CN115334469A - Data flow charging method and system of terminal - Google Patents
Data flow charging method and system of terminal Download PDFInfo
- Publication number
- CN115334469A CN115334469A CN202110513337.2A CN202110513337A CN115334469A CN 115334469 A CN115334469 A CN 115334469A CN 202110513337 A CN202110513337 A CN 202110513337A CN 115334469 A CN115334469 A CN 115334469A
- Authority
- CN
- China
- Prior art keywords
- application software
- data traffic
- category
- traffic
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 claims description 52
- 238000004891 communication Methods 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010200 validation analysis Methods 0.000 claims description 7
- 238000012544 monitoring process Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 206010044565 Tremor Diseases 0.000 description 4
- 230000004069 differentiation Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 206010012335 Dependence Diseases 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1432—Metric aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1432—Metric aspects
- H04L12/1435—Metric aspects volume-based
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/84—Types of notifications
- H04M15/844—Message, e.g. SMS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/853—Calculate maximum communication time or volume
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2441—Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2475—Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2483—Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Meter Arrangements (AREA)
Abstract
The invention provides a data flow charging method and a system of a terminal, wherein the method comprises the following steps: acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first category of the application software according to the analyzed network request; and calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user. The method and the device can determine the charging mode of the total data flow usage amount of the application software according to the first category and the total data flow usage amount of the application software and the flow package information ordered by the user, further accurately calculate the data flow usage charge of the application software, and adaptively select the corresponding charging mode according to the first category of the application software, so that the charging method of the flow data is more flexible, and the differentiated requirements of different users can be met.
Description
Technical Field
The present invention relates to the field of mobile communications technologies, and in particular, to a data traffic charging method and system for a terminal.
Background
The existing data flow packages are mainly monthly payment packages, and flow packages or voice packages with corresponding gears can be obtained only by paying monthly rents each month.
In a package, a user can use data flow at will to conduct activities such as swiping videos, playing games, watching dramas and listening songs, the time is not limited, and the place is not limited. Data traffic beyond the package requires additional payment by the user.
Often, the value produced by different applications varies, such as reading books or learning web lessons versus watching a pop or watching a tremble video, and is completely different for the user. Generally, in the prior art, the charging standards of data traffic generated when a user uses each application software to surf the internet are consistent, and the requirement of differentiation of the user is difficult to meet.
Disclosure of Invention
The invention provides a data flow charging method and a data flow charging system for a terminal, which are used for solving the defects that in the prior art, the charging standard of the data flow generated when a user uses each application software to surf the internet is consistent and the requirement of differentiation of the user is difficult to meet, and realize charging of the data flow generated when the user surfs the internet according to the category of the application software.
The invention provides a data flow charging method of a terminal, which comprises the following steps:
acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first category of the application software according to the analyzed network request;
and calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user.
According to the data flow charging method of the terminal provided by the invention, the network request comprises a flow type identification contract;
the traffic type recognition contract includes a header, a second category of the application software and identification information, and a validation string.
According to the data traffic charging method for a terminal provided by the present invention, the analyzing the network request, and obtaining the first type of the application software according to the analyzed network request, includes:
verifying the traffic type recognition contract according to the header and the verification character string, and if the verification passes, analyzing the second type and the identification information from the traffic type recognition contract;
if the second category is a preset category, acquiring a first category of the application software corresponding to the identification information; wherein the identification information is pre-associated with the first category.
According to the data traffic charging method of the terminal provided by the invention, the verifying the traffic type identification contract according to the header and the verification character string comprises the following steps:
if the head part is the same as a preset character string, dividing the character string formed by combining the head part, the second category and the identification information into a plurality of character strings according to a preset interval, and carrying out XOR operation on the plurality of character strings to obtain an XOR operation result;
and comparing the result of the exclusive-or operation with the verification character string, and determining whether the flow type identification contract passes verification according to the comparison result.
According to the data traffic charging method for the terminal provided by the invention, the calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user comprises the following steps:
acquiring a data flow limit value corresponding to a first class of the application software from the flow package information;
if the total data traffic usage amount is smaller than or equal to the data traffic limit value, multiplying the total data traffic usage amount by a first charging price corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee;
if the total data traffic usage amount is greater than the data traffic limit value, multiplying a part of the total data traffic usage amount that is greater than the data traffic limit value by a second charging price corresponding to the first class of the application software in the traffic package information, and then adding a data traffic package fee corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee;
wherein the first category of the application software is pre-associated with the data traffic limit value, the first billing price, the second billing price, and the data traffic package cost.
According to the data traffic charging method of the terminal provided by the present invention, after the calculating the data traffic usage fee of the application software, the method further comprises:
if the total data traffic usage amount is larger than a data traffic alarm value corresponding to the first class of the application software in the traffic package information, sending alarm information to a terminal; wherein the first category of the application software is pre-associated with the data traffic alert value.
According to the data traffic charging method for the terminal provided by the present invention, if the total data traffic usage amount is greater than the data traffic alarm value corresponding to the first category of the application software in the traffic package information, sending an alarm message to the terminal includes:
if the total data traffic usage amount is larger than the data traffic alarm value, verifying the alarm information;
if the warning information passes the verification, whether the sending frequency of the warning information is smaller than a preset threshold value is judged, and if the sending frequency of the warning information is smaller than the preset threshold value, the warning information is sent to the terminal.
The invention also provides a data user communication charging system of the terminal, which comprises:
the acquisition module is used for acquiring a network request initiated by a user through application software of a terminal, analyzing the network request and acquiring a first type of the application software according to the analyzed network request;
and the charging module is used for calculating the data flow usage fee of the application software according to the first class and the total data flow usage amount of the application software and the flow package information ordered by the user.
The invention also provides an electronic device, comprising a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of the data flow charging method of any one of the terminals.
The present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the data traffic charging method of any one of the terminals described above.
According to the data flow charging method and system of the terminal, provided by the invention, the first category of the application software can be obtained in real time by analyzing the network request initiated by the application software in real time, and the charging mode of the data flow usage total amount of the application software is determined according to the first category of the application software, the data flow usage total amount of the application software and the flow package information ordered by the user, so that the data flow usage charge of the application software is accurately calculated, and the corresponding charging mode is adaptively selected through the first category of the application software, so that the charging method of the flow data is more flexible, and the differentiated requirements of different users can be met.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a data traffic charging method for a terminal according to the present invention;
fig. 2 is one of schematic structural diagrams of a data traffic charging framework in the data traffic charging method for a terminal according to the present invention;
fig. 3 is a second schematic structural diagram of a data traffic charging framework in the data traffic charging method for a terminal according to the present invention;
fig. 4 is a third schematic structural diagram of a data traffic charging framework in the data traffic charging method for a terminal according to the present invention;
fig. 5 is a schematic structural diagram of a data traffic charging system of a terminal provided by the present invention;
fig. 6 is a schematic structural diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Furthermore, the appearances of the terms "first" or "second", and the like, if any, are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
The following describes the data traffic charging method of the terminal according to the present invention with reference to fig. 1, including: step 101, acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first type of the application software according to the analyzed network request;
the terminal may be a mobile phone, a personal computer, a tablet computer, or the like, and this example does not specifically limit this.
The application software may be a tremble, weChat, or Escape, etc., and this example is not particularly limited thereto.
When a user uses the terminal to surf the internet, the application software of the terminal needs to be opened. Then, the application software of the terminal initiates a network request to the base station. When receiving a network request initiated by application software, the base station can analyze a communication message protocol of the network request, and acquire a first type of the application software according to the analyzed communication message protocol of the network request.
The parsing manner may be parsing based on a DPI (Deep Packet Inspection, deep Packet parsing algorithm) algorithm, and the like, which is not specifically limited in this embodiment.
Optionally, the first category of the application software may be set according to actual requirements, such as a learning type, a game type, an entertainment type or a work type. Such as tremble software and love art software, are entertainment types.
And 102, calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user.
Specifically, in order to meet the requirements of different types of users, the number of traffic packages in this embodiment is multiple, so that the users can selectively order the traffic packages according to actual requirements.
As shown in fig. 2, a user may order different packages of traffic through a package setup interface.
The application software types in different flow packages correspond to different charging prices, data flow limit values, data flow alarm values and the like.
Compared with the traditional single data traffic charging mode, the user can select the corresponding traffic package according to the actual requirement in the embodiment. Correspondingly, the mode of charging the data traffic generated by the application software can be determined according to the traffic package information ordered by the user, the first category of the application software and the total data traffic usage amount.
As shown in fig. 3, after the base station acquires the first category of the application software, the first category of the application software is synchronized to the user communication charging system.
The user communication charging system can search the incidence relation between the total data flow and the charging price used by the application software in the flow package information ordered by the user according to the first category and the total data flow use amount of the application software, and obtain the charging price of the total data flow use amount of the application software.
Then, the flow rate usage fee of the application software is calculated according to the charging price and the total data flow rate usage amount.
And the total data traffic usage is the sum of the data traffic usage of the application software in a preset time period.
The preset time period may be set according to actual requirements, for example, from 0 to 24 o' clock of a day, or from the first day to the last day of a month, and the like, which is not specifically limited in this embodiment.
