CN111148054B - Traffic switching use method, device and storage medium - Google Patents

Traffic switching use method, device and storage medium Download PDF

Info

Publication number
CN111148054B
CN111148054B CN201911305112.7A CN201911305112A CN111148054B CN 111148054 B CN111148054 B CN 111148054B CN 201911305112 A CN201911305112 A CN 201911305112A CN 111148054 B CN111148054 B CN 111148054B
Authority
CN
China
Prior art keywords
traffic
data traffic
flow
application
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911305112.7A
Other languages
Chinese (zh)
Other versions
CN111148054A (en
Inventor
陈志文
马颖江
张轶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911305112.7A priority Critical patent/CN111148054B/en
Publication of CN111148054A publication Critical patent/CN111148054A/en
Application granted granted Critical
Publication of CN111148054B publication Critical patent/CN111148054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1432Metric aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/58Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on statistics of usage or network monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/60Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on actual use of network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/70Administration or customization aspects; Counter-checking correct charges
    • H04M15/77Administration or customization aspects; Counter-checking correct charges involving multiple accounts per user
    • H04M15/774Administration or customization aspects; Counter-checking correct charges involving multiple accounts per user per card

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to a traffic switching use method, a traffic switching use device and a storage medium, wherein the method comprises the following steps: acquiring the use rules of various data flows customized by a terminal; wherein the usage rules include: customized application usage, maximum flow restriction usage; acquiring the current available flow of various data flows customized by a terminal in real time; acquiring information of current application consuming flow in real time; determining the data traffic used for the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic; and switching the network of the terminal to the target data traffic. Through the technical scheme of this application, can effectively monitor user's flow in service to switch to reasonable data traffic package according to the in service behavior, make data traffic obtain rational use, prevent that the flow from using and exceed standard.

Description

Traffic switching use method, device and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, and a storage medium for traffic switching.
Background
The smart phone is popularized and becomes an indispensable tool in daily life of people, dual-card dual-standby becomes the standard configuration of the mobile phone of people, a user often consumes flow when using the mobile phone, the flow of most of the existing SIM cards is limited, and much flow cost is paid after the use flow of any SIM card exceeds a package meal inadvertently, so that economic loss is brought to the user.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, embodiments of the present application provide a traffic switching using method, apparatus, and storage medium.
In a first aspect, an embodiment of the present application provides a method for switching and using traffic, where the method includes:
acquiring the use rules of various data flows customized by a terminal;
wherein the usage rules include: customized application usage, maximum flow restriction usage;
acquiring the current available flow of various data flows customized by a terminal in real time;
acquiring information of current application consuming flow in real time;
determining the data traffic used for the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic;
and switching the network of the terminal to the target data traffic.
Optionally, the obtaining of the usage rule of various data flows customized by the terminal includes:
sending a data flow information acquisition request to an operator;
receiving data traffic information sent by an operator;
and acquiring the corresponding data traffic usage rule from the data traffic information.
Optionally, the obtaining, in real time, a currently available flow of various data flows customized by the terminal includes:
acquiring total flow of corresponding data flow from the data flow information;
monitoring the current usage amount of each data flow in real time;
and acquiring the current available quantity of the corresponding data traffic according to the total traffic and the current usage of each data traffic.
Optionally, the obtaining information of the current application consuming the traffic in real time includes:
and acquiring whether the current application consuming the flow is the customized application contained in the data flow of which the use rule is used by the customized application or not in real time.
Optionally, determining the data traffic used by the current application according to the usage rules of various data traffic, the current available traffic, and the information of the current application to obtain the target data traffic includes:
if the current application consuming the flow is the customized application contained in the data flow used by the customized application, determining that the target data flow used by the current application is the data flow which is used by the customized application and contains the current application and has the use rule;
if the current application consuming the traffic is not a customized application included in the data traffic whose usage rule is used by the customized application, determining the data traffic used by the current application as the data traffic whose usage rule is used by the maximum traffic limit,
and determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit according to the current available traffic of the data traffic used by each usage rule for the maximum traffic limit.
Optionally, determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit according to a current available traffic of the data traffic used by each usage rule for the maximum traffic limit includes:
and determining the target data traffic used for the current application to be the data traffic which is limited to be used by the maximum traffic and has the maximum current available traffic by the use rule.
Optionally, determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit according to a current available traffic of the data traffic used by each usage rule for the maximum traffic limit includes:
and determining the target data traffic used for the current application to be the data traffic which is used firstly according to a preset priority level in the data traffic which is used by the maximum traffic limit according to the usage rule and is not zero.
In a second aspect, an embodiment of the present application provides a traffic switching and using device, where the device includes:
the first acquisition module is used for acquiring the use rules of various data flows customized by the terminal;
wherein the usage rules include: customized application usage, maximum flow restriction usage;
the second acquisition module is used for acquiring the current available flow of various data flows customized by the terminal in real time;
the third acquisition module is used for acquiring the information of the current application consuming the flow in real time;
the judging module is used for determining the data traffic used by the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic;
and the switching module is used for switching the network of the terminal to the target data flow.
In a third aspect, an embodiment of the present application provides a terminal for traffic switching, where the terminal performs traffic switching according to any one of the foregoing methods.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having a computer program stored thereon, where the computer program, when executed by a processor, causes the processor to perform the steps of the method according to any one of the preceding claims.
In a fifth aspect, embodiments of the present application provide a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to perform the steps of the method according to any of the preceding claims.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
according to the technical scheme provided by the embodiment of the application, the target data flow switched to the terminal is determined according to the use rule of each data flow customized by the terminal, the current available flow and the current application information, the data flow currently used by the terminal is monitored and adjusted timely and efficiently, the data flow of the terminal is used reasonably, the data flow of one or more cards is reduced, the problem that the use flow of the data flow of other cards exceeds the package range is solved, and the waste of excess use flow or flow resources is avoided as much as possible.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is an application environment diagram of a traffic switching using method according to an embodiment;
fig. 2 is a flowchart illustrating a traffic switching method according to an embodiment;
fig. 3 is a block diagram of a traffic switching device according to an embodiment;
FIG. 4 is an internal block diagram of a computer device, provided in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is an application environment diagram of a traffic switching using method according to an embodiment; referring to fig. 1, the traffic switching use method is applied to a traffic switching use system. The traffic switching use system includes a terminal 100 and a server 200. The terminal 100 and the server 200 are connected through a network. The terminal 100 acquires the usage rules of various data flows customized by the terminal 100 and sent by the server 200; wherein the usage rules include: customized application usage, maximum flow restriction usage; the terminal 100 acquires the current available flow of various data flows customized by the terminal 100 and sent by the server 200 in real time; the terminal 100 acquires information of a current application consuming traffic in real time; determining the data traffic used for the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic; the terminal 100 switches the network of the terminal 100 to the target data traffic.
The terminal 100 may be a desktop terminal or a mobile terminal, and the mobile terminal may be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 200 may be implemented as a stand-alone server or as a server cluster comprising a plurality of servers. The server 200 may be a server of an operator.
Fig. 2 is a flowchart illustrating a traffic switching method according to an embodiment; referring to fig. 2, the traffic switching using method includes the following steps:
s100: and acquiring the use rules of various data flows customized by the terminal.
Wherein the usage rules include: customized application usage, maximum flow limit usage. But is not limited thereto.
Specifically, the terminal may be a mobile phone, a tablet computer, a notebook computer, or the like. The terminal needs to customize the flow to the operator when the flow is used, one terminal can customize various different data flows, and each data flow can be an independently used package.
The customized application refers to a terminal application to which data traffic corresponding to the package issued by the operator can be used, and the customized application may include, but is not limited to, a mobile phone APP (application program of game, video, music, etc.), a web page, and the like. By customized application usage is meant that the data traffic or traffic within the package is only intended for the customized application contained by the data traffic or package, or that the customized application contained by the data traffic or package may use the traffic within indefinitely without excessive usage resulting in a surcharge. If the application is an application other than the data traffic or the package, the application is charged or prohibited or restricted from using the data traffic or the traffic in the package.
The maximum flow limit use means that the data flow corresponding to the package issued by the operator has a maximum flow value, and when the use flow does not exceed the maximum flow value when the user uses various applications on the terminal, the user cannot deduct fees or is prohibited or limited to use; when the usage flow exceeds the maximum flow value when the user uses various applications on the terminal, the user is charged or prohibited or restricted from using the terminal. Maximum traffic limited use does not limit the type of application used, and typically, end applications can use the traffic.
The usage rules of various data traffics customized by the terminal can be all used by the customized application, can also be all used by the maximum traffic limitation, or can be partially used by the customized application and partially used by the maximum traffic limitation.
S200: and acquiring the current available flow of various data flows customized by the terminal in real time.
Specifically, the terminal may set to automatically send a short message or a network request to an operator to obtain a total traffic and a used traffic of various data traffic customized by the terminal, where the total traffic minus the used traffic is the current available traffic. The used traffic can also be monitored by the terminal itself.
S300: and acquiring information of the current application consuming the flow in real time.
Specifically, the current application refers to a terminal application that consumes traffic and is currently run by the terminal, and may be an application program such as a game, a video, music, or a web page. Obtaining the information of the current application can determine whether the traffic consumed by the current application can be data traffic used by the customized application according to the usage rule or only data traffic used by the application with the usage rule limited to the maximum traffic.
S400: and determining the data traffic used by the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain the target data traffic.
Specifically, the type of traffic that can be used by the current application can be determined according to the information of the current application, and it can be determined which data traffic is more reasonable to make the current application continue to run by combining the current usage rules of various data traffic and the current available traffic. Customizing the data traffic for application usage and maximum traffic limit usage sets the order of usage for priority levels according to the type of current application.
S500: and switching the network of the terminal to the target data traffic.
Specifically, after the selected target data traffic of the current application is determined to be operated, the terminal automatically switches the network of the terminal to the target data traffic, the current application operates by using the target data traffic after the switching is successful, and the terminal automatically judges and switches again after the current application is changed.
In one embodiment, step S100 specifically includes:
sending a data flow information acquisition request to an operator;
receiving data traffic information sent by an operator;
and acquiring the corresponding data traffic usage rule from the data traffic information.
Specifically, the sending data traffic information acquisition request may be in the form of a sending short message or a network request, but is not limited thereto. After the terminal sends the acquisition request, the operator receives the acquisition request and then returns the data traffic information to the terminal, and the terminal receives the data traffic information sent by the operator and obtains the usage rule corresponding to the data traffic from the data traffic information.
The terminal is customized with a plurality of data flows, each data flow is a package and corresponds to a telephone card or an SIM card or a wireless network card and the like without being limited to the above. Each data traffic can independently send a data traffic information acquisition request to a corresponding operator. The operators corresponding to various data traffic may be different or the same.
In one embodiment, step S200 specifically includes:
acquiring total flow of corresponding data flow from the data flow information;
monitoring the current usage amount of each data flow in real time;
and acquiring the current available quantity of the corresponding data traffic according to the total traffic and the current usage of each data traffic.
Specifically, the total traffic of each data traffic is set in the usage rule, the current usage of each data traffic is monitored by the terminal, and may also be monitored by the operator, and the remaining traffic, that is, the current available traffic is obtained by subtracting the corresponding current usage from the total traffic of each data traffic.
In one embodiment, step S300 specifically includes: and acquiring whether the current application consuming the flow is the customized application contained in the data flow of which the use rule is used by the customized application or not in real time.
Specifically, if the current application is a customized application included in the data traffic used by the customized application according to the usage rule, the data traffic used by the customized application by the current application has no traffic limitation, and the terminal can preferentially configure the data traffic used by the customized application for the current application, so that other data traffic is saved, the data traffic is more reasonably used and configured, and traffic resources are fully utilized.
In one embodiment, step S400 specifically includes: if the current application consuming the flow is the customized application contained in the data flow used by the customized application, determining that the target data flow used by the current application is the data flow which is used by the customized application and contains the current application and has the use rule;
and if the current application consuming the traffic is not the customized application contained in the data traffic of which the usage rule is used by the customized application, determining the data traffic used by the current application as the data traffic of which the usage rule is the maximum traffic limit, and determining the target data traffic from the data traffic of which the usage rule is the maximum traffic limit according to the current available traffic of the data traffic of which each usage rule is the maximum traffic limit.
Specifically, it may be determined whether the target data traffic employs the data traffic corresponding to the use of the customized application or the data traffic used by the maximum traffic limit according to whether the current application is the customized application. And if the current application is the customized application, preferentially adopting the use rule for the customized application, wherein the customized application comprises the data traffic of the current application. And when the current application is not the customized application, limiting the used data flow for the maximum flow by adopting the use rule.
If the usage rule is more than one type of data traffic used for the maximum traffic limit, it is determined which usage rule is to be used for the maximum traffic limit according to the currently available traffic of the data traffic used for the maximum traffic limit by each usage rule.
In one embodiment, determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit based on the current available traffic for the data traffic used by each usage rule for the maximum traffic limit comprises:
and determining the target data traffic used for the current application to be the data traffic which is limited to be used by the maximum traffic and has the maximum current available traffic by the use rule.
Specifically, among the data traffic whose usage rule is the maximum traffic limit usage, the data traffic whose currently available traffic is the largest is selected.
In one embodiment, determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit based on the current available traffic for the data traffic used by each usage rule for the maximum traffic limit comprises:
and determining the target data traffic used for the current application to be the data traffic which is used firstly according to a preset priority level in the data traffic which is used by the maximum traffic limit according to the usage rule and is not zero.
Specifically, there is a rule with the priority level used first in the data traffic whose usage rule is the maximum traffic limit, and as long as the current available traffic is not zero, the current available traffic is used first, and the data traffic used first is switched to the next data traffic whose current available traffic is not zero after the current available traffic of the data traffic used first is zero, and so on.
Fig. 3 is a block diagram of a traffic switching device according to an embodiment; referring to fig. 3, the flow switching device includes:
a first obtaining module 10, configured to obtain usage rules of various data flows customized by a terminal;
wherein the included customized application usage rules include: customized application usage, maximum flow limit usage.
And a second obtaining module 20, configured to obtain, in real time, a currently available flow of various data flows customized by the included customized application terminal.
And a third obtaining module 30, configured to obtain information of the current application consuming the traffic in real time.
And the judging module 40 is used for determining the data traffic used by the current application according to the contained usage rules of various data traffic of the customized application, the current available traffic and the information of the current application to obtain the target data traffic.
And a switching module 50, configured to switch the network of the included customized application terminal to the included customized application target data traffic.
In one embodiment, the first obtaining module 10 includes:
and the sending module is used for sending a data flow information acquisition request to an operator.
And the receiving module is used for receiving the data traffic information sent by the operator.
And the first analysis module is used for acquiring the corresponding use rule of the data traffic from the data traffic information.
In one embodiment, the second obtaining module 20 includes:
and the second analysis module is used for acquiring the total flow of the corresponding data flow from the data flow information.
And the monitoring module is used for monitoring the current usage amount of each data flow in real time.
And the calculation module is used for acquiring the current available quantity of the corresponding data flow according to the total flow and the current usage quantity of each data flow.
In one embodiment, the third obtaining module 30 is specifically configured to obtain, in real time, whether the current application consuming the traffic is a customized application included in the data traffic whose usage rule is used by the customized application.
In one embodiment, the determining module 40 is specifically configured to:
if the current application consuming the flow is the customized application contained in the data flow used by the customized application, determining that the target data flow used by the current application is the data flow which is used by the customized application and contains the current application and has the use rule;
and if the current application consuming the traffic is not the customized application contained in the data traffic of which the usage rule is used by the customized application, determining the data traffic used by the current application as the data traffic of which the usage rule is the maximum traffic limit, and determining the target data traffic from the data traffic of which the usage rule is the maximum traffic limit according to the current available traffic of the data traffic of which each usage rule is the maximum traffic limit.
In one embodiment, determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit based on the current available traffic for the data traffic used by each usage rule for the maximum traffic limit comprises: and determining the target data traffic used for the current application to be the data traffic which is limited to be used by the maximum traffic and has the maximum current available traffic by the use rule.
In one embodiment, determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit based on the current available traffic for the data traffic used by each usage rule for the maximum traffic limit comprises: and determining the target data traffic used for the current application to be the data traffic which is used firstly according to a preset priority level in the data traffic which is used by the maximum traffic limit according to the usage rule and is not zero.
The working principle of the present application is explained in a specific application scenario below. The terminal is a dual-card dual-standby mobile phone, 2 SIM cards are arranged in the mobile phone, and each SIM card corresponds to one data flow. Each SIM card of the mobile phone sends a short message or a network request to an operator to acquire data traffic information corresponding to the SIM card, wherein the data traffic information comprises usage rule information, total traffic information and used traffic information. Thereby obtaining available traffic information for each SIM card.
The 2 SIM cards of the mobile phone may all be SIM cards corresponding to data traffic whose usage rules are used by the customized application. At this time, as long as the customized application of which SIM card the current application belongs to is known, the data traffic corresponding to the SIM card can be used as the target data traffic, so as to switch the network of the mobile phone to the target data traffic. If the current application does not belong to the customized application of any SIM card, the mobile phone can close the network, so that the current application of the mobile phone can limit the data traffic of any SIM card; or simultaneously, the mobile phone sends a message to remind the user of using the flow in excess.
The 2 SIM cards of the mobile phone may all be the SIM cards corresponding to the data traffic whose usage rule is the maximum traffic limit. At this time, the data traffic corresponding to the SIM card with the largest available traffic may be selected as the target data traffic; or selecting the data traffic corresponding to the first SIM card in the preset priority level as the target data traffic, and automatically switching to the data traffic corresponding to another SIM card with the available traffic not being zero until the available traffic corresponding to the first SIM card is zero. When the data traffic of 2 SIM cards is used, the mobile phone can close the network, so that the current application of the mobile phone can limit the data traffic of any SIM card; or simultaneously, the mobile phone sends a message to remind the user of using the flow in excess.
The 2 SIM cards of the mobile phone may also be one SIM card corresponding to the data traffic whose usage rule is used by the customized application, and the other SIM card corresponding to the data traffic whose usage rule is used by the maximum traffic limit. At the moment, when the current application belongs to the customized application, the use rule is preferentially used as the data flow used by the customized application; when the current application does not belong to the customized application, the data traffic used by the usage rule is limited to the maximum traffic by priority. When any one of the data flows of the 2 SIM cards is used, the mobile phone can close the network, so that the current application of the mobile phone can limit the data flow corresponding to the SIM card with the used flow; or simultaneously, the mobile phone sends a message to remind the user of using the flow in excess.
Of course, the mobile phone may have more than 2 SIM cards, and there may be more than 2 SIM cards for switching the traffic. The principle is the same, and the detailed description is omitted here.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
FIG. 4 is an internal block diagram of a computer device, provided in one embodiment. Referring to fig. 4, the computer device may be specifically the terminal 100 in fig. 1. As shown in fig. 4, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected via a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a traffic switching usage method. The internal memory may also store a computer program, and the computer program, when executed by the processor, may cause the processor to perform the traffic switching method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the traffic switching and using apparatus provided in the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 4. The memory of the computer device may store various program modules constituting the means for processing the delayed task, such as the first obtaining module 10, the second obtaining module 20, the third obtaining module 30, the determining module 40 and the switching module 50 shown in fig. 3. The computer program formed by the program modules enables the processor to execute the steps of the traffic switching use method of the embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 4 can obtain the usage rules of various data traffics customized by the terminal through the first obtaining module 10 in the traffic switching and using apparatus shown in fig. 3. Wherein the usage rules include: customized application usage, maximum flow limit usage. The computer device can obtain the current available flow of various data flows customized by the terminal in real time through the second obtaining module 20. The computer device may acquire information of the current application consuming the traffic in real time through the third acquisition module 30. The computer device may determine the data traffic used by the current application according to the usage rules of various data traffic, the current available traffic, and the information of the current application by the decision module 40 to obtain the target data traffic. The computer device may switch the network of the terminal to the target data traffic through the switching module 50.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: acquiring the use rules of various data flows customized by a terminal; wherein the usage rules include: customized application usage, maximum flow restriction usage; acquiring the current available flow of various data flows customized by a terminal in real time; acquiring information of current application consuming flow in real time; determining the data traffic used for the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic; and switching the network of the terminal to the target data traffic.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring the use rules of various data flows customized by a terminal; wherein the usage rules include: customized application usage, maximum flow restriction usage; acquiring the current available flow of various data flows customized by a terminal in real time; acquiring information of current application consuming flow in real time; determining the data traffic used for the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic; and switching the network of the terminal to the target data traffic.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A traffic switching use method, characterized in that the method comprises:
acquiring the use rules of various data flows customized by a terminal;
wherein the usage rules include: customized application usage, maximum flow restriction usage;
acquiring the current available flow of various data flows customized by the terminal in real time;
acquiring information of current application consuming flow in real time;
the real-time obtaining of the information of the current application consuming the traffic includes:
acquiring whether the current application consuming the flow is a customized application contained in the data flow of which the use rule is used by the customized application or not in real time;
determining the data traffic used for the current application according to the use rules of the various data traffic, the current available traffic and the current application information to obtain target data traffic;
the determining the data traffic used for the current application according to the usage rules of the various data traffic, the current available traffic and the current application information to obtain the target data traffic includes:
if the current application consuming the flow is a customized application contained in the data flow used by the customized application, determining that the target data flow used by the current application is the data flow which is used by the customized application and contains the current application and has the use rule;
and switching the network of the terminal to the target data traffic.
2. The method according to claim 1, wherein the obtaining of the usage rules of various data traffics customized by the terminal comprises:
sending a data flow information acquisition request to an operator;
receiving data traffic information sent by the operator;
and acquiring the corresponding use rule of the data traffic from the data traffic information.
3. The method according to claim 2, wherein the obtaining of the currently available traffic of the various data traffic customized by the terminal in real time comprises:
acquiring total flow of corresponding data flow from the data flow information;
monitoring the current usage amount of each data flow in real time;
and acquiring the current available quantity of the corresponding data traffic according to the total traffic and the current usage of each data traffic.
4. The method of claim 3, wherein monitoring the current usage of each data traffic in real-time comprises:
and monitoring the current usage amount of each data flow in real time in an autonomous monitoring mode, or monitoring the current usage amount of each data flow in real time in an operator monitoring mode.
5. The method according to claim 1, wherein the determining the data traffic used by the current application according to the usage rules of the various data traffic, the current available traffic and the information of the current application results in a target data traffic, further comprising:
if the current application consuming the flow is not the customized application contained in the data flow used by the customized application with the use rule, determining that the data flow used by the current application is the data flow used by the maximum flow limit with the use rule;
and determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit according to the current available traffic of the data traffic used by each usage rule for the maximum traffic limit.
6. The method of claim 5, wherein determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit according to the current available traffic of the data traffic used by each usage rule for the maximum traffic limit comprises:
and determining the target data traffic used for the current application to be the data traffic which is limited to be used by the maximum traffic and has the maximum current available traffic by the use rule.
7. The method of claim 5, wherein determining the target data traffic from the data traffic used by the usage rule for the maximum traffic limit according to the current available traffic of the data traffic used by each usage rule for the maximum traffic limit comprises:
and determining the target data traffic used for the current application to be the data traffic which is used firstly according to a preset priority level in the data traffic which is used by the maximum traffic limit according to the usage rule and is not zero.
8. A traffic switching use device, the device comprising:
the first acquisition module is used for acquiring the use rules of various data flows customized by the terminal;
wherein the usage rules include: customized application usage, maximum flow restriction usage;
the second acquisition module is used for acquiring the current available flow of various data flows customized by the terminal in real time;
the third acquisition module is used for acquiring the information of the current application consuming the flow in real time;
the third obtaining module is specifically used for obtaining whether the current application consuming the flow is the customized application contained in the data flow of which the use rule is used by the customized application or not in real time;
the judging module is used for determining the data traffic used by the current application according to the use rules of various data traffic, the current available traffic and the current application information to obtain target data traffic;
a determining module, configured to determine, if the current application of the consumption traffic is a customized application included in a data traffic that is used by a customized application and has a usage rule, that a target data traffic used by the current application is a data traffic that is used by the customized application and includes the current application;
and the switching module is used for switching the network of the terminal to the target data flow.
9. A computer-readable storage medium, having a computer program stored thereon, which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1-7.
CN201911305112.7A 2019-12-17 2019-12-17 Traffic switching use method, device and storage medium Active CN111148054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911305112.7A CN111148054B (en) 2019-12-17 2019-12-17 Traffic switching use method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911305112.7A CN111148054B (en) 2019-12-17 2019-12-17 Traffic switching use method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111148054A CN111148054A (en) 2020-05-12
CN111148054B true CN111148054B (en) 2021-04-20

Family

ID=70518644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911305112.7A Active CN111148054B (en) 2019-12-17 2019-12-17 Traffic switching use method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111148054B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112398746A (en) * 2020-10-12 2021-02-23 联通智网科技有限公司 Flow control method, flow control device, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106376043A (en) * 2016-08-19 2017-02-01 北京小米移动软件有限公司 Automatic switching method and device for SIM (Subscriber Identification Module) card
CN107979693A (en) * 2017-11-20 2018-05-01 珠海市魅族科技有限公司 A kind of information processing method and device, terminal and readable storage medium storing program for executing
CN108282771A (en) * 2017-12-28 2018-07-13 努比亚技术有限公司 A kind of network access management method, mobile terminal and computer readable storage medium
CN108391025A (en) * 2018-01-30 2018-08-10 努比亚技术有限公司 A kind of network access management method, mobile terminal and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106376043A (en) * 2016-08-19 2017-02-01 北京小米移动软件有限公司 Automatic switching method and device for SIM (Subscriber Identification Module) card
CN107979693A (en) * 2017-11-20 2018-05-01 珠海市魅族科技有限公司 A kind of information processing method and device, terminal and readable storage medium storing program for executing
CN108282771A (en) * 2017-12-28 2018-07-13 努比亚技术有限公司 A kind of network access management method, mobile terminal and computer readable storage medium
CN108391025A (en) * 2018-01-30 2018-08-10 努比亚技术有限公司 A kind of network access management method, mobile terminal and computer readable storage medium

Also Published As

Publication number Publication date
CN111148054A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
WO2021142609A1 (en) Information reporting method, apparatus and device, and storage medium
CN109787908B (en) Server current limiting method, system, computer equipment and storage medium
CN109889999B (en) Flow pool management method, system and terminal of Internet of things card
CN110704177B (en) Computing task processing method and device, computer equipment and storage medium
CN110598380B (en) User right management method, device, computer equipment and storage medium
CN104219653A (en) Method and device for controlling double-card Internet access
CN111464616A (en) Method, server and storage medium for automatically adjusting number of application load services
CN111885184A (en) Method and device for processing hot spot access keywords in high concurrency scene
CN114095567A (en) Data access request processing method and device, computer equipment and medium
CN110599080A (en) Service data distribution processing method and device, computer equipment and storage medium
CN111148054B (en) Traffic switching use method, device and storage medium
CN111222861A (en) Method and device for recharging after arrearage and computing equipment
CN111190609A (en) Service processing method, device, equipment and storage medium
CN106569917A (en) Data backup method and mobile terminal
CN110891286A (en) Data flow control method and device, computer equipment and storage medium
CN111045790A (en) Virtual machine deployment method and device
CN111104142A (en) Software upgrading method and device, electronic equipment and storage medium
CN110827123A (en) Message pushing method and device, computer equipment and storage medium
CN113542256B (en) Method, device, equipment and storage medium for updating login credentials in client
CN107040892B (en) Location information acquisition method, device and the mobile terminal of mobile terminal
CN112818270A (en) Data cross-domain transfer method and device and computer equipment
US7778660B2 (en) Mobile communications terminal, information transmitting system and information receiving method
CN114040378A (en) Application arranging method and device, computer equipment and storage medium
CN114302351A (en) Short message service processing method and device, computer equipment and storage medium
CN110297650B (en) Application program upgrading method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant