminal.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specific service provider based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identifier; and/or, the compressed data traffic of the requested data is credited to the designated service provider based on the traffic exempt identification.
Optionally, the method further includes:
the proxy server sends a preset tag to the mobile terminal, the preset tag is carried when the mobile terminal carries out data transmission in the network access process, and the preset tag is the flow-free identifier; or,
the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
Optionally, the method further includes:
and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period, and obtains the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the method further includes:
the proxy server sends the data traffic information consumed by the mobile terminal to a distribution server;
and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Optionally, the method further includes:
the distribution server receives the communication identification and the identity authentication information of the mobile terminal;
the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
and when determining that the communication identifier has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, when determining that the communication identifier has the traffic exemption right, the distribution server allocates the proxy server to the mobile terminal, which specifically includes:
the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of the specified service provider;
the distribution server judges whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information;
and the distribution server distributes the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the method further includes:
the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, and specifically comprises the following steps: the proxy server receives the data access request carrying the identity authentication information sent by the mobile terminal;
the proxy server sends the data access request to a resource compression server, and the method comprises the following steps:
the proxy server verifies the validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, after the proxy server prompts that the mobile terminal has logged off, the distribution server logs off the temporary authentication information.
Optionally, if the proxy server prompts that the mobile terminal has logged off, the method further includes:
the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to a distribution server;
and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, after the allocating the proxy server to the mobile terminal, the method further includes:
the distribution server sends the free residual flow information to the proxy server;
the sending, by the proxy server, the data access request to a resource compression server specifically includes: after receiving the data access request, the proxy server judges whether the latest free residual flow of the mobile terminal is greater than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
According to another aspect of the present invention, there is provided a proxy server including:
the mobile terminal comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving a data access request of the mobile terminal for accessing a network through a network of a mobile communication operator, the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority;
the first sending module is used for sending the data access request to a resource compression server so that the resource compression server obtains requested data from a resource server based on the data access request and compresses the requested data;
a second receiving module, configured to receive the compressed requested data sent by the resource compression server;
a second sending module, configured to send the compressed requested data to the mobile terminal through the network of the mobile communications carrier;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specific service provider based on the traffic-free identifier, including:
the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted in the specified service provider based on the flow-free identifier; and/or, the compressed data traffic of the requested data is credited to the designated service provider based on the traffic exempt identification.
Optionally, the proxy server further includes:
a third sending module, configured to send a preset tag to the mobile terminal, where the preset tag is carried when the mobile terminal performs data transmission in a network access process, and the preset tag is the traffic-free identifier; or,
the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier.
According to another aspect of the present invention, there is provided a network access system, including the proxy server and the resource compression server described in any embodiment of the present invention, wherein the resource compression server includes a first compression module, configured to compress the requested data in a lossy compression manner; and/or the presence of a gas in the gas,
and the second compression module is used for compressing the requested data in a lossless compression mode.
Optionally, the first compression module is configured to:
when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or when the requested data contains code data, removing redundant codes in the code data and then sending the code data to the mobile terminal.
Optionally, the proxy server further includes:
the first statistical module is used for counting data traffic information consumed by the mobile terminal according to a preset statistical period and obtaining the latest free residual traffic information of the mobile terminal with the traffic-free permission.
Optionally, the system further includes: a distribution server;
the proxy server further comprises: a fourth sending module, configured to send the data traffic information consumed by the mobile terminal to the distribution server;
the distribution server includes: and the determining module is used for determining the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Optionally, the distribution server further includes:
the third receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal;
the verification module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the allocation module specifically includes:
the obtaining unit is used for obtaining free residual flow information of the communication identifier charged by adopting a charging mode of the specified service provider;
the judging unit is used for judging whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information;
and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the distribution server further includes:
the generation module is used for generating temporary verification information and sending the temporary verification information to the mobile terminal and the proxy server;
the first receiving module is specifically configured to receive, by the proxy server, the data access request carrying the authentication information and sent by the mobile terminal;
the sending module is specifically configured to verify the validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, the distribution server further includes:
and the logout module is used for logging out the temporary verification information after the proxy server prompts that the mobile terminal logs out.
Optionally, the proxy server further includes:
a fifth sending module, configured to send the initial internet surfing time, the end internet surfing time, and the consumed data traffic information of the mobile terminal to a distribution server if the proxy server prompts that the mobile terminal has logged off;
the distribution server further comprises a second statistical module used for carrying out statistics on the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, the distribution server further includes:
a sixth sending module, configured to send the free remaining traffic information to the proxy server;
the first sending module is used for judging whether the latest free residual flow of the mobile terminal is larger than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
Optionally, the method further includes: a mobile terminal as described in any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a method for a mobile terminal to access a network in a provincial flow, comprising:
sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a net surfing flow-free authority, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
receiving the compressed requested data sent by the proxy server through the network of the mobile communication operator, wherein the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the charging, by a mobile network operator, all or part of data traffic generated during a process in which the mobile terminal accesses the network through the proxy server into a specific service provider based on the traffic-free identifier includes:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specified service provider based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
Optionally, before sending the data access request to the proxy server through the network of the mobile communication carrier, the method further includes:
acquiring the proxy server distributed by a distribution server for the network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
And acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried when data transmission is carried out in the network access process, and the preset label is the flow-free identifier.
Optionally, before the sending, to the proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
and sending the communication identification and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes the proxy server to the network access process after verifying that the communication identification has the traffic-free authority based on the identity authentication information.
Optionally, before the sending, to the proxy server, the data access request for accessing the network through the network of the mobile communication carrier, the method further includes:
receiving temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the data access request for accessing the network to the proxy server through the network of the mobile communication operator specifically includes:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
Optionally, a part of data traffic generated in a process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
Optionally, the crediting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
According to another aspect of the present invention, there is provided a mobile terminal including:
a seventh sending module, configured to send a data access request to a proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to enable the proxy server to send the data access request to a resource compression server, where the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
a fourth receiving module, configured to receive, through the network of the mobile communications carrier, the compressed requested data sent by the proxy server, where the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the charging, by a mobile network operator, all or part of data traffic generated during a process in which the mobile terminal accesses the network through the proxy server into a specific service provider based on the traffic-free identifier includes:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
Optionally, the mobile network operator adds all or part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server to a specified service provider based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
Optionally, the mobile terminal further includes: a first obtaining module, configured to obtain the proxy server allocated by a distribution server for the network access process, where an IP address of the proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And the second acquisition module is used for acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier.
Optionally, the mobile terminal further includes:
an eighth sending module, configured to send the communication identifier and the authentication information of the mobile terminal to a distribution server before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, so that the distribution server allocates the proxy server to the network accessing process after verifying that the communication identifier has the traffic exemption permission based on the authentication information.
Optionally, the mobile terminal further includes:
a third obtaining module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic exemption right;
the seventh sending module is specifically configured to:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
Optionally, a part of data traffic generated in a process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
Optionally, the crediting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
According to the method for saving the stream access network of the mobile terminal, provided by the invention, a data access request is sent to a proxy server through a network of a mobile communication operator, the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a traffic-free access right to the internet, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from the resource server and compress the requested data; receiving compressed requested data sent by a proxy server through a network of a mobile communication operator, wherein the compressed requested data is sent to the proxy server by a resource compression server; the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier. That is to say, when the mobile terminal accesses the network, the data traffic consumed by the specified service provider can be consumed wholly or partially, and the data traffic of the mobile terminal does not need to be consumed partially or completely, so that the technical problem that a large amount of traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect of reducing the data traffic consumed when the mobile terminal accesses the network is achieved; therefore, the enthusiasm of the user for accessing the network can be obviously improved, so that the wide spread of the network content on the Internet is facilitated;
and the scheme compresses the requested data and transmits the compressed requested data to the mobile terminal after obtaining the requested data, so that the response speed is improved, and the data traffic consumed by a specified service provider can be reduced.
In the scheme, after the distribution server determines that the mobile terminal has the traffic-free authority through the communication identifier and the identity authentication information of the mobile terminal, the proxy server for the mobile terminal to access the network in a traffic-free manner is allocated to the mobile terminal, so that a user who is not the mobile terminal can be prevented from falsely using the free traffic of the mobile terminal;
in addition, in the embodiment of the invention, the distribution server distributes the proxy server to the mobile terminal when determining that the free residual flow of the communication identification is greater than the preset amount, so that the free data flow provided by the specified service provider to the mobile terminal can be accurately controlled;
in addition, in the embodiment of the invention, when the proxy server prompts that the mobile terminal logs out, the distribution server logs out the temporary authentication information, so that the temporary authentication information can be ensured to be used only in a process of accessing a network once, and a user who is not the mobile terminal can be further prevented from falsely using the free flow of the mobile terminal.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method for a mobile terminal to access a network in a flow-saving manner and the mobile terminal, which are used for solving the technical problem that a large amount of data flow of the mobile terminal needs to be consumed when the mobile terminal in the prior art accesses the network.
An embodiment of the present invention provides an interaction method for a provincial flow to access a network, as shown in fig. 1, which is an interaction diagram of the method, and devices related to the method include: the system comprises a mobile terminal, a distribution server, a proxy server, a resource compression server and a resource server, wherein the mobile terminal is, for example: mobile phones, tablet computers, and the like, and a user of the mobile terminal is a terminal user; the distribution server is mainly used for providing identity authentication for the mobile terminal and selecting the proxy server; the proxy server is mainly used for providing network access service for the mobile terminal with the internet surfing flow-free authority; the resource compression server is mainly used for compressing uplink data sent by the mobile terminal and downlink data sent to the mobile terminal; resource servers are typically provided by network content providers for providing rich and diverse network contents to end users using network resources of the internet, such as: videos, web pages, pictures, and the like.
Referring to fig. 1, the method for interworking with the provincial flow access network includes the following steps:
step S110: the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority;
step S120: the proxy server sends the data access request to a resource compression server;
step S130: the resource compression server acquires the requested data from the resource server based on the data access request and compresses the requested data;
step S140: the proxy server receives compressed requested data sent by the resource compression server;
step S150: the proxy server sends the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
As an optional implementation manner, before the proxy server receives a data access request of the mobile terminal to access the network through the network of the mobile communication operator, the mobile terminal needs to determine the proxy server providing the network access service for the mobile terminal, wherein the mobile terminal may directly send its communication identifier to the distribution server, the distribution server determines whether the communication identifier has the traffic exemption right, when the distribution server determines that the communication identifier has the traffic exemption right, the proxy server is allocated to the mobile terminal, otherwise, the proxy server is not allocated to the mobile terminal.
As another alternative embodiment, to prevent the communication identifier of the mobile terminal from being misused and improve the security of network access, the process of determining the proxy server continues to refer to fig. 1, which includes the following steps:
step S101: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal;
step S102: the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal;
step S103: and when determining that the communication identifier has the traffic-free right, the distribution server allocates a proxy server for the mobile terminal.
For example, before step S101, the mobile terminal may bind, in advance, the communication identifier of the mobile terminal in the distribution server by means of registration or the like, for example: the mobile terminal can firstly apply for a traffic-free service from a distribution server, after receiving the application from the mobile terminal, the distribution server determines whether to distribute a traffic-free authority to the communication identifier of the mobile terminal according to some preset conditions (for example, whether the software initiating the application is predetermined software, whether the mobile terminal uses the predetermined software, whether the communication identifier is registered in a specified service provider, and the like), and if the distribution server determines to distribute the traffic-free authority to the mobile terminal, the distribution server sends a UserKey (user password) to the mobile terminal as identity authentication information; further, in order to ensure that the communication identifier of the mobile terminal is not falsely used by other users, the distribution server may first send a verification code to the communication identifier, and the user of the mobile terminal may distribute the authentication information to the mobile terminal only after successfully filling the verification code.
In addition, when providing the flow-free service for the network access process of the mobile terminal, the distribution server may have no traffic limitation, or may have traffic limitation, where the absence of traffic limitation means that no matter how much traffic is used by the mobile terminal in the network access process, the flow-free right is provided to the mobile terminal as long as the flow-free requirement is met, for example: the distribution server can set the VIP identity for the terminal identification of some mobile terminals (such as mobile terminals produced by a specific manufacturer, mobile terminals using a specific type of operating system and the like), and further provide the terminal identification of the mobile terminals with infinite free flow; and there may be a traffic restriction for the non-VIP user, where the presence of the traffic restriction refers to allocating a specific traffic for each predetermined period of time for the mobile terminal, and if the total traffic that the mobile terminal cumulatively uses in accessing the network does not exceed the specific traffic, it is allocated with a traffic exemption right if it meets the traffic exemption requirement, and if the total traffic that the mobile terminal uses in accessing the network exceeds the specific traffic, it is not allocated with the traffic exemption right, for example; 30M free traffic, 50M free traffic, etc. may be allocated for a mobile terminal for one month.
In an alternative embodiment, if there is a traffic limit for the free traffic allocated to the mobile terminal by the distribution server, the user of the mobile terminal may also obtain the data traffic rewarded by the distribution server through some activities, such as: by the mobile terminal clicking a predetermined advertisement, clicking a predetermined web page, downloading a predetermined APP, etc., in this case, the distribution server may increase the data traffic allocated to the mobile terminal, e.g., 30M, 40M, etc. Further if the mobile terminal needs to access the network, for example: when the operation that the user of the mobile terminal starts the browser is detected, the mobile terminal sends the communication identification and the authentication information of the mobile terminal to the distribution server.
In step S102, the distribution server determines whether the received authentication information of the communication identifier matches with the pre-stored authentication information of the communication identifier, and if so, indicates that the corresponding mobile terminal has the traffic exemption permission, otherwise indicates that the corresponding mobile terminal does not have the traffic exemption permission.
In step S103, if the distribution server does not have flow limitation for the traffic-free permission allocated to the mobile terminal, the distribution server may directly allocate a proxy server to the mobile terminal after determining that the mobile terminal has the traffic-free permission; if the distribution server has flow limitation for the traffic-free permission allocated to the mobile terminal, the distribution server needs to judge whether the remaining traffic exceeds a threshold value after determining that the mobile terminal has the traffic-free permission, and allocates a proxy server to the mobile terminal when the remaining traffic exceeds the threshold value, wherein the processing process specifically comprises the following steps: the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; judging whether the free remaining traffic of the communication identifier is greater than a preset amount (such as a threshold value) based on the free remaining traffic information; and when the free residual flow is larger than the preset amount, distributing the proxy server for the mobile terminal.
In general, one of the functions of the distribution server is to count the free remaining traffic information of the communication identifier, where the preset amount is, for example: 0M, 1M, 512K and the like, wherein if the free residual flow is larger than the preset amount, the flow-free residual flow can meet the network access in the normal condition, so that a proxy server can be allocated to the flow-free residual flow; and if the free residual flow is not greater than the preset amount, the situation is shown that the free residual flow cannot meet the current network access under the normal condition, so that the proxy server is not allocated to the free residual flow.
When the distribution server allocates the proxy server to the mobile terminal, the distribution server may select a proxy server closest to the physical location of the mobile terminal from the plurality of proxy servers to allocate to the mobile terminal, may select a proxy server with the lightest network load to allocate to the mobile terminal, or select a proxy server with the lowest network delay to allocate to the mobile terminal, or the like, or may select the distribution server by taking comprehensive consideration of at least two policies among the plurality of distribution policies, and as to what manner the distribution server adopts to allocate the proxy server to the mobile terminal, the embodiments of the present invention are not listed in detail and are not limited.
As an optional embodiment, under the condition that the traffic exemption authority allocated for the mobile terminal has no traffic limitation, if the mobile terminal has the traffic exemption authority, the distribution server may generate temporary verification information (token) for the mobile terminal to access the network at this time; or, in a case where there is traffic limitation for the traffic exemption authority allocated to the mobile terminal, if the mobile terminal has the traffic exemption authority and the free remaining traffic of the mobile terminal is greater than a preset amount, the distribution server may also generate the temporary verification information.
In addition, in order to ensure that the subsequent mobile terminal can connect to the proxy server, the distribution server needs to send some data to the proxy server, and four data are listed below for description, and of course, in the implementation process, the following four cases are not limited. Firstly, a distribution server sends a communication identifier of a mobile terminal to a proxy server; the distributing server sends the communication identification and the temporary verification information of the mobile terminal to the proxy server; thirdly, the distribution server sends the communication identification and the free residual flow of the mobile terminal to the proxy server; and fourthly, the distribution server sends the communication identification, the free residual flow and the temporary verification information of the mobile terminal to the proxy server.
In addition, address information of the proxy server also needs to be provided for the mobile terminal, wherein the address information of the proxy server can be directly sent to the mobile terminal by the distribution server; the proxy server may also send the communication identifier of the mobile terminal to the mobile terminal through the communication identifier of the mobile terminal after receiving the communication identifier of the mobile terminal. As shown in step S104 of fig. 1, a process of the mobile terminal to which the address information of the proxy server is transmitted by the distribution server.
Based on the steps, a traffic exempting channel between the mobile terminal, the proxy server, the resource compression server and the resource server can be established, and after the traffic exempting channel is established, when the mobile terminal accesses the network through the network of the mobile communication operator, the mobile communication operator can count the consumed traffic into a specified service provider.
In step S110, if the distribution server does not allocate the temporary verification information for the current network access process in steps S101 to S103, the mobile terminal directly sends the data access request to the proxy server; if the distribution server distributes the temporary verification information for the network accessing process in the steps S101 to S103, the mobile terminal sends the data access request carrying the temporary verification information to the proxy server. In step S120, the proxy server may directly send the data access request sent by the mobile terminal to the resource compression server after receiving the data access request, and based on different information sent to the proxy server before the distribution server, the proxy server may also perform some verification processes first, which is described below by listing three verification processes, but of course, in the specific implementation process, the data access request is not limited to the following three cases.
The data sent by the distribution server to the proxy server comprises the communication identification and the temporary verification information of the mobile terminal, in this case, the data access request sent by the mobile terminal also comprises the temporary verification information, and the proxy server sends the data access request to the resource compression server when the data access request is verified to be legal through the temporary verification information. The proxy server matches the temporary verification information sent by the mobile terminal with the temporary verification information sent by the distribution server, if the matching is successful, the data access request is legal, otherwise, the data access request is illegal. By the scheme, the security of the network access process can be ensured.
If the data sent by the distribution server to the proxy server comprises the communication identification of the mobile terminal and the free residual flow information, the proxy server firstly judges whether the latest free residual flow of the mobile terminal is greater than the preset amount based on the free residual flow information after receiving the data access request; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server, and if the latest free residual flow information is not larger than the preset amount, informing the mobile terminal to allow the mobile terminal to access the resource server through another access path (for example, directly sending the data access request to the resource server, or directly sending the data access request to the resource compression server, and the like). Through the scheme, the specified service provider can provide a specific amount of free data flow to the mobile terminal.
If the distribution server judges that the free residual flow of the mobile terminal is larger than the preset amount, the proxy server does not need to judge whether the latest free residual flow (namely the free residual flow sent by the distribution server) is larger than the preset amount when receiving the data access request for the first time; the data traffic consumed by the network access request is directly counted, and then the data traffic is subtracted from the free residual traffic sent by the distribution server, so that the latest free data traffic can be obtained; whether to send the data access request to the resource compression server can be determined subsequently by judging whether the latest free data flow is larger than a preset amount.
In addition, the proxy server can also count the data traffic information consumed by the mobile terminal according to a preset counting period, and acquire the latest free residual traffic information with traffic-free permission of the mobile terminal.
For example, the preset statistical period may be, for example, a preset statistical time interval, the preset statistical time interval may be, for example, 30s, 50s, 1min, and the like, and the proxy server may set a timer, acquire, every time the preset time interval arrives, the data traffic consumed by the mobile terminal counted in the current time interval, and obtain the latest free remaining traffic information of the mobile terminal based on the data traffic statistics.
The preset statistical period is, for example: the method comprises the steps that preset statistical flow is 512k, 1M and the like, a proxy server can monitor data flow consumed by the mobile terminal, and when the preset statistical flow is consumed, the latest free residual flow information of the mobile terminal is determined according to the preset statistical flow.
Through the scheme, the latest residual flow information of the mobile terminal can be ensured to be obtained in time.
Of course, after the proxy server counts the data traffic information consumed by the mobile terminal in the counting period, the proxy server may transmit the data traffic information to the distribution server, and the distribution server may count the latest free remaining traffic information of the mobile terminal.
After obtaining the data traffic information consumed by the mobile terminal, the distribution server can also send the data traffic information to the mobile terminal or inform the data traffic information when the mobile terminal inquires; or after determining the latest free remaining traffic information of the mobile terminal, the distribution server can also send the latest free remaining traffic information to the mobile terminal, so that the mobile terminal can further know the current traffic use condition, and then a better network access strategy is selected. Or upon inquiry by the mobile terminal.
And thirdly, the data sent to the proxy server by the distribution server comprises the communication identification of the mobile terminal, the free residual flow information and the temporary verification information, and under the condition, the proxy server sends the data access request to the resource compression server after verifying that the data access request is legal through the temporary verification information and the latest free residual flow information is larger than the preset amount. By the scheme, the security of the network access process can be ensured, and the appointed service provider can be ensured to provide the preset amount of free flow to the mobile terminal. In step 130, after receiving the data access request sent by the proxy server, the resource compression server sends the data access request to the resource server, and further obtains the requested data from the resource server; the resource compression server compresses the requested data after acquiring the requested data from the resource server, and in the specific implementation process, the requested data may be compressed in a plurality of ways, which are described below by way of example, but is not limited to the following two cases in the specific implementation process.
First, the resource compression server compresses the requested data by lossy compression.
For example, the lossy compression is also called destructive compression, that is, compression in which secondary information data is compressed, some quality is sacrificed to reduce the data amount, and the compression ratio is increased, wherein multiple lossy compression methods can be adopted for the requested data, and two of them are listed below for description, and of course, in the specific implementation process, the method is not limited to the following two cases.
When the requested data includes image data, the resource compression server reduces the display size of the image data from a first display size to a second display size suitable for the display unit of the mobile terminal.
For example, in order to be able to adapt to display units of various sizes, the image data located in the resource server is usually large in first display size, but the screen of the mobile terminal is usually small in size, so that the display size of the image data can be reduced to the second display size, and thus the data traffic consumed in the image data transmission process can be reduced, and the transmission rate of the image data can be improved.
And when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the redundant codes to the mobile terminal.
For example, the redundancy code is, for example: note statements in the code, in the code writing stage, a programmer usually adds some note statements in the code for convenience of reading the code, and these note statements have no influence on code analysis, so the resource compression server can delete the note statements in the code data included in the requested data.
Second, the resource compression server compresses the requested data in a lossless compression manner.
For example, lossless compression is to optimize the data storage mode of a file, and use an algorithm to represent repeated data information, so that the file can be completely restored without affecting the content of the file, and for digital images, no loss of image details is caused.
In step S150, the data in the process of accessing the network by the mobile terminal includes uplink data and downlink data, where the uplink data is data (e.g., a data access request) sent by the mobile terminal to the resource server, and the downlink data is data (e.g., requested data) sent by the resource server to the mobile terminal, where the data traffic of at least one of the uplink data and the downlink data is counted in the data traffic consumed by the designated service provider.
If the appointed service provider provides the uplink data flow-free for the mobile terminal, the data access request sent by the mobile terminal to the proxy server also carries a flow-free identifier, and the data flow corresponding to the data access request is counted in the appointed service provider based on the flow-free identifier; if the specified service provider provides the mobile terminal with the downlink data flow-free, the compressed requested data will carry a flow-free identifier (for example, the proxy server adds the flow-free identifier), and the data flow of the compressed requested data can be included in the specified service provider by the mobile communication operator based on the flow-free identifier.
The flow-free identifier may be a plurality of different forms of flow-free identifiers, and two of them are listed below for description, and certainly, in the specific implementation process, the flow-free identifier is not limited to the following two cases.
The method comprises the steps that after a proxy server receives a communication identifier of a mobile terminal sent by a distribution server and before a data access request sent by the mobile terminal is received, a preset label is sent to the mobile terminal, the preset label is carried when the mobile terminal accesses a network for data transmission, and the preset label is a flow-free identifier.
And secondly, the IP address of the proxy server distributed by the distribution server for the mobile terminal is a preset IP address, and the preset IP address is the flow-free identifier.
In the specific implementation process, data traffic in the process of accessing the network can be counted through a gateway arranged between the mobile terminal and the proxy server.
For the condition that the flow-free identifier is a preset IP, after receiving a data access request sent by a mobile terminal, a corresponding gateway (or a charging system connected with a corresponding network) judges whether the IP of a next node corresponding to the data access request is the preset IP, if so, the data flow of the next node is counted into the data flow of a specified service provider, after receiving the requested data sent by a proxy server, the corresponding gateway (or the charging system connected with the corresponding network) judges whether the IP of the proxy server is the preset IP, and if so, the data flow of the proxy server is counted into the data flow of the specified service provider; in the case that the traffic-free identifier is a preset tag, after receiving a data access request (or receiving requested data sent by a proxy server) sent by a mobile terminal, a corresponding gateway (or a charging system connected to a corresponding network) determines whether the data access request (or the requested data) contains the preset tag, and if the data access request (or the requested data) contains the preset tag, the data traffic of the gateway is added to the data traffic of a specified service provider.
In the specific implementation process, the fact that all data traffic in the process of the mobile terminal accessing the network is included in the specified service provider means that in the process of accessing the network, the mobile network operator determines the data traffic in the process of accessing the mobile terminal and then all the data traffic is included in the specified service provider.
However, a mobile network operator may count part of data traffic generated during the mobile terminal accessing the network through the proxy server into a specific service provider based on the traffic-free identifier, and there may be a plurality of cases, three of which are listed below for introduction, and certainly, in the specific implementation process, the cases are not limited to the following three cases.
First, a specific percentage of data traffic during a mobile terminal's network access is accounted for by a designated service provider.
For example, the specific ratios are, for example: 50%, 70%, etc., wherein when the mobile terminal has a traffic exemption right (for example, the data transmission carries a traffic exempt identifier) during accessing the network, the corresponding gateway (or a charging system connected to the corresponding network) credits a specific proportion of the gateway to a specified service provider, and credits the rest of the gateway to the communication identifier, for example: assuming that the mobile terminal consumes 10M of traffic in the process of accessing the network at this time, and the specific proportion is 50%, the charging system counts 5M of traffic into the designated service provider during charging, and counts the rest 5M of traffic into the communication identifier of the mobile terminal. Of course, the above data are by way of example only and not by way of limitation.
Second, a certain amount of data traffic during the mobile terminal's access to the network is accounted for by the designated service provider.
For example, the specific number is, for example: 10M, 20M, etc., wherein when the mobile terminal has a traffic exemption right in the process of accessing the network, the corresponding gateway (or a charging system connected with the corresponding network) judges whether the data traffic in the process of accessing the network exceeds the specific quantity after the process of accessing the network is finished, and if the data traffic does not exceed the specific quantity, all the data traffic is counted in a specified service provider; if the number exceeds a certain number, no more than a portion of the data traffic is included in the designated service provider and more than a portion is included in the communication identification of the mobile terminal.
Third, the data traffic of the specific content during the mobile terminal's access to the network is credited to the designated service provider.
For example, the specific content is, for example: when the mobile terminal has a traffic-free right in a network access process, the corresponding gateway (or a charging system connected with the corresponding network) acquires data transmitted in the network access process, then determines data such as characters and pictures from the data transmitted in the network access process, and records the corresponding data traffic into a specified service provider; while for other types of content, for example: and the video records the corresponding data flow into the communication identifier of the mobile terminal.
As a possible implementation manner, the method for accounting in the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
For example, since the corresponding data traffic is charged to the specified service provider, and the mobile communication operator does not perform repeated charging for one-time network access process, the corresponding data traffic is not charged to the identifier of the mobile terminal, and therefore, when the mobile communication operator charges, the charge generated by the mobile communication operator is charged to the charge consumed by the account of the specified service provider, so as to charge the specified service provider.
As an alternative embodiment, with continued reference to fig. 1, the method further includes:
step S160: the proxy server judges whether any data access request of the mobile terminal is received within a preset time period;
step S170: and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal is logged out.
For example, the preset time period is, for example: 10min, 30min, 40min and so on, if the proxy server does not receive any data access request sent by the mobile terminal within the preset time period, it indicates that the process of the mobile terminal accessing the network is finished, so a corresponding prompt message can be generated. Further, the proxy server may also send the hint information to the distribution server after generating the hint information.
In this case, if the temporary authentication information is previously allocated to the current network access procedure by the distribution server, the distribution server cancels the temporary authentication information based on the prompt information transmitted from the proxy server, and the proxy server also cancels the temporary authentication information. By the scheme, the distributed temporary verification information can be ensured to be only used as the verification information in the network access process at this time, and new temporary verification information still needs to be generated in the next network access, so that the security of the network access is improved.
As an alternative embodiment, if the proxy server prompts that the mobile terminal has logged off, the method further comprises:
the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the distribution server;
and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
For example, the proxy server may send the distribution server the information shown in table 1:
TABLE 1
Starting time
|
End time
|
Consumed data traffic information
|
2015-4-15 14:23
|
2015-4-15 14:44
|
1.6M |
The total free data traffic distributed by the distribution server to the mobile terminal is assumed to be: 30M, and the mobile terminal has consumed 20M traffic before the network access, it may be determined that the free remaining traffic of the mobile terminal after the network access process is as follows: 10M-1.6M ═ 8.4M. Of course, the above data traffic is by way of example only and not by way of limitation.
In an alternative implementation manner, the mobile terminal, the proxy server, the resource compression server, and the resource server may all use the same transmission protocol for data transmission, for example: all using the Http protocol, all using the Http2 protocol, etc.
In another alternative embodiment, the mobile terminal, the proxy server, the resource compression server, and the resource server may also use different transmission protocols for data transmission, for example: in the case that the first transmission protocol is adopted for transmission between the mobile terminal and the proxy server, and the second transmission protocol is adopted for compression and data transmission between the proxy server and the resource compression server, the data transmission rate can be further improved because the second transmission protocol can compress the data, and the reason that the first transmission protocol is still adopted between the mobile terminal and the proxy server is to prevent the flow-free identification contained in the data (such as data access request and requested data) passing through the mobile terminal and the proxy server from being identified by the gateway (or the charging system) which cannot be charged through the compression of the second transmission protocol, so that the scheme can improve the data transmission rate and ensure that the flow-free identification can be identified by the network (or the charging system). For example, the first transmission protocol is, for example: http protocol, or other protocols that do not require compression of the transmitted data and can be recognized by the gateway of the mobile communications operator; the second transmission protocol is for example: the Spdy protocol, or other protocols capable of compressing the transmitted data.
In addition, in the specific implementation process, the mobile terminal can also send uplink data (such as a data access request) to the resource compression server after lossless compression, and send the uplink data to the resource server after decompression by the resource compression server; if the received requested data is compressed requested data and the resource compression server performs lossless compression on the requested data, the mobile terminal may also perform decompression processing on the compressed requested data.
The distribution server and the proxy server introduced in the embodiment of the invention can be two servers with completely independent physical positions; or two different function modules of the same server, and likewise, two servers with completely independent positions can be arranged between the proxy server and the resource compression server, or two different function modules of the same server, wherein, because the function of the resource compression server is more complex and the function of the proxy server is simpler, if the proxy server and the resource compression server are arranged as two servers with completely independent positions, the proxy server and the resource compression server can be conveniently expanded and used respectively, in addition, the distribution server, the proxy server and the resource compression server can be three completely independent servers or three different functional modules of the same server, the embodiment of the present invention is not limited to what kind of composition structure is specifically adopted for the distribution server, the proxy server, and the resource compression server.
According to the interaction method for the provincial flow access network provided by the embodiment of the present invention, an embodiment of the present invention further provides a method for the provincial flow access network, please refer to fig. 2, which includes:
step S201: the proxy server receives a data access request of the mobile terminal for accessing the network through the network of the mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has the internet surfing flow-free authority;
step S202: the proxy server sends the data access request to the resource compression server so that the resource compression server acquires the requested data from the resource server based on the data access request and compresses the requested data;
step S203: the proxy server receives compressed requested data sent by the resource compression server;
step S204: the proxy server sends the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the method further comprises: the resource compression server compresses the requested data in a lossy compression mode; and/or the resource compression server compresses the requested data in a lossless compression mode.
Optionally, the resource compression server compresses the requested data in a lossy compression manner, including: when the requested data contains image data, the resource compression server reduces the display size of the image data from a first display size to a second display size adaptive to a display unit of the mobile terminal; and/or when the requested data contains code data, the resource compression server removes redundant codes in the code data and then sends the code data to the mobile terminal.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, including: the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into a specified service provider based on the flow-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, the method further comprises: the proxy server sends a preset label to the mobile terminal, the preset label is carried when data transmission is carried out in the process that the mobile terminal accesses a network, and the preset label is a flow-free identifier; or the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier.
Optionally, the method further comprises: and the proxy server counts the data traffic information consumed by the mobile terminal according to a preset counting period to obtain the latest free residual traffic information with the traffic-free permission of the mobile terminal.
Optionally, the method further comprises: the proxy server sends the data traffic information consumed by the mobile terminal to the distribution server; and the distribution server determines the latest free residual flow information with the flow-free permission of the mobile terminal based on the data flow information consumed by the mobile terminal.
Optionally, the method further includes: the method comprises the steps that a distribution server receives a communication identifier and identity authentication information of a mobile terminal; the distribution server verifies whether the communication identification has the traffic-free permission or not based on the communication identification and the identity verification information of the mobile terminal; and when determining that the communication identifier has the traffic-free right, the distribution server allocates a proxy server for the mobile terminal.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, when determining that the communication identifier has the traffic exemption right, the distribution server allocates a proxy server to the mobile terminal, which specifically includes: the distribution server acquires free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; the distribution server judges whether the free residual flow of the communication identification is larger than a preset amount or not based on the free residual flow information; and when the free residual flow is larger than the preset amount, the distribution server distributes the proxy server for the mobile terminal.
Optionally, the method further includes: the distribution server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server; the method comprises the following steps that a proxy server receives a data access request of a mobile terminal for accessing a network through a network of a mobile communication operator, and specifically comprises the following steps: the proxy server receives a data access request which is sent by the mobile terminal and carries identity authentication information; the proxy server sends the data access request to the resource compression server, and the method comprises the following steps: the proxy server verifies the validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, after the proxy server prompts that the mobile terminal has logged off, the distribution server logs off the temporary authentication information.
Optionally, if the proxy server prompts that the mobile terminal has logged off, the method further includes: the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the distribution server; and the distribution server counts the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, after the proxy server is allocated to the mobile terminal, the method further includes: the distribution server sends the free residual flow information to the proxy server; the method for sending the data access request to the resource compression server by the proxy server specifically comprises the following steps: after receiving the data access request, the proxy server judges whether the latest free residual flow of the mobile terminal is greater than a preset amount or not based on the free residual flow information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
According to the interaction method for the provincial flow access network provided by the embodiment of the present invention, an embodiment of the present invention further provides a proxy server, please refer to fig. 3, which includes:
a first receiving module 30, configured to receive a data access request of a mobile terminal accessing a network through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission to surf the internet;
a first sending module 31, configured to send the data access request to the resource compression server, so that the resource compression server obtains the requested data from the resource server based on the data access request and compresses the requested data;
a second receiving module 32, configured to receive the compressed requested data sent by the resource compression server;
a second sending module 33, configured to send the compressed requested data to the mobile terminal through the network of the mobile communication operator;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, including: the data access request sent by the mobile terminal comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into a specified service provider based on the flow-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, the proxy server further includes: a third sending module 34, configured to send a preset tag to the mobile terminal, where the preset tag is carried when the mobile terminal performs data transmission in a network access process, and the preset tag is a traffic-free identifier; or the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier.
According to another aspect of the present invention, there is provided a network access system, referring to fig. 4, including a proxy server and a resource compression server according to any embodiment of the present invention, the resource compression server includes a first compression module 40, configured to compress requested data in a lossy compression manner; and/or the presence of a gas in the gas,
and a second compression module 41, configured to compress the requested data in a lossless compression manner.
Optionally, the first compression module 40 is configured to: when the requested data contains image data, reducing the display size of the image data from a first display size to a second display size adapted to a display unit of the mobile terminal; and/or when the requested data contains code data, removing redundant codes in the code data and then sending the code data to the mobile terminal.
Optionally, the proxy server further includes: the first statistical module 35 is configured to count data traffic information consumed by the mobile terminal according to a preset statistical period, and obtain the latest free remaining traffic information with a traffic-free permission of the mobile terminal.
Optionally, the system further comprises: a distribution server; the proxy server further includes: a fourth sending module 36, configured to send the data traffic information consumed by the mobile terminal to the distribution server; a distribution server, comprising: and the determining module 50 is configured to determine, based on the data traffic information consumed by the mobile terminal, the latest free remaining traffic information that the mobile terminal has the traffic-free right.
Optionally, the distribution server further includes: a third receiving module 51, configured to receive a communication identifier and authentication information of the mobile terminal; the verification module 52 is configured to verify whether the communication identifier has a traffic exemption right based on the communication identifier and the authentication information of the mobile terminal; and the allocating module 53 is configured to allocate a proxy server to the mobile terminal when it is determined that the communication identifier has the traffic exemption right.
Optionally, the mobile terminal and the proxy server transmit data through a first transmission protocol; and/or the proxy server and the resource compression server compress and transmit data through a second transmission protocol, wherein the second transmission protocol is different from the first transmission protocol.
Optionally, the first transmission protocol specifically includes: the Http protocol; the second transmission protocol specifically includes: spdy protocol.
Optionally, the allocating module 53 specifically includes: the acquiring unit is used for acquiring free residual flow information of the communication identifier charged by adopting a charging mode of a specified service provider; the judging unit is used for judging whether the free residual flow of the communication identification is larger than the preset amount or not based on the free residual flow information; and the distribution unit is used for distributing the proxy server to the mobile terminal when the free residual flow is greater than the preset amount.
Optionally, the distribution server further includes: a generating module 54, configured to generate temporary verification information and send the temporary verification information to the mobile terminal and the proxy server;
the first receiving module 30 is specifically configured to receive, by the proxy server, a data access request carrying authentication information sent by the mobile terminal; a sending module 31, specifically configured to verify validity of the data access request based on the temporary verification information; and when the data access request is legal, sending the data access request to the resource compression server.
Optionally, the distribution server further includes: and the logout module 55 is used for logging out the temporary authentication information after the proxy server prompts that the mobile terminal logs out.
Optionally, the proxy server further includes: a fifth sending module 37, configured to send the initial internet surfing time, the end internet surfing time, and the consumed data traffic information of the mobile terminal to the distribution server if the proxy server prompts that the mobile terminal has logged off; the distribution server further comprises a second statistical module 56 for counting the free residual flow of the mobile terminal based on the data flow information sent by the proxy server.
Optionally, the distribution server further includes: a sixth sending module 57, configured to send the free remaining traffic information to the proxy server; a first sending module 30, configured to determine whether a latest free remaining traffic of the mobile terminal is greater than a preset amount based on the free remaining traffic information; and when the latest free residual flow information is larger than the preset amount, sending the data access request to the resource compression server.
Optionally, the method further includes: a mobile terminal as described in any of the embodiments of the present invention.
According to the interaction method for the provincial flow access network provided by the embodiment of the present invention, an embodiment of the present invention further provides a method for the mobile terminal to access the network in the provincial flow, please refer to fig. 5, which includes:
step S501: sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of a mobile terminal, and the communication identifier has an internet surfing flow-free authority so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to acquire requested data from the resource server and compress the requested data;
step S502: receiving compressed requested data sent by a proxy server through a network of a mobile communication operator, wherein the compressed requested data is sent to the proxy server by a resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, where the traffic-free identifier includes: the data access request sent to the proxy server contains a traffic-free identifier, and the data traffic corresponding to the data access request is counted in a specified service provider based on the traffic-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: when the fact that the data in the process that the mobile terminal accesses the network contain the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into a designated service provider; or the data transmission in the process that the mobile terminal accesses the network passes through the proxy server with the preset IP address, and when the mobile network operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
Optionally, before sending the data access request to the proxy server through the network of the mobile communication carrier, the method further includes: acquiring a proxy server distributed by a distribution server in a network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is a flow-free identifier; or acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is a flow-free identifier.
Optionally, before sending the data access request for accessing the network to the proxy server through the network of the mobile communication carrier, the method further includes: and sending the communication identifier and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes a proxy server for the network accessing process after verifying that the communication identifier has the traffic-free authority based on the identity authentication information.
Optionally, before sending the data access request for accessing the network to the proxy server through the network of the mobile communication carrier, the method further includes: receiving temporary verification information distributed by a distribution server for the mobile terminal, wherein the temporary verification information is distributed to the mobile terminal when the distribution server determines that the mobile terminal has a traffic-free right; sending a data access request for accessing a network to a proxy server through a network of a mobile communication operator, specifically: and the proxy server is used for containing the data access request carrying the temporary verification information so as to ensure that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: the data flow of a specific proportion is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of a specific quantity is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of the specific content during the mobile terminal accessing the network is charged to the designated service provider.
Optionally, the accounting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
According to the interaction method for the provincial flow access network provided in the embodiment of the present invention, an embodiment of the present invention further provides a mobile terminal, please refer to fig. 6, which includes:
a seventh sending module 60, configured to send a data access request to the proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free permission for surfing the internet, so that the proxy server sends the data access request to the resource compression server, and the data access request is used for the resource compression server to obtain requested data from the resource server and compress the requested data;
a fourth receiving module 61, configured to receive, through a network of a mobile communications carrier, compressed requested data sent by a proxy server, where the compressed requested data is sent to the proxy server by a resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
Optionally, the compressed requested data specifically includes: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
Optionally, the mobile network operator adds all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server to the designated service provider based on the traffic-free identifier, where the traffic-free identifier includes: the data access request sent to the proxy server contains a traffic-free identifier, and the data traffic corresponding to the data access request is counted in a specified service provider based on the traffic-free identifier; and/or data traffic of the compressed requested data is credited to the designated facilitator based on the traffic exempt identifier.
Optionally, all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: when the fact that the data in the process that the mobile terminal accesses the network contain the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into a designated service provider; or the data transmission in the process that the mobile terminal accesses the network passes through the proxy server with the preset IP address, and when the mobile network operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
Optionally, the mobile terminal further includes: a first obtaining module 62, configured to obtain a proxy server allocated by a distribution server for a network access process, where an IP address of the proxy server is a preset IP address, and the preset IP address is a traffic-free identifier; or the second obtaining module 63 is configured to obtain a preset tag allocated by the proxy server for the network access process, where the preset tag is carried during data transmission in the network access process, and the preset tag is a traffic-free identifier.
Optionally, the mobile terminal further includes: an eighth sending module 64, configured to send the communication identifier and the authentication information of the mobile terminal to the distribution server before sending the data access request for accessing the network to the proxy server through the network of the mobile communication operator, so that the distribution server allocates the proxy server to the network accessing process after verifying that the communication identifier has the traffic exempting authority based on the authentication information.
Optionally, the mobile terminal further includes: a third obtaining module 65, configured to receive temporary verification information allocated by the distribution server to the mobile terminal before sending a data access request for accessing the network to the proxy server through the network of the mobile communications operator, where the temporary verification information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has a traffic exemption right; the seventh sending module 60 is specifically configured to: and the proxy server is used for containing the data access request carrying the temporary verification information so as to ensure that the proxy server verifies the validity of the data access request based on the temporary verification information.
Optionally, part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, which specifically includes: the data flow of a specific proportion is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of a specific quantity is counted into a specified service provider in the process of accessing the network by the mobile terminal; or the data traffic of the specific content during the mobile terminal accessing the network is charged to the designated service provider.
Optionally, the accounting into the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
One or more embodiments of the invention have at least the following beneficial effects:
in the embodiment of the invention, the data access request is sent to the proxy server through the network of the mobile communication operator, the data access request comprises the communication identifier of the mobile terminal, the communication identifier has the internet surfing flow-free authority, so that the proxy server sends the data access request to the resource compression server, and the data access request is used for the resource compression server to acquire the requested data from the resource server and compress the requested data; receiving compressed requested data sent by a proxy server through a network of a mobile communication operator, wherein the compressed requested data is sent to the proxy server by a resource compression server; the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier. That is to say, when the mobile terminal accesses the network, the data traffic consumed by the specified service provider can be consumed wholly or partially, and the data traffic of the mobile terminal does not need to be consumed partially or completely, so that the technical problem that the traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect of reducing the data traffic consumed when the mobile terminal accesses the network is achieved; therefore, the enthusiasm of the user for downloading can be obviously improved, and the wide spread of the network content on the Internet is facilitated;
in the scheme, after the distribution server determines that the mobile terminal has the traffic-free authority through the communication identifier and the identity authentication information of the mobile terminal, the proxy server for the mobile terminal to access the network in a traffic-free manner is allocated to the mobile terminal, so that a user who is not the mobile terminal can be prevented from falsely using the free traffic of the mobile terminal;
in addition, in the embodiment of the invention, the distribution server distributes the proxy server to the mobile terminal when determining that the free residual flow of the communication identification is greater than the preset amount, so that the free data flow provided by the specified service provider to the mobile terminal can be accurately controlled;
in addition, in the embodiment of the invention, when the proxy server prompts that the mobile terminal logs out, the distribution server logs out the temporary authentication information, so that the temporary authentication information can be ensured to be used only in a process of accessing a network once, and a user who is not the mobile terminal can be further prevented from falsely using the free flow of the mobile terminal.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that microprocessors or Digital Signal Processors (DSPs) may be used in practice to implement some or all of the functions of some or all of the components of a mobile terminal, a proxy server, a distribution server, a resource compression server, and a network access system according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses, A1, a method for a mobile terminal to access a network in a provincial flow, which comprises the following steps:
sending a data access request to a proxy server through a network of a mobile communication operator, wherein the data access request comprises a communication identifier of the mobile terminal, the communication identifier has a net surfing flow-free authority, so that the proxy server sends the data access request to a resource compression server, and the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
receiving the compressed requested data sent by the proxy server through the network of the mobile communication operator, wherein the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
A2, the method according to a1, wherein the compressed requested data is specifically: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
A3, the method as claimed in a1, wherein the mobile network operator includes all or part of data traffic generated during the mobile terminal accessing the network through the proxy server, and the mobile network operator includes the following steps:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
A4, the method as in A3, wherein all or part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in the designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
A5, the method as claimed in a4, wherein before the sending a data access request to a proxy server through a network of a mobile communication carrier, the method further comprises:
acquiring the proxy server distributed by a distribution server for the network access process, wherein the IP address of the proxy server is a preset IP address, and the preset IP address is the flow-free identifier; or
And acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried when data transmission is carried out in the network access process, and the preset label is the flow-free identifier.
A6, the method according to any of a1-a5, wherein before the sending a data access request for accessing a network to a proxy server through a network of a mobile communication carrier, the method further comprises:
and sending the communication identification and the identity authentication information of the mobile terminal to a distribution server so that the distribution server distributes the proxy server to the network access process after verifying that the communication identification has the traffic-free authority based on the identity authentication information.
A7, the method as claimed in a6, wherein before the sending a data access request for accessing a network to a proxy server through a network of a mobile communication carrier, the method further comprises:
receiving temporary verification information distributed to the mobile terminal by the distribution server, wherein when the distribution server determines that the mobile terminal has the traffic-free right, the temporary verification information is distributed to the mobile terminal;
the sending of the data access request for accessing the network to the proxy server through the network of the mobile communication operator specifically includes:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
A8, the method according to any one of a1-a5, wherein part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
A9, the method according to any one of a1-a5, wherein the crediting into a designated facilitator comprises: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
B10, a mobile terminal, comprising:
a seventh sending module, configured to send a data access request to a proxy server through a network of a mobile communications operator, where the data access request includes a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to enable the proxy server to send the data access request to a resource compression server, where the data access request is used for the resource compression server to obtain requested data from a resource server and compress the requested data;
a fourth receiving module, configured to receive, through the network of the mobile communications carrier, the compressed requested data sent by the proxy server, where the compressed requested data is sent to the proxy server by the resource compression server;
the data transmission in the process of the mobile terminal accessing the network is marked with a flow-free identifier, and all or part of data flow generated in the process of the mobile terminal accessing the network through the proxy server is counted into a designated service provider by a mobile network operator based on the flow-free identifier.
B11, the mobile terminal as in B10, wherein the compressed requested data is specifically: passing the lossy compressed requested data; and/or by lossless compression of the requested data.
B12, the mobile terminal according to B11, wherein the mobile network operator includes all or part of data traffic generated during the process of accessing the network through the proxy server, and the mobile terminal includes the following steps:
a data access request sent to the proxy server contains a traffic-exempt identifier, and data traffic corresponding to the data access request is included in the specified service provider based on the traffic-exempt identifier; and/or the presence of a gas in the gas,
the compressed data traffic of the requested data is credited to the designated facilitator based on the traffic-exempt identifier.
B13, the mobile terminal according to B12, wherein all or part of data traffic generated during the process of the mobile terminal accessing the network through the proxy server is included in a designated service provider by the mobile network operator based on the traffic-free identifier, specifically:
when the fact that the data in the process that the mobile terminal accesses the network comprises the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network is counted into the designated service provider; or
And when the mobile network operator charges, the mobile terminal counts all or part of data traffic flowing through the preset IP address into the specified service provider.
B14, the mobile terminal according to B13, characterized in that the mobile terminal further comprises: a first obtaining module, configured to obtain the proxy server allocated by a distribution server for the network access process, where an IP address of the proxy server is a preset IP address, and the preset IP address is the traffic-free identifier; or
And the second acquisition module is used for acquiring a preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier.
B15, the mobile terminal according to any of B10-B14, characterized in that the mobile terminal further comprises:
an eighth sending module, configured to send the communication identifier and the authentication information of the mobile terminal to a distribution server before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, so that the distribution server allocates the proxy server to the network accessing process after verifying that the communication identifier has the traffic exemption permission based on the authentication information.
B16, the mobile terminal according to B15, characterized in that the mobile terminal further comprises:
a third obtaining module, configured to receive temporary authentication information allocated by the distribution server to the mobile terminal before sending a data access request for accessing a network to a proxy server through a network of a mobile communications operator, where the temporary authentication information is allocated to the mobile terminal when the distribution server determines that the mobile terminal has the traffic exemption right;
the seventh sending module is specifically configured to:
and the proxy server comprises a data access request carrying the temporary verification information so as to verify the validity of the data access request based on the temporary verification information.
B17, the mobile terminal according to any of B10-B14, wherein a part of data traffic generated during the process that the mobile terminal accesses the network through the proxy server is included in a designated service provider by a mobile network operator based on the traffic-free identifier, specifically:
the data traffic of a specific proportion is counted into the specified service provider in the process of accessing the network by the mobile terminal; or
A specific amount of data traffic is counted into the specified service provider in the process that the mobile terminal accesses the network; or
And the data traffic of the specific content in the process of accessing the network by the mobile terminal is counted to the specified service provider.
B18, the mobile terminal according to any of B10-B14, wherein said crediting to a designated service provider comprises: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.