The method and the device for charging the traffic data can acquire the first category of the application software in real time by analyzing the network request initiated by the application software in real time, determine the charging mode of the data traffic usage total amount of the application software according to the first category of the application software, the data traffic usage total amount of the application software and the traffic package information ordered by the user, further accurately calculate the data traffic usage charge of the application software, and adaptively select the corresponding charging mode according to the first category of the application software, so that the charging method of the traffic data is more flexible, and can meet the differentiated requirements of different users.
On the basis of the above embodiment, in this embodiment, the network request includes a traffic type identification contract; the traffic type recognition contract includes a header, a second category of the application software and identification information, and a validation string.
Wherein the traffic type identification contract may be used to store information relating to a first class of application software of the terminal.
A traffic type identification contract may be added to the network requested messaging protocol.
Optionally, the implementation manner of adding the traffic type identification contract may be that an existing communication message protocol specification is modified, and a field is added in the existing communication message protocol to store the traffic type identification contract; or selecting a preset field in the communication message protocol for storing the traffic type identification contract.
The preset field may be 128 bits or 64 bits, and the present embodiment does not specifically limit this.
The traffic type identification contract may be placed at the top of the communication message protocol. As shown in table 1, is an example of a network requested messaging protocol.
TABLE 1 communication message protocol for network requests
Traffic type identification contracts | Header information for other protocols | Data traffic request information | … |
Optionally, a header of the traffic type identification contract may be used to validate the traffic type identification contract. The number of bits occupied by the head can be set according to actual requirements, such as 8 bits.
The second category of application software includes a general category, an encouragement category, and a constraints category, which are not specifically limited by the present implementation.
The application software in the common category does not need to restrict or encourage the data traffic generated by the application software; the application software in the encouragement category encourages the data traffic generated by the application software, namely, the user is encouraged to use the related application software, such as learning software; the constraint category is to constrain the data traffic it generates, i.e. to constrain the user from using the relevant application software.
The number of bits occupied by the second category can be set according to actual requirements, such as 8 bits.
Different strings may be used to represent different second categories, such as normal type represented by string 0x0, encouragement type represented by string 0x1, and constraint type represented by string 0x 2.
Each application software belongs to a different second category, e.g., the second category of the tremble software is 0x2, and the second category of the online learning software is 0x1.
The identification information of the application software is used for recording the relevant identification of the application software. The number of bits occupied by the identification information can be set according to actual requirements, such as 8 bits.
The identification information may be set according to actual requirements, such as the name of the application software.
For example, the identification information of the tremble includes its name douyin, and the identification information of the Weixin includes its name weixin.
The validation string is used to further validate the traffic type identification contract to ensure integrity and comprehensiveness of the validation. The number of bits occupied by the verification character string can be set according to actual requirements, such as 16bit.
It should be noted that, when the number of bits of the header, the second category, the identification information, and the verification character string in the traffic type identification contract is set according to the actual requirement, it needs to be satisfied that the sum of the number of bits of the header, the second category, the identification information, and the verification character string is the same as the number of bits of the traffic type identification contract.
As shown in table 2, a sample of the contract is identified for the traffic type. The header, the second category, the identification information and the verification character string are sequentially arranged to form a flow type identification contract.
Table 2 example of a traffic type identification contract
Head part | Second class | Identification information | Verifying a string |
8bit | 8bit | 32bit | 16bit |
The embodiment sets the traffic type identification contract in the network request, so that the base station can quickly acquire the first category of the application software from the traffic type identification contract of the network request. And only need to increase in the existing communication message protocol and preset the field or select and preset the field and deposit the traffic type and discern the contract, do not need to carry on the transformation design to the terminal system, the design is simple, can compatible multiple terminal, it is compatible good.
On the basis of the foregoing embodiment, in this embodiment, the analyzing the network request, and obtaining the first category of the application software according to the analyzed network request includes: verifying the traffic type recognition contract according to the header and the verification character string, and if the verification passes, analyzing the second type and the identification information from the traffic type recognition contract; if the second category is a preset category, acquiring a first category of the application software corresponding to the identification information; wherein the identification information is pre-associated with the first category.
Specifically, the traffic type identification contract is validated prior to parsing the network request.
Optionally, the traffic type identification contract is validated in conjunction with the header and validation string.
The verification mode can be that the flow type identification contract is verified according to the head, if the verification is passed, the flow type identification contract is verified again according to the verification character string, and if the verification of the verification character string is passed, the flow type identification contract is verified;
or the flow type identification contract is verified according to the header and the verification character string, and if the header and the verification character string pass verification, the flow type identification contract passes verification. The present embodiment does not specifically limit the manner of authentication.
Then, in the case that the traffic type identification contract passes the verification, the second category and the identification information of the application software are analyzed from the traffic type identification contract.
To alleviate processing stress on the base station, the first class of application software is selectively identified based on the second class of application software. In this embodiment, after the second category and the identification information of the application software are analyzed, it is first determined whether the second category meets a preset condition. And under the condition that the second category meets the preset condition, searching the first category of the application software corresponding to the identification information in the configuration table according to the identification information. And directly skipping without marking the first category of the application software under the condition that the second category of the application software does not meet the preset condition.
Wherein the preset categories include an encouragement type and a constraint type.
For example, when the second type of the application software is a common type and does not satisfy the condition, the first type of the application software is not marked, and the data traffic used by the application software can be charged according to the existing traffic charging method.
If the second type of the application software is an incentive type or a constraint type, the first type of the application software is marked, and then the data traffic is charged according to the first type of the application software.
The embodiment can ensure the transmission correctness of the traffic type identification contract by verifying the traffic type identification contract. Then, after the flow type is judged, the application software with the flow type meeting the preset condition is identified, the first category of the application software is obtained, and the processing pressure of the base station can be relieved.
On the basis of the foregoing embodiment, in this embodiment, the verifying the traffic type identification contract according to the header and the verification character string includes: if the head part is the same as a preset character string, dividing the character string formed by combining the head part, the second category and the identification information into a plurality of character strings according to a preset interval, and carrying out XOR operation on the plurality of character strings to obtain an XOR operation result; and comparing the result of the exclusive-or operation with the verification character string, and determining whether the flow type identification contract passes verification or not according to the comparison result.
Specifically, the character string of the header is compared with the preset character string, and if the character string of the header is the same as the preset character string, the header is verified to be passed.
The preset character string marks the contract supporting the traffic type identification, and the contract can be set according to actual requirements, such as 0xff. That is, when the character string of the header is 0xff, the header verification is passed, otherwise, the traffic type identification contract verification of the application software, which is not a traffic type identification contract protocol string, is failed.
And in the case that the header verification is passed, further verifying the traffic type identification contract according to the verification character string.
Optionally, the header, the second category, and the identification information are combined into a string according to their position in the traffic type recognition contract.
Then, dividing the combined character string into a plurality of character strings according to a preset interval, carrying out XOR operation on elements at corresponding positions of the character strings, and comparing the result of the XOR operation with the verification character string.
If the comparison result is that the XOR operation result is the same as the verification character string, the flow type identification contract passes the verification; and if the comparison result is that the XOR operation result is not identical with the verification character string, the flow type identification contract does not pass the verification.
The preset interval may be 16 bits, that is, the combined character string is divided into a plurality of character strings of 16 bits.
The embodiment verifies the traffic type identification contract by using the header and the verification character string, so that not only can whether the traffic type identification contract is legal be verified, but also the correctness of the traffic type identification contract in the transmission process can be ensured.
On the basis of the foregoing embodiments, in this embodiment, the calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user includes: acquiring a data flow limit value corresponding to a first class of the application software from the flow package information; if the total data traffic usage amount is smaller than or equal to the data traffic limit value, multiplying the total data traffic usage amount by a first charging price corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee; if the data traffic total usage amount is greater than the data traffic limit value, multiplying a part of the data traffic total usage amount, which is greater than the data traffic limit value, by a second charging price corresponding to the first type of the application software in the traffic package information, and then adding a data traffic package charge corresponding to the first type of the application software in the traffic package information to obtain the data traffic usage charge; wherein the first category of the application software is pre-associated with the data traffic limit value, the first billing price, the second billing price, and the data traffic package cost.
Specifically, the existing flow package information only includes a package internal charging mode and a package external charging mode, and non-differential pricing and processing are performed on data flows used by each application software. Therefore, the existing flow package and charging mode are difficult to meet the differentiated requirements of users.
For example, when parents want to guide children to reasonably use data traffic of the mobile phone, such as watching television shows rarely, using WeChat to surf the internet rarely, reading books more frequently, and making communication voice social contact more, only setting can be made on the mobile phone, so that the use time of the mobile phone of the children is limited. But the settings on the mobile phone are reversible and modifiable, and children can easily break the modifications through learning, thereby breaking through the guidance and management of parents.
And when parents want to guide the use of more learning software, the parents can only customize a flow package with higher cost for children, and cannot adaptively select a package with high data flow corresponding to the learning software, so that the user experience is poor.
As shown in table 3, is an existing data traffic package information.
Table 3 existing data traffic package information
Monthly rent | Flow (GB) | Speech (minute) |
238 | 80 | 600 |
298 | 100 | 800 |
398 | 150 | 1200 |
598 | 300 | 3000 |
In this embodiment, the flow package information includes the common data flow information, and the data flow limit value, the charging price, the data flow package fee, and the like corresponding to the first class of each application software.
Table 4 flow package information
As shown in table 4, an example of the flow package information is provided, and a set of value-added packages for preventing addiction of children is designed in consideration of that parents have a stronger willingness to add value to children. The children addiction-prevention value-added package support is compatible with a conventional flow charging mode, a charging price corresponding to the first class of specific application software, a data flow limit value corresponding to the first class of specific application software and an alarm mechanism corresponding to the first class of specific application software.
By combining the flow package information and the first category of the application software, the charging mode, the data flow limit value and the warning mode corresponding to the first category of each application software can be obtained so as to charge and warn the data flow generated by each application software, so that the requirements of different users can be met, and the user experience is effectively improved.
Optionally, when the base station uploads the first class of the application software to the user communication charging system, the user communication charging system continuously monitors the data traffic usage information of the application software, and obtains a total data traffic usage amount of the application software.
And acquiring the data flow limit value corresponding to the first category of the application software from the flow package information ordered by the user.
And comparing the total data traffic usage amount with the data traffic limit value, and multiplying the total data traffic usage amount by a first charging price corresponding to a first type of application software in the traffic package information when the total data traffic usage amount is less than or equal to the data traffic limit value to obtain the data traffic usage charge. And the first charging price is the charging price in the package corresponding to the first category of the application software.
When the total data traffic usage amount is greater than the data traffic limit value, acquiring the data traffic usage fee by adding the part of the total data traffic usage amount that is greater than the data traffic limit value to the data traffic package fee corresponding to the first class of the application software according to the non-package billing price (traffic basic fee) corresponding to the first class of the application software, namely, the second billing price.
It should be noted that the first charging price and the second charging price corresponding to each application type may be obtained by increasing or decreasing the preset price appropriately according to the actual demand on the basis of the charging price of the ordinary flow. By the method, the charging prices corresponding to the first types of different application software can be quickly generated, and different flow packages are formed.
Wherein, the common flow is the application software which fails in the verification of the flow type identification contract.
According to the embodiment, the data traffic used by the application software is charged in a data traffic charging mode corresponding to the first category of the application software, and the data traffic is differentially charged through the first category of the application software, so that the requirement of differentiation of users can be met.
On the basis of the foregoing embodiments, after the calculating the data traffic usage fee of the application software, the present embodiment further includes: if the total data traffic usage amount is larger than a data traffic alarm value corresponding to the first class of the application software in the traffic package information, sending alarm information to a terminal; wherein the first category of the application software is pre-associated with the data traffic alert value.
Specifically, the user communication charging system may also monitor whether the total data traffic usage amount of the application software exceeds the data traffic alarm value corresponding to the first category of the application software in the traffic package information while charging the traffic data.
As shown in fig. 4, when the total data traffic usage amount exceeds the data traffic alarm value, an alarm request is initiated to the monitoring system, and alarm information is reported to the monitoring system. And after receiving the alarm information, the monitoring system sends the alarm information of the application software to the terminal through the short message according to the flow package information ordered by the user, and timely reminds the user.
The alarm information may be the total data traffic usage amount, the data traffic usage fee, the condition that the total data traffic usage amount exceeds the data traffic alarm value, and the like, which is not specifically limited in this embodiment.
The user can correspondingly adjust the use frequency or the use time of the application software according to the reminding information.
The data flow alarm value is a preset proportion of the data flow limit value. The preset proportion can be set according to actual requirements, such as 90%, 100%, 120% and the like.
According to the embodiment, the user can be reminded in time, so that the user can be effectively prevented from being addicted to certain application software under the condition that the user normally uses the application software, and the user (especially children) is prevented from using the certain application software for a long time.
On the basis of the foregoing embodiment, in this embodiment, if the total data traffic usage amount is greater than the data traffic alarm value corresponding to the first category of the application software in the traffic package information, sending alarm information to a terminal includes: if the total data traffic usage amount is larger than the data traffic alarm value, verifying the alarm information; if the warning information passes the verification, whether the sending frequency of the warning information is smaller than a preset threshold value is judged, and if the sending frequency of the warning information is smaller than the preset threshold value, the warning information is sent to the terminal.
Specifically, in order to improve the user experience, when the application software exceeds the data flow alarm value, the user is informed in time, and meanwhile, the alarm information is prevented from being wrong, and the alarm information is prevented from being sent repeatedly.
Optionally, when the total data traffic usage amount is greater than the data traffic alarm value, the charging system sends an alarm request to the monitoring system, and reports alarm information. And the monitoring system verifies the alarm information.
The verification method may be to verify whether the total data traffic usage is greater than the data traffic alarm value, whether the content and type in the alarm information meet the specification, and the like, which is not specifically limited in this embodiment.
And under the condition that the warning information passes the verification, judging whether the sending frequency of the warning information is less than a preset threshold value, if so, sending the warning information to the terminal, and recording the sending frequency of the warning information.
In addition, whether the alarm information is repeated or not can be judged, and if the alarm information is repeated, the alarm information is not sent to the terminal.
According to the embodiment, the alarm information is sent to the terminal under the condition that the alarm information passes the verification and the sending frequency of the alarm information meets the requirement, so that the error sending, the repeated sending or the high-frequency sending of the alarm information is reduced, and the experience of a user is improved while the user is ensured to be informed in time.
The data traffic charging system of the terminal provided by the present invention is described below, and the data traffic charging system of the terminal described below and the data traffic charging method of the terminal described above may be referred to in correspondence.
As shown in fig. 5, this embodiment provides a data traffic charging system for a terminal, where the system includes an obtaining module 501 and a charging module 502, where:
the obtaining module 501 is configured to obtain a network request initiated by a user through application software of a terminal, analyze the network request, and obtain a first category of the application software according to the analyzed network request;
the terminal may be a mobile phone, a personal computer, a tablet computer, or the like, and this example does not specifically limit this.
The application software may be a tremble, weChat, or Escape, etc., and this example is not particularly limited thereto.
When a user uses the terminal to surf the internet, the application software of the terminal needs to be opened. The application software of the terminal then initiates a network request to the base station. When receiving a network request initiated by application software, the base station can analyze a communication message protocol of the network request, and acquire a first type of the application software according to the analyzed communication message protocol of the network request.
The analysis mode may be analysis based on a DPI algorithm.
Optionally, the first category of the application software may be set according to actual requirements, such as a learning type, a game type, an entertainment type or a work type. Such as trembler software and love art software, are entertainment types.
The charging module 502 is configured to calculate a data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software, and the traffic package information ordered by the user.
Specifically, in order to meet the requirements of different types of users, a plurality of traffic packages are provided in the embodiment, so that the users can selectively order the traffic packages according to actual requirements.
As shown in fig. 2, a user may order different packages of traffic through a package setup interface.
The application software types in different flow packages correspond to different charging prices, data flow limit values, data flow alarm values and the like.
Compared with the traditional single data traffic charging mode, the user can select the corresponding traffic package according to the actual requirement in the embodiment. Correspondingly, the mode of charging the data traffic generated by the application software can be determined according to the traffic package information ordered by the user, the first category of the application software and the total data traffic usage amount.
As shown in fig. 3, after the base station acquires the first category of the application software, the first category of the application software is synchronized to the user communication charging system.
The user communication charging system can search the incidence relation between the total data flow and the charging price used by the application software in the flow package information ordered by the user according to the first category and the total data flow use amount of the application software, and obtain the charging price of the total data flow use amount of the application software.
Then, the flow rate usage fee of the application software is calculated according to the charging price and the total data flow rate usage amount.
And the total data traffic usage is the sum of the data traffic usage of the application software in a preset time period.
The preset time period may be set according to actual requirements, such as 0 o 'clock to 24 o' clock of a day, or the first day to the last day of a month, and the like, and this embodiment does not specifically limit this.
In the embodiment, the first category of the application software can be obtained in real time by analyzing the network request initiated by the application software in real time, and the charging mode of the total data traffic usage amount of the application software is determined according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user, so that the data traffic usage charge of the application software is accurately calculated.
On the basis of the above embodiment, in this embodiment, the network request includes a traffic type identification contract; the traffic type recognition contract includes a header, a second category of the application software and identification information, and a validation string.
On the basis of the foregoing embodiment, the obtaining module in this embodiment is specifically configured to: verifying the traffic type recognition contract according to the header and the verification character string, and if the verification is passed, analyzing the second category and the identification information from the traffic type recognition contract; if the second category is a preset category, acquiring a first category of the application software corresponding to the identification information; wherein the identification information is pre-associated with the first category.
On the basis of the above embodiment, the present embodiment further includes a verification module specifically configured to: if the head part is the same as a preset character string, dividing the character string formed by combining the head part, the second category and the identification information into a plurality of character strings according to a preset interval, and carrying out XOR operation on the plurality of character strings to obtain an XOR operation result; and comparing the result of the exclusive-or operation with the verification character string, and determining whether the flow type identification contract passes verification according to the comparison result.
On the basis of the foregoing embodiment, the charging module in this embodiment is specifically configured to: acquiring a data flow limit value corresponding to a first class of the application software from the flow package information; if the total data traffic usage amount is smaller than or equal to the data traffic limit value, multiplying the total data traffic usage amount by a first charging price corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee; if the total data traffic usage amount is greater than the data traffic limit value, multiplying a part of the total data traffic usage amount that is greater than the data traffic limit value by a second charging price corresponding to the first class of the application software in the traffic package information, and then adding a data traffic package fee corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee; wherein the first category of the application software is pre-associated with the data traffic limit value, the first billing price, the second billing price, and the data traffic package cost.
On the basis of the above embodiment, the embodiment further includes a monitoring module specifically configured to: if the total data traffic usage amount is larger than a data traffic alarm value corresponding to the first type of the application software in the traffic package information, sending alarm information to a terminal; wherein the first category of the application software is pre-associated with the data traffic alert value.
On the basis of the foregoing embodiment, in this embodiment, the monitoring module is further configured to: if the total data traffic usage amount is larger than the data traffic alarm value, verifying the alarm information; if the warning information passes the verification, whether the sending frequency of the warning information is smaller than a preset threshold value is judged, and if the sending frequency of the warning information is smaller than the preset threshold value, the warning information is sent to the terminal.
Fig. 6 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 6: a processor (processor) 601, a communication Interface (Communications Interface) 602, a memory (memory) 603 and a communication bus 604, wherein the processor 601, the communication Interface 602 and the memory 603 complete communication with each other through the communication bus 604. The processor 601 may call logic instructions in the memory 603 to perform a data traffic charging method of the terminal, the method comprising: acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first type of the application software according to the analyzed network request; and calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user.
In addition, the logic instructions in the memory 603 may be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, the computer program including program instructions, when the program instructions are executed by a computer, the computer being capable of executing the data traffic charging method for a terminal provided by the above methods, the method including: acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first type of the application software according to the analyzed network request; and calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user.
In still another aspect, the present invention also provides a non-transitory computer-readable storage medium, on which a computer program is stored, the computer program being implemented by a processor to perform the data traffic charging method of the terminal provided in the foregoing description, the method including: acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first type of the application software according to the analyzed network request; and calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user.
The above-described system embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, and not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A data flow charging method of a terminal is characterized by comprising the following steps:
acquiring a network request initiated by a user through application software of a terminal, analyzing the network request, and acquiring a first category of the application software according to the analyzed network request;
and calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user.
2. The data traffic charging method of the terminal according to claim 1, wherein the network request includes a traffic type identification contract;
the traffic type identification contract includes a header, a second category and identification information of the application software, and a validation string.
3. The method for charging data traffic of a terminal according to claim 2, wherein the parsing the network request and obtaining the first category of the application software according to the parsed network request includes:
verifying the traffic type recognition contract according to the header and the verification character string, and if the verification passes, analyzing the second type and the identification information from the traffic type recognition contract;
if the second category is a preset category, acquiring a first category of the application software corresponding to the identification information; wherein the identification information is pre-associated with the first category.
4. The method for charging data traffic of the terminal according to claim 3, wherein the verifying the traffic type identification contract according to the header and the verification string comprises:
if the head part is the same as a preset character string, dividing the character string formed by combining the head part, the second category and the identification information into a plurality of character strings according to a preset interval, and carrying out XOR operation on the plurality of character strings to obtain an XOR operation result;
and comparing the result of the exclusive-or operation with the verification character string, and determining whether the flow type identification contract passes verification according to the comparison result.
5. The data traffic charging method of the terminal according to any one of claims 1 to 4, wherein the calculating the data traffic usage fee of the application software according to the first category and the total data traffic usage amount of the application software and the traffic package information ordered by the user comprises:
acquiring a data flow limit value corresponding to a first class of the application software from the flow package information;
if the total data traffic usage amount is smaller than or equal to the data traffic limit value, multiplying the total data traffic usage amount by a first charging price corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee;
if the total data traffic usage amount is greater than the data traffic limit value, multiplying a part of the total data traffic usage amount that is greater than the data traffic limit value by a second charging price corresponding to the first class of the application software in the traffic package information, and then adding a data traffic package fee corresponding to the first class of the application software in the traffic package information to obtain the data traffic usage fee;
wherein the first category of the application software is pre-associated with the data traffic limit value, the first billing price, the second billing price, and the data traffic package cost.
6. The method for charging data traffic of a terminal according to any one of claims 1 to 4, further comprising, after the calculating the data traffic usage fee of the application software:
if the total data traffic usage amount is larger than a data traffic alarm value corresponding to the first class of the application software in the traffic package information, sending alarm information to a terminal; wherein the first class of application software is pre-associated with the data traffic alert value.
7. The method for charging data traffic of a terminal according to claim 6, wherein sending an alarm message to the terminal if the total amount of data traffic usage is greater than the data traffic alarm value corresponding to the first class of the application software in the traffic package information includes:
if the total data traffic usage amount is larger than the data traffic alarm value, verifying the alarm information;
if the warning information passes the verification, whether the sending frequency of the warning information is smaller than a preset threshold value or not is judged, and if the sending frequency of the warning information is smaller than the preset threshold value, the warning information is sent to the terminal.
8. A system for billing a data user communication for a terminal, comprising:
the acquisition module is used for acquiring a network request initiated by a user through application software of a terminal, analyzing the network request and acquiring a first type of the application software according to the analyzed network request;
and the charging module is used for calculating the data flow usage fee of the application software according to the first class and the total data flow usage amount of the application software and the flow package information ordered by the user.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor, when executing the program, carries out the steps of a data traffic charging method of a terminal according to any of claims 1 to 7.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, performs the steps of a data traffic charging method for a terminal according to any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110513337.2A CN115334469A (en) | 2021-05-11 | 2021-05-11 | Data flow charging method and system of terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110513337.2A CN115334469A (en) | 2021-05-11 | 2021-05-11 | Data flow charging method and system of terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115334469A true CN115334469A (en) | 2022-11-11 |
Family
ID=83912866
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110513337.2A Pending CN115334469A (en) | 2021-05-11 | 2021-05-11 | Data flow charging method and system of terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115334469A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106325867A (en) * | 2016-08-24 | 2017-01-11 | 努比亚技术有限公司 | Mobile terminal and interface display method thereof |
CN108650195A (en) * | 2018-04-17 | 2018-10-12 | 南京烽火天地通信科技有限公司 | A kind of APP flows automatic identification model building method |
WO2018214424A1 (en) * | 2017-05-23 | 2018-11-29 | 华为技术有限公司 | Method, apparatus and system for monitoring data traffic |
CN109547222A (en) * | 2018-11-07 | 2019-03-29 | 斑马网络技术有限公司 | The flow statistical method and device of network request |
-
2021
- 2021-05-11 CN CN202110513337.2A patent/CN115334469A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106325867A (en) * | 2016-08-24 | 2017-01-11 | 努比亚技术有限公司 | Mobile terminal and interface display method thereof |
WO2018214424A1 (en) * | 2017-05-23 | 2018-11-29 | 华为技术有限公司 | Method, apparatus and system for monitoring data traffic |
CN108933706A (en) * | 2017-05-23 | 2018-12-04 | 华为技术有限公司 | A kind of method, apparatus and system of monitoring data flow |
CN108650195A (en) * | 2018-04-17 | 2018-10-12 | 南京烽火天地通信科技有限公司 | A kind of APP flows automatic identification model building method |
CN109547222A (en) * | 2018-11-07 | 2019-03-29 | 斑马网络技术有限公司 | The flow statistical method and device of network request |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113383362B (en) | User identification method and related product | |
US11556955B2 (en) | Systems and methods for leveraging social queuing to identify and prevent ticket purchaser simulation | |
US20070256033A1 (en) | System and method for flagging information content | |
US9639811B2 (en) | Systems and methods for leveraging social queuing to facilitate event ticket distribution | |
CN105049421A (en) | Authentication method based on use behavior characteristic of user, server, terminal, and system | |
US20210105277A1 (en) | Systems and methods for preventing a fraudulent registration | |
US9195641B1 (en) | Method and apparatus of processing user text input information | |
CN108595492B (en) | Content pushing method and device, storage medium and electronic device | |
CN107341384A (en) | A kind of service verification method and system | |
CN110147930A (en) | Data statistical approach, device and storage medium based on big data analysis | |
US12086830B2 (en) | Systems and methods for leveraging social queuing to simulate ticket purchaser behavior | |
CN110349039A (en) | Complaint risk appraisal procedure, system, computer equipment and readable storage medium storing program for executing | |
KR101836881B1 (en) | System for providing reliability score of internet service member and method therefor | |
WO2024174714A1 (en) | Authenticity verification method and device | |
CN110569416A (en) | APP control processing method based on data crawling and related product | |
CN104216903A (en) | Method and device for evaluating attention between users | |
CN105933273A (en) | Data verification method and server | |
CN109271609A (en) | Label generating method, device, terminal device and computer storage medium | |
CN115334469A (en) | Data flow charging method and system of terminal | |
US9772737B1 (en) | Managing content access data in a communication network | |
CN111177661B (en) | Copyright authentication method for building information model component and related product | |
CN110809001B (en) | Identity authentication method, device, equipment and storage medium | |
CN111132144B (en) | Abnormal number identification method and equipment | |
CN114492852A (en) | Data matching method and device based on federal learning | |
CN112560961A (en) | Target identification method and device based on graph clustering, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |