CN111279752A - Monitoring method and monitoring system for data traffic of intelligent terminal - Google Patents
Monitoring method and monitoring system for data traffic of intelligent terminal Download PDFInfo
- Publication number
- CN111279752A CN111279752A CN201780095905.3A CN201780095905A CN111279752A CN 111279752 A CN111279752 A CN 111279752A CN 201780095905 A CN201780095905 A CN 201780095905A CN 111279752 A CN111279752 A CN 111279752A
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- data
- connection
- consumption
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a monitoring method and a monitoring system for data traffic of an intelligent terminal, which comprises the following steps: monitoring the consumption of data flow of the intelligent terminal within a preset time, disconnecting the data connection of the intelligent terminal when the consumption is equal to a flow threshold value, configuring a connection password for a data connection program of the intelligent terminal, capturing a pair of data connection requests input by the intelligent terminal, generating a password verification request, and starting the data connection of the intelligent terminal when capturing a first connection password consistent with the connection password. According to the invention, when the data flow consumption of the intelligent terminal reaches the preset flow threshold, the data connection program is encrypted, so that the loss caused by restarting the data connection of the intelligent terminal through misoperation of a user is avoided.
Description
The invention relates to the field of monitoring of data traffic of an intelligent terminal, in particular to a monitoring method and a monitoring system of data traffic of the intelligent terminal.
At present, most of intelligent terminals in the market can access the network, great convenience is brought to users, particularly, the coverage area of a mobile data network is continuously enlarged, and great convenience is brought to daily network use of the users. However, at present, the mobile data network still needs to pay a certain fee to the operator of the mobile data network, so that it is still necessary for the prior intelligent terminal to effectively monitor the consumption of data traffic in the intelligent terminal.
However, currently, the smart terminals in the market can only monitor the consumption of the data traffic, and automatically disconnect the data connection of the smart terminal when the consumption exceeds the usage threshold set by the user, but effective prevention is no longer provided for the data traffic reconnected after the user is overloaded, and if the user performs a wrong operation, or forgets to use the overloaded data network to reconnect the data network, a large loss is caused.
Disclosure of Invention
In order to overcome the problems, the invention provides a monitoring method and a monitoring system for data traffic of an intelligent terminal. According to the invention, when the data flow consumption of the intelligent terminal reaches the preset flow threshold, the data connection program is encrypted, so that the loss caused by restarting the data connection of the intelligent terminal through misoperation of a user is avoided.
Specifically, one aspect of the present invention provides a method for monitoring data traffic of an intelligent terminal, which includes the following steps: monitoring the consumption of data flow of the intelligent terminal within a preset time, disconnecting the data connection of the intelligent terminal when the consumption is equal to a flow threshold value, configuring a connection password for a data connection program of the intelligent terminal, capturing a pair of data connection requests input by the intelligent terminal, generating a password verification request, and starting the data connection of the intelligent terminal when capturing a first connection password consistent with the connection password.
Preferably, the step of monitoring the consumption of the data traffic of the intelligent terminal within a preset time includes acquiring an application program list with access network authority in the intelligent terminal, capturing the consumption of the data traffic of each application program in the application program list within the preset time, and calculating the consumption of the data traffic of the intelligent terminal within the preset time.
Preferably, the step of configuring a connection password for the data connection program of the intelligent terminal includes capturing a connection password input to the intelligent terminal, associating the connection password with the data connection program through encryption operation, and setting the connection password as a key for opening data connection of the intelligent terminal.
Preferably, the monitoring method further includes, after capturing a pair of connection requests input by the intelligent terminal, checking consumption of data traffic of the intelligent terminal, and when the consumption of the data traffic is smaller than the traffic threshold, opening data connection of the intelligent terminal.
Preferably, the monitoring method further includes, when the consumption amount is equal to a flow threshold, disconnecting the data connection of the intelligent terminal, locking a data connection program of the intelligent terminal, associating the data connection program of the intelligent terminal with a dial of the intelligent terminal, capturing a dial number input to the intelligent terminal, setting the dial number as an unlocking key of the data connection program of the intelligent terminal, and when a first dial number consistent with the unlocking key is captured, opening the data connection of the intelligent terminal.
Another aspect of the present invention is to provide a system for monitoring data traffic of an intelligent terminal, including a data traffic monitoring module configured to monitor consumption of data traffic of the intelligent terminal within a preset time, a first data traffic control module configured to control disconnection of a data connection of the intelligent terminal, a first encryption module configured to configure a connection password for a data connection program of the intelligent terminal, an instruction module configured to capture an operation instruction input to the intelligent terminal, a request module configured to generate a password authentication request according to the captured operation instruction input to the intelligent terminal, and a second data traffic control module configured to control opening of the data connection of the intelligent terminal.
Preferably, the data traffic monitoring module includes an application program monitoring unit that obtains an identifier list of an application program having an access network right in the intelligent terminal, a traffic obtaining unit that captures data traffic consumption of each application program in the identifier list of the application program within the preset time, and a data processing unit that calculates and obtains consumption of data traffic of the intelligent terminal within the preset time.
Preferably, the first encryption module includes an instruction unit that captures a connection password input to the intelligent terminal, and the first encryption unit associates the connection password with the data connection program through encryption operation, and sets the connection password as a key for opening data connection of the intelligent terminal.
Preferably, the monitoring system further includes a checking module, configured to check a consumption amount of the data traffic of the intelligent terminal, and generate an opening instruction when the consumption amount of the data traffic is smaller than the traffic threshold.
Preferably, the monitoring system further includes a program control module for locking the data connection program of the intelligent terminal, an association module for associating the data connection program of the intelligent terminal with a dial of the intelligent terminal, a dialing module for capturing a dialing number input to the intelligent terminal, and a second encryption module for setting the dialing number as an unlocking key of the data connection program of the intelligent terminal.
Compared with the prior art, the invention has the technical advantages that:
according to the invention, the data flow monitoring module, the encryption module and the like are arranged in the intelligent terminal, and the data connection program is encrypted and set when the data flow consumption reaches the preset flow threshold value by utilizing the cooperation of the modules, so that the loss caused by restarting the data connection of the intelligent terminal through misoperation of a user is avoided.
Fig. 1 is a schematic flow chart of a method for monitoring data traffic of an intelligent terminal according to a preferred embodiment of the present invention;
FIG. 2 is a flowchart illustrating a step of monitoring consumption of data traffic of the intelligent terminal preferably for a predetermined time according to FIG. 1;
FIG. 3 is a flowchart illustrating the steps of configuring a connection password for a data connection process of a preferred intelligent terminal according to FIG. 1;
fig. 4 is a flowchart illustrating a method for monitoring data traffic of an intelligent terminal according to another preferred embodiment of the present invention;
fig. 5 is a flowchart illustrating a method for monitoring data traffic of an intelligent terminal according to another preferred embodiment of the present invention;
FIG. 6 is a block diagram of a data traffic monitoring system of an intelligent terminal in accordance with a preferred embodiment of the present invention;
FIG. 7 is a block diagram of a preferred data traffic monitoring module consistent with FIG. 6;
FIG. 8 is a block diagram of a preferred first encryption module consistent with FIG. 6;
fig. 9 is a block diagram of a data traffic monitoring system of an intelligent terminal according to another preferred embodiment of the present invention;
fig. 10 is a block diagram of a system for monitoring data traffic of an intelligent terminal according to another preferred embodiment of the present invention.
The advantages of the invention are explained in detail below with reference to the drawings and the embodiments.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
First, it should be understood that although the terms first, second, third, etc. may be used in this disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, a first intelligent terminal may also be referred to as a second intelligent terminal, and similarly, a second intelligent terminal may also be referred to as a first intelligent terminal, without departing from the scope of the present disclosure.
At present, most of intelligent terminals in the market can access the network, great convenience is brought to users, particularly, the coverage area of a mobile data network is continuously enlarged, and great convenience is brought to daily network use of the users. However, at present, the mobile data network still needs to pay a certain fee to an operator of the mobile data network, so it is very necessary to effectively monitor the consumption of data traffic in the intelligent terminal.
In order to effectively monitor the consumption condition of the data flow of the intelligent terminal and reduce the loss caused by excessive consumption of the data flow. The invention provides a method for monitoring data traffic of an intelligent terminal. The following examples illustrate specific embodiments of the present invention.
The first embodiment is as follows:
fig. 1 is a schematic flow chart of a method for monitoring data traffic of an intelligent terminal according to a preferred embodiment of the present invention. As can be seen from the figure, the method for monitoring the data traffic of the intelligent terminal provided by this embodiment mainly includes the following steps:
-monitoring the consumption of data traffic of said intelligent terminal for a preset time
For the customized data traffic limit condition, the user may autonomously set the data traffic usage limit of his/her intelligent terminal every day or every month, which is referred to as a traffic threshold in this embodiment. According to the customization of data traffic, the traffic threshold can be x MB/day, x GB/month, etc. Therefore, in this embodiment, the intelligent terminal is provided with a data traffic monitoring module, and the data traffic monitoring module may monitor the consumption of the data traffic of the intelligent terminal every day or every month according to the setting of the user.
Specifically, referring to fig. 2, it is a schematic flow chart of the steps of monitoring consumption of data traffic of the intelligent terminal in a preset time according to fig. 1. As can be seen from the figure, in this embodiment, the step of monitoring the consumption of the data traffic of the intelligent terminal within a preset time may include the following steps:
-obtaining a list of applications with access to a network in said intelligent terminal
In this embodiment, the data traffic monitoring module of the intelligent terminal includes an application monitoring unit, which may obtain an identifier (UID) list of applications having network access rights, and since each application installed on the mobile phone does not have a network access right, it is not necessary to query traffic conditions for all applications on the mobile phone, and therefore, the UID (i.e., an application ID) list of applications having network access rights should be obtained first, so as to query traffic conditions of the applications according to the UID in the next step.
-capturing the data traffic consumption of each application in the list of applications during the preset time
In this embodiment, the data traffic monitoring module of the intelligent terminal includes a traffic obtaining unit, and is configured to obtain traffic conditions of each program, and after obtaining an application program UID list having an access network authority, query the traffic conditions according to the UIDs. In detail, for example, the Android system stores flow data of software in a directory/proc/uid _ stat/uid (software id), and to acquire the flow data, a class provided by the system may be used: TrafficStats, a class that is newly added to the system after the Android version 2.2. This class provides a variety of static methods, and corresponding data can be obtained by direct calling, the types of data returned by these methods are long, and the unit of data is Byte. If the returned value is-1, the current system version has no such invocations and belongs to the version below 2.2. The statistical range of TrafficStats includes the transmission and reception of network packets of all network interfaces. The flow information of the application program UID with access right can be obtained by calling a static method in TrafficStats, and its codes are:
int uId=info.applicationInfo.uid;
long rx=TrafficStats.getUidRxBytes(uId);
long tx ═ trafficstats. getuidtxbytes (uId); and// rx represents the number of bytes accepted by obtaining the UID, tx represents the number of bytes sent by obtaining the UID, and rx + tx is the current flow condition of the UID.
-calculating the consumption of the data traffic of the intelligent terminal in the preset time
In this embodiment, the data traffic monitoring module of the intelligent terminal further includes a data processing unit, and the data processing unit is configured to calculate and obtain consumption of the data traffic of the intelligent terminal within the preset time after obtaining traffic information of the application UID with the access right.
-disconnecting the data connection of the intelligent terminal when the consumption equals a traffic threshold,
referring to fig. 1, in this embodiment, the intelligent terminal is further provided with a first data traffic control module, which is configured to compare the consumption of the data traffic with a pre-stored traffic threshold after obtaining the consumption of the data traffic of the intelligent terminal within the preset time. When the consumption of the data traffic of the intelligent terminal is equal to the traffic threshold value within the preset time, the first data traffic control module controls the data connection of the intelligent terminal to be disconnected, so that the intelligent terminal cannot acquire a mobile network signal and cannot connect mobile network data, and the loss of a user due to excessive consumption of the data traffic is effectively avoided.
-configuring a connection password for the data connection program of the intelligent terminal
Different from the prior art, in this embodiment, the intelligent terminal is provided with a first encryption module, the first encryption module is used to encrypt the data connection program of the intelligent terminal, and the data connection program of the intelligent terminal is set to start an encryption mode after the data connection of the intelligent terminal is disconnected, and the data connection program of the intelligent terminal can be started only when a password consistent with a connection password is input.
Specifically, referring to fig. 3, a flowchart of a procedure for configuring a connection password for a data connection procedure according to fig. 1 is shown. As can be seen from the figure, the step of configuring a connection password for the data connection program of the intelligent terminal in this embodiment mainly includes:
-capturing a connection password entered into said smart terminal
In this embodiment, the first encryption module in the intelligent terminal includes an instruction unit, and the instruction unit may sense a trigger operation of a user on the intelligent terminal, analyze the trigger operation, obtain a specific trigger pressure, a trigger position coordinate, and convert the trigger operation into specific digital information, thereby capturing a connection password input by the user on the intelligent terminal.
-associating, by means of an encryption operation, said data connection program with said connection password, said connection password being set to a key for opening a data connection of said smart terminal
With reference to fig. 3, in this embodiment, the first encryption module of the intelligent terminal further includes a first encryption unit, and the first encryption unit may perform encryption setting on the data connection program through an encryption operation method, and set the connection password as a key for opening data connection of the intelligent terminal. Namely, the data connection program is set to be in an access limiting state, and when a user inputs a password which is consistent with the connection password to the intelligent terminal, the data connection program of the intelligent terminal can be started.
-capturing a pair of data connection requests entered by said intelligent terminal
With continued reference to fig. 1, it can be seen that, in the present embodiment, when the consumption amount of the data traffic of the intelligent terminal reaches the traffic threshold, the data connection program of the intelligent terminal is restricted from being accessed. Therefore, when the user inputs a data connection request to the intelligent terminal, the instruction module in the intelligent terminal can capture the operation instruction and send an operation instruction to the outside after analyzing the operation instruction.
-generating a password authentication request
And the request module of the intelligent terminal can receive the operation instruction, generate a password verification request and send the password verification request to the outside. Therefore, the display module of the intelligent terminal generates a password input box in the display interface of the intelligent terminal.
-opening a data connection of the smart terminal when capturing a first connection password identical to the connection password
In this embodiment, the intelligent terminal is further correspondingly provided with a second data flow control module, and the second data flow control module can control to open the data connection of the intelligent terminal. Specifically, after the user inputs corresponding password information in a password box displayed in the intelligent terminal, the second data control module can read the password information triggered by the user in the display interface of the intelligent terminal and compare the password information with a pre-stored connection password. And when the password information is consistent with a pre-stored connection password, the second data flow control module controls to open the data connection of the intelligent terminal.
Example two:
preferably, in order to further improve the effectiveness of data traffic monitoring of the intelligent terminal, a situation of traffic waste caused by a monitoring error is avoided. Fig. 4 is a flowchart illustrating a method for monitoring data traffic of an intelligent terminal according to another preferred embodiment of the present invention. As can be seen from the figure, compared with the first embodiment, the method for monitoring data traffic of an intelligent terminal according to the present embodiment further includes:
-checking the consumption of data traffic of said intelligent terminal after capturing a pair of connection requests entered by said intelligent terminal
In this embodiment, the intelligent terminal is further provided with a verification module, and the verification module can capture a pair of connection requests input by the intelligent terminal through the instruction module, and further verify the consumption of the data traffic of the intelligent terminal according to an operation instruction sent by the instruction module after the connection requests are analyzed. Namely, the data traffic monitoring module is controlled to read the data traffic consumption of each application program in the intelligent terminal again, and the data traffic consumption of the intelligent terminal is obtained through recalculation.
-opening a data connection of said smart terminal when the consumption of said data traffic is less than said traffic threshold
In this embodiment, when the check result indicates that the consumption of the data traffic of the intelligent terminal is smaller than the traffic threshold, the check module of the intelligent terminal generates an opening instruction, and the second data traffic control module of the intelligent terminal receives the opening instruction and controls to open the data traffic connection of the intelligent terminal.
Example three:
preferably, in order to further remind the user that the data traffic of the intelligent terminal reaches the limit and avoid the user from opening the data connection of the intelligent terminal due to misoperation. Fig. 5 is a flowchart illustrating a method for monitoring data traffic of an intelligent terminal according to another preferred embodiment of the present invention. As can be seen from the figure, the method for monitoring data traffic of an intelligent terminal according to this embodiment further includes:
-locking the data connection procedure of the intelligent terminal after disconnecting the data connection of the intelligent terminal when the consumption equals a traffic threshold
In this embodiment, a program control module is disposed in the intelligent terminal, and the program control module locks the data connection program of the intelligent terminal after the data connection of the intelligent terminal is disconnected, so that when a user requests to start the data connection program of the intelligent terminal to trigger the data connection program of the intelligent terminal again, the data connection program of the intelligent terminal does not respond to an operation instruction sent by the user to the intelligent terminal.
-associating a data connection program of the intelligent terminal with a dial of the intelligent terminal
In this embodiment, the intelligent terminal further includes an association module, and after the program control module locks the data connection program, the association module of the intelligent terminal associates the data connection program of the intelligent terminal with the dial of the intelligent terminal. Therefore, the user can control the data connection program through the dial plate of the intelligent terminal.
-capturing a dialled number entered into said intelligent terminal
Therefore, in this embodiment, the user may trigger a corresponding number position in the dial of the intelligent terminal to input a dial number to the intelligent terminal. And the dialing module of the intelligent terminal can capture and read the dialing number.
-setting the dialled number as an unlocking key for a data connection program of the smart terminal
In this embodiment, the intelligent terminal further includes a second encryption module, and the second encryption module may set the dialing number as a decryption key of the data connection program of the intelligent terminal through an encryption operation. That is, only when the user inputs the consistent dialing number to the intelligent terminal again through the dial plate of the intelligent terminal, the data connection of the intelligent terminal can be opened.
In summary, the invention provides a more effective method for monitoring data traffic of an intelligent terminal, and the invention performs encryption setting on a data connection program when the data traffic consumption of the intelligent terminal reaches a preset traffic threshold, thereby avoiding loss caused by restarting the data connection of the intelligent terminal through misoperation of a user.
Referring to fig. 6, which is a structural diagram of a data traffic monitoring system of an intelligent terminal according to a preferred embodiment of the present invention, it can be seen that, in order to implement the method for monitoring data traffic of an intelligent terminal in the foregoing embodiment, another aspect of the present invention is to provide a system for monitoring data traffic of an intelligent terminal, which specifically includes the following modules:
-data traffic monitoring module
The intelligent terminal monitoring system is used for monitoring the consumption of the data flow of the intelligent terminal within a preset time. The preset time can be daily or monthly according to the limit condition of the data flow customized by the user.
Reference is made to fig. 7, which is a block diagram of a preferred data traffic monitoring module according to fig. 6. As can be seen from the figure, in this embodiment, preferably, the data traffic monitoring module includes the following units:
application monitoring unit
The method is used for acquiring an identification (UID) list of the application program with the network access authority in the intelligent terminal. Since each application installed on the mobile phone does not have network access right, it is not necessary to query traffic conditions for all applications on the mobile phone, and therefore, a list of UID (i.e., application ID) programs having network access rights is obtained first, so as to query traffic conditions of the mobile phone according to the UID in the next step.
-a flow acquisition unit
And the data traffic consumption of each application program in the identification list of the application programs in the preset time is captured. Specifically, the traffic obtaining unit may read traffic information of the application UID having the access right in the traffic data storage directory of the intelligent terminal according to the known UID list.
-a data processing unit
And calculating and obtaining the consumption of the data traffic of the intelligent terminal within the preset time according to the acquired traffic information of the application program UID with the access authority.
-a first data traffic control module
With reference to fig. 6, the present invention has a first data traffic control module for controlling to disconnect the data connection of the intelligent terminal. Specifically, after the consumption of the data traffic of the intelligent terminal within the preset time is obtained, the consumption of the data traffic is compared with a pre-stored traffic threshold. And when the consumption of the data flow of the intelligent terminal is equal to the flow threshold value in the preset time, the first data flow control module controls the data connection disconnection of the intelligent terminal.
-a first cryptographic module
And the data connection program is used for configuring a connection password for the data connection program of the intelligent terminal. Therefore, after the data connection of the intelligent terminal is disconnected, the data connection program of the intelligent terminal starts an encryption mode, and the data connection program of the intelligent terminal can be started only when a password consistent with a connection password is input.
Referring to fig. 8, which is a structural diagram of a preferred first encryption module according to fig. 6, it can be seen that, in this embodiment, the first encryption module preferably includes the following units:
-an instruction unit
The intelligent terminal is used for capturing a connection password input into the intelligent terminal. Specifically, the instruction unit may sense a trigger operation of a user on the intelligent terminal, analyze the trigger operation, obtain a specific trigger pressure, a trigger position coordinate, and the like of the trigger operation, and convert the trigger operation into specific digital information, thereby capturing a connection password input by the user on the intelligent terminal.
-a first encryption unit
The first encryption unit may associate the connection password with the data connection program through an encryption operation, that is, set the connection password as a key for opening the data connection of the smart terminal.
-an instruction module
With reference to fig. 6, in this embodiment, the intelligent terminal further has an instruction module, which is configured to capture an operation instruction input to the intelligent terminal. Specifically, when the consumption of the data traffic of the intelligent terminal reaches the traffic threshold, the data connection program of the intelligent terminal is limited to access. When the user inputs a data connection request to the intelligent terminal, the instruction module in the intelligent terminal can capture the operation instruction and send an operation instruction to the outside after analyzing the operation instruction.
-a request module
And the password authentication device is used for generating a password authentication request according to the captured operation instruction input to the intelligent terminal. Therefore, the display module of the intelligent terminal generates a password input box in the display interface of the intelligent terminal.
-a second data traffic control module
And the data connection control module is used for controlling the opening of the data connection of the intelligent terminal. Specifically, after the user inputs corresponding password information in a password box displayed in the intelligent terminal, the second data control module can read the password information triggered by the user in the display interface of the intelligent terminal and compare the password information with a pre-stored connection password. And when the password information is consistent with a pre-stored connection password, the second data flow control module controls to open the data connection of the intelligent terminal.
Preferably, refer to fig. 9, which is a block diagram of a monitoring system of data traffic of an intelligent terminal according to another preferred embodiment of the present invention. As can be seen from the figure, in this embodiment, the system for monitoring data traffic of an intelligent terminal further includes:
-a verification module
And the intelligent terminal is used for verifying the consumption of the data flow of the intelligent terminal, and when the consumption of the data flow is smaller than the flow threshold, a starting instruction is generated. Specifically, the verification module may capture a connection request input by the intelligent terminal through the instruction module, analyze the connection request, and further verify consumption of data traffic of the intelligent terminal according to an operation instruction sent by the instruction module. Namely, the data traffic monitoring module is controlled to read the data traffic consumption of each application program in the intelligent terminal again, and the data traffic consumption of the intelligent terminal is obtained through recalculation.
Preferably, referring to fig. 10, it is a block diagram of a monitoring system of data traffic of an intelligent terminal according to another preferred embodiment of the present invention. As can be seen from the figure, in this embodiment, the system for monitoring data traffic of an intelligent terminal further includes:
-a program control module
And the data connection program is used for locking the intelligent terminal. Therefore, when the user requests to start the data connection program of the intelligent terminal for triggering the data connection program of the intelligent terminal again, the data connection program of the intelligent terminal does not respond to the operation instruction sent by the user to the intelligent terminal.
-an association module
The intelligent terminal is used for associating the data connection program of the intelligent terminal with the dial plate of the intelligent terminal. Therefore, the user can control the data connection program through the dial plate of the intelligent terminal.
-a dial module
And capturing a dialing number input into the intelligent terminal. Specifically, when a user triggers a corresponding number position in a dial of the intelligent terminal, a dial number is input into the intelligent terminal. And the dialing module of the intelligent terminal can capture and read the dialing number.
-a second cryptographic module
And the unlocking key is used for setting the dialing number to the data connection program of the intelligent terminal. Specifically, the second encryption module may set the dialing number as a decryption key of a data connection program of the intelligent terminal through an encryption operation. That is, only when the user inputs the consistent dialing number to the intelligent terminal again through the dial plate of the intelligent terminal, the data connection of the intelligent terminal can be opened.
In summary, the data traffic monitoring system of the intelligent terminal provided by the present invention implements the encryption setting of the data connection program when the data traffic consumption reaches the preset traffic threshold by setting the data traffic monitoring module, the encryption module, and the like in the intelligent terminal and using the cooperation of the above modules, thereby avoiding the loss caused by the user restarting the data connection of the intelligent terminal by misoperation.
It should be noted that the embodiments of the present invention have been described in terms of preferred embodiments, and not by way of limitation, and that those skilled in the art can make modifications and variations of the embodiments described above without departing from the spirit of the invention.
Claims (10)
- A method for monitoring data traffic of an intelligent terminal is characterized by comprising the following steps:monitoring the consumption of the data flow of the intelligent terminal within a preset time,when the consumption is equal to a flow threshold, disconnecting the data connection of the intelligent terminal,configuring a connection password for the data connection program of the intelligent terminal,capturing a data connection request input by the intelligent terminal,a request for a password authentication is generated,when a first connection code is captured that is consistent with the connection code,and starting the data connection of the intelligent terminal.
- The monitoring method of claim 1,the step of monitoring the consumption of the data traffic of the intelligent terminal within a preset time comprises the steps of,acquiring a list of applications with network access rights in the intelligent terminal,and capturing the data traffic consumption of each application program in the application program list within the preset time, and calculating to obtain the consumption of the data traffic of the intelligent terminal within the preset time.
- The monitoring method of claim 1,the step of configuring a connection password for the data connection program of the intelligent terminal comprises,capturing a connection password input into the intelligent terminal,associating the connection cipher with the data connection program through an encryption operation,and setting the connection password as a key for opening the data connection of the intelligent terminal.
- The monitoring method of claim 1,also comprises the following steps of (1) preparing,after capturing a pair of connection requests input by the intelligent terminal,checking the consumption of the data traffic of the intelligent terminal,when the consumption of the data traffic is less than the traffic threshold,and starting the data connection of the intelligent terminal.
- The monitoring method of claim 1,also comprises the following steps of (1) preparing,when the consumption is equal to a flow threshold, disconnecting the data connection of the intelligent terminal,locking a data connection program of the intelligent terminal,associating the data connection program of the intelligent terminal with the dial plate of the intelligent terminal,capturing a dial number input into the intelligent terminal,setting the dial number as an unlocking key of a data connection program of the intelligent terminal,when a first dialing number is captured that is consistent with the unlocking key,and starting the data connection of the intelligent terminal.
- The system for monitoring the data traffic of the intelligent terminal is characterized by comprising the following modules,a data flow monitoring module for monitoring the consumption of the data flow of the intelligent terminal within a preset time,the first data flow control module controls to disconnect the data connection of the intelligent terminal,a first encryption module, which configures a connection password for the data connection program of the intelligent terminal,an instruction module for capturing the operation instruction input to the intelligent terminal,the request module generates a password verification request according to the operation instruction input to the intelligent terminal,and the second data flow control module controls the opening of the data connection of the intelligent terminal.
- A monitoring system according to claim 6,the data flow monitoring module comprises a data flow monitoring module,an application program monitoring unit for acquiring an identification list of application programs with access network authority in the intelligent terminal,a traffic acquisition unit capturing data traffic consumption of each application program in the identifier list of the application program within the preset time,and the data processing unit is used for calculating and obtaining the consumption of the data flow of the intelligent terminal in the preset time.
- A monitoring system according to claim 6,the first encryption module comprises a first encryption module and a second encryption module,an instruction unit for capturing a connection password inputted to the intelligent terminal,and the first encryption unit is used for correlating the connection password of the data connection program through encryption operation and setting the connection password as a key for opening the data connection of the intelligent terminal.
- A monitoring system according to claim 6,also comprises the following steps of (1) preparing,and the checking module is used for checking the consumption of the data flow of the intelligent terminal and generating a starting instruction when the consumption of the data flow is less than the flow threshold value.
- A monitoring system according to claim 6,also comprises the following steps of (1) preparing,a program control module for locking the data connection program of the intelligent terminal,an association module for associating the data connection program of the intelligent terminal with the dial of the intelligent terminal,a dialing module for capturing a dialing number input into the intelligent terminal,and the second encryption module is used for setting the dialing number as an unlocking key of a data connection program of the intelligent terminal.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/105836 WO2019071514A1 (en) | 2017-10-12 | 2017-10-12 | Method and system for monitoring data traffic of intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111279752A true CN111279752A (en) | 2020-06-12 |
Family
ID=66100263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780095905.3A Pending CN111279752A (en) | 2017-10-12 | 2017-10-12 | Monitoring method and monitoring system for data traffic of intelligent terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111279752A (en) |
WO (1) | WO2019071514A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270526A (en) * | 2014-09-29 | 2015-01-07 | 广东欧珀移动通信有限公司 | Data traffic control method and system for mobile terminal |
CN104918298A (en) * | 2014-03-10 | 2015-09-16 | 中国移动通信集团广东有限公司 | Network connection control method and apparatus, and mobile terminal |
WO2015161699A1 (en) * | 2014-04-25 | 2015-10-29 | 天地融科技股份有限公司 | Secure data interaction method and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105516502A (en) * | 2015-12-16 | 2016-04-20 | 惠州Tcl移动通信有限公司 | Mobile terminal and flow control method therefor |
CN105636155A (en) * | 2016-01-07 | 2016-06-01 | 广东欧珀移动通信有限公司 | Method and device for controlling wireless access point |
CN105704320B (en) * | 2016-03-21 | 2019-09-13 | 广东小天才科技有限公司 | Data network control method and system |
CN106130818A (en) * | 2016-06-30 | 2016-11-16 | 乐视控股(北京)有限公司 | Network sharing, requesting terminal and network share flux monitoring method and system |
-
2017
- 2017-10-12 CN CN201780095905.3A patent/CN111279752A/en active Pending
- 2017-10-12 WO PCT/CN2017/105836 patent/WO2019071514A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104918298A (en) * | 2014-03-10 | 2015-09-16 | 中国移动通信集团广东有限公司 | Network connection control method and apparatus, and mobile terminal |
WO2015161699A1 (en) * | 2014-04-25 | 2015-10-29 | 天地融科技股份有限公司 | Secure data interaction method and system |
CN104270526A (en) * | 2014-09-29 | 2015-01-07 | 广东欧珀移动通信有限公司 | Data traffic control method and system for mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2019071514A1 (en) | 2019-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102406757B1 (en) | A method of provisioning a subscriber profile for a secure module | |
US9647984B2 (en) | System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device | |
EP2352321B1 (en) | Method and apparatus for authentication processing of mobile terminal | |
EP3306985B1 (en) | Wireless local area network wlan access method, terminal, and server | |
EP2905715B1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN110719203B (en) | Operation control method, device and equipment of intelligent household equipment and storage medium | |
EP2854433A1 (en) | Method, system and related device for realizing virtual sim card | |
CN104641669A (en) | Apparatus and methods for controlled switching of electronic access clients without requiring network access | |
CN103095457A (en) | Login and verification method for application program | |
EP3072273B1 (en) | Systems and methods for fuel dispenser security | |
EP2368382B1 (en) | Locking of communication device | |
CN104240357B (en) | A kind of access control system | |
CN109145628B (en) | Data acquisition method and system based on trusted execution environment | |
CN103051456B (en) | The method and system of application program in a kind of management intelligent SD card | |
US7779455B2 (en) | Procedure for monitoring the usage of a broadcasted content | |
CN104853354A (en) | Bluetooth authentication method and system thereof | |
CN114615658B (en) | Handheld tablet personal computer of 5G communication encryption system | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment | |
CN106303371A (en) | Take pictures monitoring system, method and mobile terminal | |
CN108989331B (en) | Use authentication method of data storage device, device and storage medium thereof | |
CN107852603A (en) | The method and apparatus of terminal authentication | |
CN113779523A (en) | Authority management and control method, device, equipment and medium for terminal equipment | |
CN104937602B (en) | Privacy protection method and electronic equipment | |
CN113240836A (en) | Bluetooth lock connection method adopting two-dimensional code and related configuration system | |
CN107710673A (en) | The method and apparatus of authenticating user identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200612 |