WO2016107124A1 - 流量共享方法及装置、终端 - Google Patents

流量共享方法及装置、终端 Download PDF

Info

Publication number
WO2016107124A1
WO2016107124A1 PCT/CN2015/083113 CN2015083113W WO2016107124A1 WO 2016107124 A1 WO2016107124 A1 WO 2016107124A1 CN 2015083113 W CN2015083113 W CN 2015083113W WO 2016107124 A1 WO2016107124 A1 WO 2016107124A1
Authority
WO
WIPO (PCT)
Prior art keywords
traffic
sharing
terminal
access
shared
Prior art date
Application number
PCT/CN2015/083113
Other languages
English (en)
French (fr)
Inventor
袁金凤
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016107124A1 publication Critical patent/WO2016107124A1/zh

Links

Images

Definitions

  • the present invention relates to the field of communications, and in particular, to a method and device for sharing a traffic, and a terminal.
  • WiFi hotspot Wireless-Fidelity
  • the sharing end the user that can share the traffic to others
  • the access end the user that shares the traffic of others.
  • the existing technology can complete the traffic sharing by the following two methods of quickly connecting to the WiFi. :
  • the main purpose of the present invention is to provide a method, a device, and a terminal for sharing a traffic to overcome the cumbersome method of performing a WiFi connection completion process by using a password verification method in the prior art.
  • the present invention provides a traffic sharing method, including: a sharing end receives a traffic sharing request from an access end, where the sharing end is a terminal that allows traffic to be provided to other users, and the access terminal requests the use.
  • the terminal of the traffic of other users, the traffic sharing request carries the identity information of the access end; the sharing end uses the identity information to authenticate the identity of the access end, and in the case that the authentication is passed, the sharing end shares the traffic to the access end. use.
  • the identity information comprises: a media access control (MAC) address and/or a phone number of the access end.
  • MAC media access control
  • the sharing end uses the identity information to perform identity authentication on the access terminal, including: the sharing end determines whether the MAC address and/or the phone number of the access terminal and the MAC address of the access terminal that is pre-stored by the sharing end and allow the use of the traffic of the sharing end. And the telephone number is consistent; if the judgment result is yes, the identity authentication performed on the access end is confirmed to pass.
  • the sharing end uses the sharing to share the traffic to the accessing end, including: the sharing end determines whether the WiFi function is in an open state or a closed state, and if it is in an open state, allows the access terminal to directly connect to the shared terminal through the WiFi function and then use the sharing. Traffic at the end.
  • the sharing end uses the shared end to share the traffic to the accessing end, and further includes: if the sharing end determines that the traffic that the access end has used from the shared end reaches the first traffic threshold, or determines that the shared end has shared the other Whether the total traffic used by the user reaches the second traffic threshold; if the judgment result is no, the sharing terminal turns on the WiFi function, and allows the access terminal to connect to the shared terminal through the WiFi function and then uses the traffic of the shared terminal; In the case of the shared end, the WiFi function is turned off, and the access terminal is prohibited from performing the connection operation through the WiFi function.
  • the transmission method of the traffic sharing request includes: making a call or sending a short message.
  • the present invention also provides a traffic sharing device, which is located at the sharing end, and the sharing terminal is a terminal that allows traffic to be provided to other users, and includes: a receiving module configured to receive a traffic sharing request from the access terminal, where the access terminal The terminal that requests the use of the traffic of the other user, the traffic sharing request carries the identity information of the access terminal; the sharing module is configured to use the identity information to authenticate the identity of the access terminal, and in the case that the authentication is passed, the sharing terminal Traffic sharing is used by the access side.
  • the identity information includes: a media access control (MAC) address and/or a phone number of the access end;
  • the sharing module includes: a determining unit, configured to determine whether the MAC address and/or the phone number of the access terminal is in advance with the sharing end The stored MAC address and/or the telephone number of the access terminal that allows the use of the traffic of the shared end are consistent; the determining unit is configured to determine the identity authentication for the access terminal if the judgment result of the determining unit is yes.
  • MAC media access control
  • the invention also provides a terminal, the terminal allows the flow to be provided to other users, and the terminal comprises: the above-mentioned traffic sharing device.
  • the present invention further provides a method for the traffic sharing, comprising: the access end transmitting a traffic sharing request carrying the identity information of the access end to the sharing end, so that the sharing end uses the identity information to perform identity authentication on the access end, where
  • the inbound end is a terminal that requests the use of traffic of other users
  • the shared end is a terminal that allows traffic to be provided to other users; in the case that the authentication result of the shared end is passed, the access end is connected to the shared end through the WiFi function of the shared end. , sharing the traffic using the shared end.
  • the invention also provides a traffic sharing device, which is located at the access end, and the access terminal is a terminal that requests to use the traffic of other users, and includes: a sending module, configured to send the traffic sharing carrying the identity information of the access terminal to the sharing end The request is such that the sharing end uses the identity information to authenticate the identity of the access terminal, where the sharing terminal is a terminal that allows the traffic to be provided to other users; and the sharing module is configured to pass the authentication result of the sharing terminal as being passed. Connect to the shared terminal through the WiFi function of the shared terminal, and share the traffic using the shared terminal.
  • the present invention also provides a terminal, where the terminal is a terminal requesting to use traffic of other users, and the terminal includes: the foregoing traffic sharing device.
  • the traffic sharing method, device and terminal according to the present invention can quickly and automatically connect the WiFi device by dialing or short message when the connected user WiFi is turned off, and can share the remaining traffic well, and You can make a quick connection without knowing the user's WiFi password or password change.
  • FIG. 1 is a flowchart of a traffic sharing method according to Embodiment 1 of the present invention.
  • FIG. 2 is a block diagram showing the structure of a traffic sharing device according to Embodiment 1 of the present invention.
  • FIG. 3 is a flowchart of a traffic sharing method according to Embodiment 2 of the present invention.
  • FIG. 4 is a structural block diagram of a traffic sharing apparatus according to Embodiment 2 of the present invention.
  • FIG. 6 is a schematic diagram of a process of triggering a WiFi connection using a dialing mode according to a preferred embodiment of the present invention
  • FIG. 7 is a schematic diagram of a process of triggering a WiFi connection using a short message method according to a preferred embodiment of the present invention.
  • the embodiment of the invention provides a traffic sharing method, which can be applied to a traffic sharing end that can share outgoing traffic to other users.
  • 1 is a flowchart of a traffic sharing method according to Embodiment 1 of the present invention. As shown in FIG. 1, the process includes the following steps (Step S102-Step S104):
  • Step S102 The sharing end receives the traffic sharing request from the accessing end, where the sharing end is a terminal that allows the traffic to be provided to other users, and the accessing end is a terminal that requests to use the traffic of other users, and the traffic sharing request carries the connection Incoming identity information.
  • Step S104 The sharing end uses the identity information to perform identity authentication on the access end. In the case that the authentication is passed, the sharing end shares the traffic to the access end for use.
  • the access terminal can use the traffic of the shared end as long as the identity of the shared end is authenticated, thereby eliminating the trouble of verifying the password.
  • the identity information may include: a media access control (MAC) address and/or a phone number of the access end.
  • MAC media access control
  • the process in which the sharing end uses the identity information to perform identity authentication on the access terminal may be implemented in the following manner: the sharing end determines whether the MAC address and/or the phone number of the access terminal is pre-stored with the shared end. The MAC address and/or the phone number of the access end that allows the use of the traffic of the shared end are consistent; if the result of the determination is yes, the identity authentication for the access end is confirmed to pass.
  • the sharing end can pre-set a list of access terminals that can use its traffic.
  • the list is stored in the form of MAC and/or telephone number on the shared end, and in the authentication process, as long as the current request is judged
  • the result of the identity authentication can be determined by determining whether the MAC and/or the telephone number of the access end of the power flow is included in the pre-stored list on the shared end.
  • an Android installation package (Android Package, referred to as APK) program can be installed on a user's mobile phone with a large amount of traffic and willing to share traffic, and a white list (ie, a mobile phone that allows sharing of traffic) can be set through the program.
  • APK Android Installation package
  • the process of sharing the traffic to the access terminal by the sharing end may be implemented in the following manner: the sharing end first determines whether the WiFi function is in the on state or in the off state, and if it is in the on state, the access may be allowed.
  • the terminal directly uses the WiFi function to connect to the shared terminal and then uses the traffic of the shared terminal.
  • the sharing end may further determine whether the traffic that the access terminal has used from the shared terminal reaches the first traffic threshold (that is, the shared terminal may pre-empt each of its allowed traffic for its share).
  • a separate traffic limit is set on the ingress to ensure that the traffic that can be shared by each access end does not exceed the limit.) Or whether the total traffic shared by the shared end to other users reaches the second traffic threshold. That is to say, the sharing end can set a total traffic limit quota for all the access terminals that can request the sharing process in advance, so as to ensure that the traffic that all access terminals can share does not exceed the allowable range, and the judgment result is no.
  • the shared terminal turns on the WiFi function, and allows the access terminal to use the shared terminal's traffic after connecting to the shared terminal through the WiFi function.
  • the shared terminal maintains the WiFi function off state, and the access terminal is prohibited from passing.
  • the WiFi function performs the connection operation.
  • the transmission manner of the traffic sharing request may include: making a call or sending a short message. That is to say, the access terminal can send a traffic sharing request to the sharing terminal by calling or sending a short message.
  • the sharing end It is also possible to deny access.
  • the access terminal that issued the shared traffic request knows the reason for the rejection, if necessary, the shared terminal can also notify the call by sending a call or sending a short message. Into the end.
  • the embodiment of the present invention further provides a traffic sharing device, which is located at the sharing end (the shared terminal is a terminal that allows traffic to be used by other users), and is used to perform the process shown in FIG. 1 . Traffic sharing method.
  • the device may include: a receiving module 10 and a sharing module 20, where:
  • the receiving module 10 is configured to receive a traffic sharing request from the accessing end, where the accessing end is a terminal requesting to use the traffic of other users, and the traffic sharing request carries the identity information of the accessing end; the sharing module 20 is configured to use the identity The information is authenticated by the access end. When the authentication is passed, the traffic of the shared end is shared with the access end.
  • the identity information may include: a media access control (MAC) address and/or a phone number of the access end.
  • the sharing module 20 may include: a determining unit 22, configured to determine whether the MAC address and/or the phone number of the access terminal and the MAC address and/or the phone number of the access terminal pre-stored in the sharing terminal to allow the use of the shared end traffic Consistent; the determining unit 24 is configured to determine the identity authentication pass to the access terminal if the determination result of the determining unit 22 is YES.
  • the embodiment of the present invention further provides a terminal (not described in conjunction with the accompanying drawings), which allows the traffic to be provided to other users, and the terminal includes the traffic sharing device shown in FIG. 2.
  • the embodiment of the invention further provides a traffic sharing method, which can be applied to an access end that can share the traffic of other users.
  • 3 is a flowchart of a traffic sharing method according to Embodiment 2 of the present invention. As shown in FIG. 3, the process includes the following steps (Step S302-Step S304):
  • Step S302 The access end sends a traffic sharing request carrying the identity information of the access end to the sharing end, so that the sharing end uses the identity information to perform identity authentication on the access end, where the access end requests to use the traffic of other users.
  • Terminal the shared terminal is a terminal that allows traffic to be provided to other users.
  • step S304 when the authentication result of the sharing end is passed, the access end is connected to the sharing end by using the WiFi function of the sharing end, and the traffic of the shared end is shared.
  • the access terminal can use the traffic of the shared end as long as the identity of the shared end is authenticated, thereby eliminating the trouble of verifying the password.
  • the embodiment of the present invention further provides a traffic sharing device, which is located at an access end (the access terminal is a terminal that requests the use of traffic of other users), and is used to perform the process shown in FIG. Process sharing method.
  • the device may include: a sending module 30 and a sharing module 40, where:
  • the sending module 30 is configured to send a traffic sharing request carrying the identity information of the access end to the sharing end, so that the sharing end uses the identity information to perform identity authentication on the access end, where the sharing end allows the traffic to be provided to other users.
  • the sharing module 40 is configured to connect to the sharing terminal through the WiFi function of the sharing terminal when the authentication result of the sharing terminal is passed, and share the traffic using the sharing terminal.
  • the embodiment of the present invention further provides a terminal (not described in conjunction with the accompanying drawings).
  • the terminal is a terminal that requests to use traffic of other users, and the terminal includes the traffic sharing device shown in FIG. 4.
  • the traffic sharing method provided by the preferred embodiment allows a user with insufficient traffic to directly access the terminal of the process rich user by dialing or short message without verifying the password, and also when the WiFi function is turned off. It can be directly opened and automatically connected, and can be widely applied to small traffic sharing application scenarios such as homes and units.
  • FIG. 5 is a flow chart of traffic sharing according to a preferred embodiment of the present invention. As shown in FIG. 5, the process includes the following steps:
  • Step S502 adding a phone and a MAC address that allows the direct access user to the white list of the mobile phone of the rich user, and setting a maximum traffic sharing value thereof;
  • Step S504 when the user lacks the traffic to prepare to connect the traffic rich user WiFi, give the dialing phone or send the short message;
  • Step S506 the traffic rich user receives a dial or SMS request, determines whether the user is within the set white list, the determination result is yes, step S508 is performed, and if the determination result is no, step S504 is performed;
  • Step S508 the flow rich user determines whether the flow set by the user has been used up, and if the determination result is no, step S510 is performed, and if the determination result is yes, step S504 is performed;
  • Step S510 the flow rich user determines whether his own WiFi is turned on, and if the determination result is yes, step S512 is performed, and if the determination result is no, step S514 is performed;
  • Step S512 the traffic is insufficient, and the user normally connects to the WiFi Internet access
  • step S514 the traffic rich user turns on the WiFi, and optionally further determines whether the insufficient traffic is allowed to connect to the WiFi.
  • the process of completing traffic sharing by dialing a call includes:
  • the requesting access user dials a call to the shared WiFi user when preparing to access the shared WiFi user, and the device sharing the WiFi user receives the dialing request according to the phone number and/or the MAC address of the device and the setting in the software.
  • the access user is allowed to directly perform the WiFi connection, and the current remaining traffic value is queried, and the value is returned to the user. If the traffic has exceeded the limit value (in practical applications, According to the need to determine the limit of the traffic value, you can tell the user that the traffic has exceeded the limit value by dialing, and the access user is not allowed to make a WiFi connection.
  • the WiFi function of the shared WiFi user is turned off, if the requested access user has not reached the upper limit of the shared traffic rate (the above two upper-end upper limit values may be used, the actual application may be set as needed)
  • the shared WiFi user receives the dialing request, it can automatically open the WiFi, allowing the access user to request the WiFi connection, and if the shared traffic upper limit value has been reached, the access user is denied.
  • the process of completing traffic sharing by dialing the phone includes:
  • the requesting access user sends a short message to the shared WiFi user when the user is ready to access the WiFi.
  • the user is not required to check the password, according to the phone number and/or the Whether the MAC address of the device is the same as the setting in the software. If it is the same, directly allow the access user to make a WiFi connection, and query the current remaining traffic value to return the value to the user. If the traffic has exceeded the limit value (in actual applications, If you want to limit the traffic value according to your needs, you can use SMS to tell the user that the traffic limit has been exceeded and the user is not allowed to connect to WiFi.
  • the WiFi function of the shared WiFi user is turned off, if the requested access user has not reached the upper limit of the shared traffic rate (the above two upper-end upper limit values may be used, the actual application may be set as needed)
  • the WiFi can be automatically turned on, allowing the access user to request the WiFi connection, and if the shared traffic upper limit value has been reached, the access user is denied.
  • the following describes the application framework layer and the application layer further from the software implementation level.
  • FIG. 6 is a schematic diagram of a process of triggering a WiFi connection using a dialing mode according to a preferred embodiment of the present invention
  • FIG. 7 is a schematic diagram of a process of triggering a WiFi connection by using a short message mode according to a preferred embodiment of the present invention.
  • DTMF Dual Tone Multi Frequency
  • the codec used in the dialing mode and the short message mode are different.
  • the dialing mode transmits DTMF signaling
  • the short message mode transmits a protocol data unit (PDU) string. Therefore, dialing
  • PDU protocol data unit
  • the application framework layer when making a call or sending a text message, the application framework layer first receives the AT command of the other party, and after uploading the content according to the AT command, uploads the content to the application layer, and the application layer uses the intent mechanism.
  • the message is passed between the running components and verified. For example, by sending a message to the WiFi module, the WiFi module connects and opens the WiFi.
  • the dialing mode and the sending short message mode may be expanded, and the shared traffic may be triggered by using WeChat (provided that the user who needs to access must have traffic, and may be on WeChat).
  • WeChat provided that the user who needs to access must have traffic, and may be on WeChat.
  • the traffic sharing process can be implemented like this:
  • the requesting access user sends a WeChat request to the shared WiFi user when preparing to access the WiFi, and the device for sharing the WiFi does not need to check the password of the requesting access user when receiving the WeChat request, according to the phone number and/or Whether the MAC address of the device is the same as the setting in the software. If it is the same, it directly allows the access user to make a WiFi connection, and queries the current remaining traffic value to return the value to the user. If the traffic has exceeded the limit value (in practical applications) You can decide which limit the traffic value is based on your needs. You can tell the user that the traffic limit value has been exceeded by WeChat, and the user is not allowed to connect to WiFi.
  • the WiFi function of the shared WiFi user is turned off, if the requested access user has not reached the upper limit of the shared traffic rate (the above two upper-end upper limit values may be used, the actual application may be set as needed)
  • the WiFi can be automatically turned on, and the access user is allowed to connect to the WiFi connection. If the shared traffic upper limit value has been reached, the access user is denied.
  • the scenarios in which the preferred embodiment can be applied include smart phones, UCPM FROUM OF INNOVATION (UFI) products, and Customer Premise Equipment (CPE) products. Shared scenes.
  • the WiFi device can be quickly and automatically connected by dialing or short message when the connected user WiFi is turned off, and the remaining traffic can be well shared, and can be quickly performed without knowing the user's WiFi password or password change. connection.
  • the present invention can quickly and automatically connect the WiFi device by dialing or short message when the connected user WiFi is turned off, and can share the remaining traffic well, and can not know the user WiFi password or password. Make a quick connection when you change.

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种流量共享方法及装置、终端。其中,该方法包括:共享端接收来自接入端的流量共享请求,其中,共享端是允许将流量提供给其它用户使用的终端,接入端是请求使用其它用户的流量的终端,流量共享请求中携带有接入端的身份信息;共享端使用身份信息对接入端进行身份鉴权,在鉴权通过的情况下,共享端将流量共享给接入端使用。通过本发明,流量不足的用户可以通过拨号或短信方式直接接入流程富裕用户的终端,而无需校验密码。

Description

流量共享方法及装置、终端 技术领域
本发明涉及通信领域,尤其是涉及一种流量共享方法及装置、终端。
背景技术
随着智能手机等终端的普及和流行,使用智能手机上网已经成为一种时尚和习惯,而手机上网产生的流量问题一直困扰着手机使用者,例如流量不够用,流量用不完,无法确定无线保真网(Wireless-Fidelity,简称为WiFi)热点的位置等问题,使用者希望能够做到:更充分地利用每个月的固定流量,在剩余流量不足的情况下,可以随时找到可供手机连接的WiFi热点,可以将用不完的流量共享给他人。
在流量共享中,可以把流量分享给他人的用户端称为共享端,分享他人流量的用户端称为接入端,目前,现有技术主要通过以下两种快速连接WiFi的方式可以完成流量共享:
(1)通过将WiFi密码生成二维码的方式进行发布,或者使用无线应用协议(Wireless Application Protocol,简称为WAP)推送(Push)方式、近场通信(Near Field Communication,简称为NFC)方式、微信传送方式进行发布,接入端对相应密码信息进行解析之后再进行WiFi连接。
(2)接入端第一次连接至共享端的WiFi时需要获取验证,并将相关密码信息保存在数据库中,当第二次连接时,直接使用保存的密码信息进行连接。
在这两种方式中,均需要处于中间位置的共享流量服务器平台来监听接入端和共享端的请求和响应。
目前,这两种方式只是不用输入密码,但是都需要进行密码验证,由位于后台的服务器获取密码后进行编解码和后台校验才能完成,这必然需要在服务器中配置专门的装置来完成获取密码和密码校验的工作,导致实现过程过于繁琐。而且,在共享端的WiFi功能关闭的情况下,接入端如果想要连接至该共享端,却不能自动开启WiFi功能并进行连接。
然而,针对上述技术问题,现有技术并没有提供一种有效的解决方案。
发明内容
本发明的主要目的在于提供一种流量共享方法及装置、终端,以克服现有技术中采用密码验证方式进行WiFi连接完成流量共享过程的方法过于繁琐的缺陷。
为了达到上述目的,本发明提供了一种流量共享方法,包括:共享端接收来自接入端的流量共享请求,其中,共享端是允许将流量提供给其它用户使用的终端,接入端是请求使用其它用户的流量的终端,流量共享请求中携带有接入端的身份信息;共享端使用身份信息对接入端进行身份鉴权,在鉴权通过的情况下,共享端将流量共享给接入端使用。
优选地,身份信息包括:接入端的媒体接入控制(MAC)地址和/或电话号码。
优选地,共享端使用身份信息对接入端进行身份鉴权,包括:共享端判断接入端的MAC地址和/或电话号码是否与共享端预先存储的允许使用共享端的流量的接入端的MAC地址和/或电话号码相一致;在判断结果为是的情况下,确认对接入端进行的身份鉴权通过。
优选地,共享端将流量共享给接入端使用,包括:共享端判断WiFi功能是处于开启状态还是处于关闭状态,如果处于开启状态,允许接入端直接通过WiFi功能连接至共享端后使用共享端的流量。
优选地,共享端将流量共享给接入端使用,还包括:如果处于关闭状态,共享端判断接入端已经从共享端使用的流量是否达到第一流量阈值,或者判断共享端已经共享给其它用户使用的总流量是否达到第二流量阈值;在判断结果为否的情况下,共享端打开WiFi功能,并允许接入端通过WiFi功能连接至共享端后使用共享端的流量;在判断结果为是的情况下,共享端保持WiFi功能的关闭状态,禁止接入端通过WiFi功能进行连接操作。
优选地,流量共享请求的传输方式包括:拨打电话或发送短信。
本发明还提供了一种流量共享装置,位于共享端,共享端是允许将流量提供给其它用户使用的终端,包括:接收模块,设置为接收来自接入端的流量共享请求,其中,接入端是请求使用其它用户的流量的终端,流量共享请求中携带有接入端的身份信息;共享模块,设置为使用身份信息对接入端进行身份鉴权,在鉴权通过的情况下,将共享端的流量共享给接入端使用。
优选地,身份信息包括:接入端的媒体接入控制(MAC)地址和/或电话号码;共享模块包括:判断单元,设置为判断接入端的MAC地址和/或电话号码是否与共享端中预先存储的允许使用共享端的流量的接入端的MAC地址和/或电话号码相一致;确定单元,设置为在判断单元的判断结果为是的情况下,确定对接入端进行的身份鉴权通过。
本发明还提供了一种终端,终端允许将流量提供给其它用户使用,终端包括:上述流量共享装置。
本发明还提供了一种流量共享方法,包括:接入端向共享端发送携带有接入端的身份信息的流量共享请求,使得共享端使用身份信息对接入端进行身份鉴权,其中,接入端是请求使用其它用户的流量的终端,共享端是允许将流量提供给其它用户使用的终端;在共享端的鉴权结果为通过的情况下,接入端通过共享端的WiFi功能连接至共享端,共享使用共享端的流量。
本发明还提供了一种流量共享装置,位于接入端,接入端是请求使用其它用户的流量的终端,包括:发送模块,设置为向共享端发送携带有接入端的身份信息的流量共享请求,使得共享端使用身份信息对接入端进行身份鉴权,其中,共享端是允许将流量提供给其它用户使用的终端;共享模块,设置为在共享端的鉴权结果为通过的情况下,通过共享端的WiFi功能连接至共享端,共享使用共享端的流量。
本发明还提供了一种终端,终端是请求使用其它用户的流量的终端,终端包括:上述流量共享装置。
与现有技术相比,本发明所述的流量共享方法及装置、终端,可以在被连接用户WiFi关闭的情况下,通过拨号或者短信快速自动连接WiFi设备,能够很好地共享剩余流量,而且可以在不知道用户WiFi密码或者密码变更的时候进行快速连接。
附图说明
图1是根据本发明实施例一的流量共享方法流程图;
图2是根据本发明实施例一的流量共享装置的结构框图;
图3是根据本发明实施例二的流量共享方法流程图;
图4是根据本发明实施例二的流量共享装置的结构框图;
图5是根据本发明优选实施例的流量共享流程图;
图6是根据本发明优选实施例的使用拨号方式触发WiFi连接的过程示意图;
图7是根据本发明优选实施例的使用短信方式触发WiFi连接的过程示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域的普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。
实施例一
本发明实施例提供了一种流量共享方法,该方法可以应用在可以共享出流量给其它用户使用的流量共享端。图1是根据本发明实施例一的流量共享方法流程图,如图1所示,该流程包括以下步骤(步骤S102-步骤S104):
步骤S102,共享端接收来自接入端的流量共享请求,其中,共享端是允许将流量提供给其它用户使用的终端,接入端是请求使用其它用户的流量的终端,流量共享请求中携带有接入端的身份信息。
步骤S104,共享端使用身份信息对接入端进行身份鉴权,在鉴权通过的情况下,共享端将流量共享给接入端使用。
通过图1所示的各个步骤,接入端只要通过共享端的身份鉴权,就可以使用共享端的流量,从而可以免去校验密码的麻烦。
在本发明实施例中,身份信息可以包括:接入端的媒体接入控制(MAC)地址和/或电话号码。基于此,在上述步骤S104中,共享端使用身份信息对接入端进行身份鉴权的过程可以通过以下方式实现:共享端判断接入端的MAC地址和/或电话号码是否与共享端预先存储的允许使用共享端的流量的接入端的MAC地址和/或电话号码相一致;在判断结果为是的情况下,确认对接入端进行的身份鉴权通过。
也就是说,共享端可以预先设置可以使用其流量的接入端的名单,当然,该名单是以MAC和/或电话号码的形式存储在共享端的,而在鉴权过程中,只要判断当前请 求功率流量的接入端的MAC和/或电话号码是否包括在共享端预先存储的名单上,即可确定身份鉴权的结果。
例如,在实际应用中,可以通过在流量较多且愿意分享流量的用户手机上安装一个安卓安装包(Android Package,简称为APK)程序,通过该程序设置白名单(即允许分享流量的手机),对于设置的这些MAC地址的用户,可以直接通过快捷拨号或者短信连接WiFi,不需要校验密码。如果分享流量的用户WiFi已经打开,可以直接连接。如果WiFi没有打开,在流量限额之内,可以自动去打开WiFi并连接。
在上述步骤S104中,共享端将流量共享给接入端使用的过程可以通过这样的方式实现:共享端先判断WiFi功能是处于开启状态还是处于关闭状态,如果处于开启状态,则可以允许接入端直接通过WiFi功能连接至共享端后使用共享端的流量。
优选地,如果处于关闭状态,共享端还可以进一步判断接入端已经从共享端使用的流量是否达到第一流量阈值(也就是说,共享端可以预先为其允许的每个共享其流量的接入端都设置一个单独的流量限制额度,以保障每个接入端可以共享的流量不会超出限制额度),或者判断共享端已经共享给其它用户使用的总流量是否达到第二流量阈值(也就是说,共享端可以预先为所有请求可以共享流程的接入端设置一个总的流量限制额度,以保障所有接入端可以共享的流量不会超出自己的允许范围),在判断结果为否的情况下,共享端打开WiFi功能,并允许接入端通过WiFi功能连接至共享端后使用共享端的流量,在判断结果为是的情况下,共享端保持WiFi功能的关闭状态,禁止接入端通过WiFi功能进行连接操作。
在本发明实施例中,流量共享请求的传输方式可以包括:拨打电话或发送短信。也就是说,接入端可以通过以拨打电话或发送短信的方式向共享端发出流量共享请求,当然,如果接入端没有通过身份鉴权或已经超过上述第一阈值或第二阈值,共享端也是可以拒绝其接入的,在这种情况下,如果为了使发出共享流量请求的接入端知道被拒绝的原因,如果有需要,共享端也是可以通过的拨打电话或发送短信的方式通知接入端的。
对应于图1所示的流量共享方法,本发明实施例还提供了一种流量共享装置,位于共享端(共享端是允许将流量提供给其它用户使用的终端),用于执行图1所示的流量共享方法。
图2是根据本发明实施例一的流量共享装置的结构框图,如图2所示,该装置可以包括:接收模块10和共享模块20,其中:
接收模块10,设置为接收来自接入端的流量共享请求,其中,接入端是请求使用其它用户的流量的终端,流量共享请求中携带有接入端的身份信息;共享模块20,设置为使用身份信息对接入端进行身份鉴权,在鉴权通过的情况下,将共享端的流量共享给接入端使用。
在本发明实施例中,身份信息可以包括:接入端的媒体接入控制(MAC)地址和/或电话号码。优选地,共享模块20可以包括:判断单元22,设置为判断接入端的MAC地址和/或电话号码是否与共享端中预先存储的允许使用共享端的流量的接入端的MAC地址和/或电话号码相一致;确定单元24,设置为在判断单元22的判断结果为是的情况下,确定对接入端进行的身份鉴权通过。
本发明实施例还提供了一种终端(未结合附图进行描述),该终端允许将流量提供给其它用户使用,该终端包括图2所示的流量共享装置。
实施例二
本发明实施例还提供了一种流量共享方法,该方法可以应用在可以需要共享其它用户的流量的接入端。图3是根据本发明实施例二的流量共享方法流程图,如图3所示,该流程包括以下步骤(步骤S302-步骤S304):
步骤S302,接入端向共享端发送携带有接入端的身份信息的流量共享请求,使得共享端使用身份信息对接入端进行身份鉴权,其中,接入端是请求使用其它用户的流量的终端,共享端是允许将流量提供给其它用户使用的终端。
步骤S304,在共享端的鉴权结果为通过的情况下,接入端通过共享端的WiFi功能连接至共享端,共享使用共享端的流量。
通过图3所示的各个步骤,接入端只要通过共享端的身份鉴权,就可以使用共享端的流量,从而可以免去校验密码的麻烦。
对应于图3所示的流量共享方法,本发明实施例还提供了一种流量共享装置,位于接入端(接入端是请求使用其它用户的流量的终端),用于执行图3所示的流程共享方法。
图4是根据本发明实施例二的流量共享装置的结构框图,如图4所示,该装置可以包括:发送模块30和共享模块40,其中:
发送模块30,设置为向共享端发送携带有接入端的身份信息的流量共享请求,使得共享端使用身份信息对接入端进行身份鉴权,其中,共享端是允许将流量提供给其它用户使用的终端;共享模块40,设置为在共享端的鉴权结果为通过的情况下,通过共享端的WiFi功能连接至共享端,共享使用共享端的流量。
本发明实施例还提供了一种终端(未结合附图进行描述),终端是请求使用其它用户的流量的终端,该终端包括图4所示的流量共享装置。
下面结合图5至图7以及优选实施例对上述实施例一和实施例二的实现过程进行详细的说明。
优选实施例
本优选实施例提供的流量共享方法,对于某些流量不足的用户,允许其通过拨号或短信方式直接接入流程富裕用户的终端,而无需校验密码,而且,在WiFi功能关闭的情况下也可以直接打开并自动连接,可以广泛适用于家庭、单位等小型流量共享应用场景。
图5是根据本发明优选实施例的流量共享流程图,如图5所示,该流程包括以下步骤:
步骤S502,在流量富裕用户的手机上新增允许直接接入用户的电话和MAC地址入白名单中,并设置其最大流量共享值;
步骤S504,流量不足用户准备连接流量富裕用户WiFi时,给其拨号电话或者发送短信;
步骤S506,流量富裕用户收到拨号或者短信请求,判断该用户是否在设置的白名单之内,判断结果为是时,执行步骤S508,判断结果为否时,执行步骤S504;
步骤S508,流量富裕用户判断该用户设定的流量是否已经用完,判断结果为否时,执行步骤S510,判断结果为是时,执行步骤S504;
步骤S510,流量富裕用户判断自己的WiFi是否开启,判断结果为是时,执行步骤S512,判断结果为否时,执行步骤S514;
步骤S512,流量不足用户正常连接WiFi上网;
步骤S514,流量富裕用户开启WiFi,可选地,还进一步判断是否允许流量不足用户连接WiFi。
下面对拨打电话方式和发送短信方式发出请求并完成流量共享的过程分别描述:
1、采用拨打电话方式完成流量共享的过程包括:
(1)在流量较多的用户手机(即上述实施例中的共享端)上通过软件预先存储允许共享网络的用户(即上述实施例中的接入端)的MAC地址和电话号码(也可以仅仅是MAC地址或电话号码),将其设置在白名单之内,还可以限制每个用户可以使用的最大流量,或者是该流量较多的用户能够分享出来的总流量。
(2)请求接入用户在准备接入共享WiFi用户时,向共享WiFi用户拨打电话,共享WiFi用户的设备接收到拨号请求时,根据电话号码和/或该设备的MAC地址是否和软件中设置一样,如果一样,不对接入用户进行校验密码,直接允许接入用户进行WiFi连接,并且去查询目前剩余的流量值,给用户返回数值,如果流量已经超过限定值(在实际应用中,可以根据需要决定对流量值进行哪种限定),可以以拨号方式告诉用户流量已经超过限定值,不允许接入用户进行WiFi连接。
(3)在共享WiFi用户的WiFi功能关闭的情况下,如果请求接入用户还没有达到分享的流量上限值(上述两种流行上限值均可,在实际应用中可以根据需要进行设定),共享WiFi用户接收到拨号请求时,可以去自动打开WiFi,允许请求接入用户进行WiFi连接,如果已经达到分享的流量上限值,则拒绝请求接入用户。
2、采用拨打电话方式完成流量共享的过程包括:
(1)在流量较多的用户手机(即上述实施例中的共享端)上通过软件预先存储允许共享网络的用户(即上述实施例中的接入端)的MAC地址和电话号码(也可以仅仅是MAC地址或电话号码),将其设置在白名单之内,还可以根据限制每个用户可以使用的最大流量,或者是该流量较多的用户能够分享出来的总流量。
(2)请求接入用户在准备接入WiFi时,向共享WiFi用户发送短信,共享WiFi用户的设备接收到短信请求时,无需对请求接入用户进行校验密码,根据电话号码和/或该设备的MAC地址是否和软件中设置一样,如果一样,直接允许接入用户进行WiFi连接,并且去查询目前剩余的流量值,给用户返回数值,如果流量已经超过限定值(在实际应用中,可以根据需要决定对流量值进行哪种限定),可以采用发送短信的方式告诉用户已经超过流量限定值,并且不允许用户连接WiFi。
(3)在共享WiFi用户的WiFi功能关闭的情况下,如果请求接入用户还没有达到分享的流量上限值(上述两种流行上限值均可,在实际应用中可以根据需要进行设定),共享WiFi用户接收到短信请求时,可以自动打开WiFi,允许请求接入用户进行WiFi连接,如果已经达到分享的流量上限值,则拒绝请求接入用户。
对于采用上述拨打电话方式或发送短信方式完流量共享方法的技术实现过程,以下结合应用框架层和应用程序层从软件实现层面进行进一步的描述。
请参考图6和图7(图6是根据本发明优选实施例的使用拨号方式触发WiFi连接的过程示意图,图7是根据本发明优选实施例的使用短信方式触发WiFi连接的过程示意图)。在该软件实现层面,拨打电话时需要用到双音多频(Dual Tone Multi Frequency,简称为DTMF)信令,通过DTMF编/解码器在编码时将击键产生的信息或数字转换成双音信号发送,解码时在收到DTMF信号中可以通过DTMF编/解码器检测,还原出基键产生的信息或数字。需要说明的是,拨号方式与短信方式所采用的编解码是不同的,拨号方式传输的是DTMF信令,短信方式传输的是协议数据单元(Protocol Data Unit,简称为PDU)串,因此,拨号方式需要DTMF信令编解码,而短信方式需要的是PDU串编解码。
无论是通过发送短信或者拨打电话触发,都需要事先双方约定好,例如,拨通电话之后,按键“11”或者发送短信内容为“连接WiFi_XXX”,对方收到之后进行解码校验并打开连接WiFi,对短信内容使用PDU进行编码,对拨打电话的拨号按键内容使用DTMF进行编码,对方收到之后进行PDU解码或者DTMF解码,如果获取到约定的内容,则进行WiFi连接。
在手机安卓(Andriod)系统中,拨打电话或者发送短信时,最先是应用框架层收到对方的AT指令,根据AT指令解析后将内容上传给应用程序层,应用程序层使用意图(Intent)机制在运行组件(Activity)之间传递消息,并进行校验,如校验通过向WiFi模块发送消息,WiFi模块去连接并打开WiFi。
优选地,在本优选实施例中,还可以对上述拨打电话方式和发送短信方式进行扩张,还可以通过微信的方式触发共享流量(前提是需要接入的用户必须有流量,可以上微信),例如可以这样实现流量共享过程:
(1)在流量较多的用户手机(即上述实施例中的共享端)上通过软件预先存储允许共享网络的用户(即上述实施例中的接入端)的MAC地址和电话号码(也可以仅仅是MAC地址或电话号码),将其设置在白名单之内,还可以限制每个用户可以使用的最大流量,或者是该流量较多的用户能够分享出来的总流量。
(2)请求接入用户在准备接入WiFi时,向共享WiFi用户发送微信请求,共享WiFi用的设备收到微信请求时,无需对请求接入用户进行校验密码,根据电话号码和/或该设备的MAC地址是否和软件中设置一样,如果一样,直接允许请求接入用户进行WiFi连接,并且去查询目前剩余的流量值,给用户返回数值,如果流量已经超过限定值(在实际应用中,可以根据需要决定对流量值进行哪种限定),可以以微信方式告诉用户已经超过流量限定值,并且不允许用户连接WiFi。
(3)在共享WiFi用户的WiFi功能关闭的情况下,如果请求接入用户还没有达到分享的流量上限值(上述两种流行上限值均可,在实际应用中可以根据需要进行设定),共享WiFi用户接收到微信请求时,可以自动打开WiFi,允许请求接入用户进行连接WiFi连接,如果已经达到分享的流量上限值,则拒绝请求接入用户。
本优选实施例可以应用的场景包括智能手机、中国产品经理联盟创新论坛(UCPM FROUM OF INNOVATION,简称为UFI)产品、以及客户前提设备(Customer Premise Equipment,简称为CPE)产品等技术上可以实现流量共享的场景。
通过本优选实施例,可以在被连接用户WiFi关闭的情况下,通过拨号或者短信快速自动连接WiFi设备,能够很好地共享剩余流量,而且可以在不知道用户WiFi密码或者密码变更的时候进行快速连接。
工业实用性:通过上述描述可知,本发明可以在被连接用户WiFi关闭的情况下,通过拨号或者短信快速自动连接WiFi设备,能够很好地共享剩余流量,而且可以在不知道用户WiFi密码或者密码变更的时候进行快速连接。
以上所述是本发明的优选实施方式,应当指出,对于本领域的普通技术人员来说,在不脱离本发明所述原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为包含在本发明的保护范围之内。

Claims (12)

  1. 一种流量共享方法,包括:
    共享端接收来自接入端的流量共享请求,其中,所述共享端是允许将流量提供给其它用户使用的终端,所述接入端是请求使用其它用户的流量的终端,所述流量共享请求中携带有所述接入端的身份信息;
    所述共享端使用所述身份信息对所述接入端进行身份鉴权,在鉴权通过的情况下,所述共享端将流量共享给所述接入端使用。
  2. 根据权利要求1所述的方法,其中,所述身份信息包括:所述接入端的媒体接入控制MAC地址和/或电话号码。
  3. 根据权利要求2所述的方法,其中,所述共享端使用所述身份信息对所述接入端进行身份鉴权,包括:
    所述共享端判断所述接入端的MAC地址和/或电话号码是否与所述共享端预先存储的允许使用所述共享端的流量的接入端的MAC地址和/或电话号码相一致;
    在判断结果为是的情况下,确认对所述接入端进行的身份鉴权通过。
  4. 根据权利要求1所述的方法,其中,所述共享端将流量共享给所述接入端使用,包括:
    所述共享端判断无线保真网WiFi功能是处于开启状态还是处于关闭状态,如果处于开启状态,允许所述接入端直接通过WiFi功能连接至所述共享端后使用所述共享端的流量。
  5. 根据权利要求4所述的方法,其中,所述共享端将流量共享给所述接入端使用,还包括:
    如果处于关闭状态,所述共享端判断所述接入端已经从所述共享端使用的流量是否达到第一流量阈值,或者判断所述共享端已经共享给其它用户使用的总流量是否达到第二流量阈值;
    在判断结果为否的情况下,所述共享端打开WiFi功能,并允许所述接入端通过WiFi功能连接至所述共享端后使用所述共享端的流量;
    在判断结果为是的情况下,所述共享端保持WiFi功能的关闭状态,禁止所述接入端通过WiFi功能进行连接操作。
  6. 根据权利要求1至5中任一项所述的方法,其中,所述流量共享请求的传输方式包括:拨打电话或发送短信。
  7. 一种流量共享装置,位于共享端,所述共享端是允许将流量提供给其它用户使用的终端,包括:
    接收模块,设置为接收来自接入端的流量共享请求,其中,所述接入端是请求使用其它用户的流量的终端,所述流量共享请求中携带有所述接入端的身份信息;
    共享模块,设置为使用所述身份信息对所述接入端进行身份鉴权,在鉴权通过的情况下,将所述共享端的流量共享给所述接入端使用。
  8. 根据权利要求7所述的装置,其中,
    所述身份信息包括:所述接入端的媒体接入控制MAC地址和/或电话号码;
    所述共享模块包括:
    判断单元,设置为判断所述接入端的MAC地址和/或电话号码是否与所述共享端中预先存储的允许使用所述共享端的流量的接入端的MAC地址和/或电话号码相一致;
    确定单元,设置为在所述判断单元的判断结果为是的情况下,确定对所述接入端进行的身份鉴权通过。
  9. 一种终端,所述终端允许将流量提供给其它用户使用,所述终端包括:权利要求7或8所述的流量共享装置。
  10. 一种流量共享方法,包括:
    接入端向共享端发送携带有所述接入端的身份信息的流量共享请求,使得所述共享端使用所述身份信息对所述接入端进行身份鉴权,其中,所述接入端是请求使用其它用户的流量的终端,所述共享端是允许将流量提供给其它用户使用的终端;
    在所述共享端的鉴权结果为通过的情况下,所述接入端通过所述共享端的WiFi功能连接至所述共享端,共享使用所述共享端的流量。
  11. 一种流量共享装置,位于接入端,所述接入端是请求使用其它用户的流量的终端,包括:
    发送模块,设置为向共享端发送携带有所述接入端的身份信息的流量共享请求,使得所述共享端使用所述身份信息对所述接入端进行身份鉴权,其中,所述共享端是允许将流量提供给其它用户使用的终端;
    共享模块,设置为在所述共享端的鉴权结果为通过的情况下,通过所述共享端的WiFi功能连接至所述共享端,共享使用所述共享端的流量。
  12. 一种终端,所述终端是请求使用其它用户的流量的终端,所述终端包括:权利要求11所述的流量共享装置。
PCT/CN2015/083113 2014-12-29 2015-07-01 流量共享方法及装置、终端 WO2016107124A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410836190.0A CN105813071B (zh) 2014-12-29 2014-12-29 流量共享方法及装置、终端
CN201410836190.0 2014-12-29

Publications (1)

Publication Number Publication Date
WO2016107124A1 true WO2016107124A1 (zh) 2016-07-07

Family

ID=56284091

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/083113 WO2016107124A1 (zh) 2014-12-29 2015-07-01 流量共享方法及装置、终端

Country Status (2)

Country Link
CN (1) CN105813071B (zh)
WO (1) WO2016107124A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756863A (zh) * 2018-12-17 2019-05-14 上海仝骋科技有限公司 一种与车载电子设备共享手机流量的装置
CN113993103A (zh) * 2021-10-22 2022-01-28 安徽江淮汽车集团股份有限公司 用于车载终端的网络自动互联方法
CN114710758A (zh) * 2022-04-08 2022-07-05 成都中科大旗软件股份有限公司 一种基于多应用和多用户的短信池共享方法及系统

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666669A (zh) * 2016-07-29 2018-02-06 中兴通讯股份有限公司 一种数据共享方法及装置
CN106789470B (zh) * 2016-12-23 2021-06-18 Tcl海外电子(惠州)有限公司 终端资源共享方法、装置和系统
CN106686596A (zh) * 2017-03-13 2017-05-17 联想(北京)有限公司 一种数据网络共享方法、主设备和从设备
CN107197460B (zh) * 2017-05-27 2021-06-22 惠州Tcl移动通信有限公司 一种网络共享的方法及系统
CN107343272A (zh) * 2017-06-22 2017-11-10 努比亚技术有限公司 一种数据流量共享方法及移动终端
CN107295518A (zh) * 2017-07-28 2017-10-24 中科创达软件科技(深圳)有限公司 一种无线连接方法及系统、终端设备
CN108668275A (zh) * 2018-03-09 2018-10-16 深圳捷豹电波科技有限公司 流量共享实现方法及流量共享装置
CN113840266B (zh) * 2020-06-24 2024-05-03 华为技术有限公司 蓝牙配对方法、装置、系统、电子设备和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546753A (zh) * 2011-12-08 2012-07-04 上海博泰悦臻电子设备制造有限公司 移动终端共享车载端网络的方法和系统
CN102932958A (zh) * 2011-08-12 2013-02-13 中兴通讯股份有限公司 实时数据共享方法、装置及系统
CN103117906A (zh) * 2013-02-27 2013-05-22 广东欧珀移动通信有限公司 一种移动终端共享WiFi热点时的流量监控方法
WO2013143433A1 (zh) * 2012-03-28 2013-10-03 青岛海信移动通信技术股份有限公司 一种无线数据共享的方法及实现共享的终端
CN103369527A (zh) * 2012-04-01 2013-10-23 腾讯科技(深圳)有限公司 一种WiFi网络共享方法、装置及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010045302A1 (en) * 2008-10-14 2010-04-22 Starent Networks, Corp Flow balancing in communications networks
CN102833831A (zh) * 2012-08-21 2012-12-19 中兴通讯股份有限公司 实现动态休眠和唤醒的网卡设备、路由设备、系统及方法
CN103596121B (zh) * 2013-10-30 2016-08-17 北京网河时代科技有限公司 面向无线移动网络的流量共享方法
CN103889029A (zh) * 2014-03-24 2014-06-25 深圳市云猫信息技术有限公司 一种网络热点共享方法及客户端、共享端、管理服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932958A (zh) * 2011-08-12 2013-02-13 中兴通讯股份有限公司 实时数据共享方法、装置及系统
CN102546753A (zh) * 2011-12-08 2012-07-04 上海博泰悦臻电子设备制造有限公司 移动终端共享车载端网络的方法和系统
WO2013143433A1 (zh) * 2012-03-28 2013-10-03 青岛海信移动通信技术股份有限公司 一种无线数据共享的方法及实现共享的终端
CN103369527A (zh) * 2012-04-01 2013-10-23 腾讯科技(深圳)有限公司 一种WiFi网络共享方法、装置及系统
CN103117906A (zh) * 2013-02-27 2013-05-22 广东欧珀移动通信有限公司 一种移动终端共享WiFi热点时的流量监控方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756863A (zh) * 2018-12-17 2019-05-14 上海仝骋科技有限公司 一种与车载电子设备共享手机流量的装置
CN113993103A (zh) * 2021-10-22 2022-01-28 安徽江淮汽车集团股份有限公司 用于车载终端的网络自动互联方法
CN113993103B (zh) * 2021-10-22 2024-01-19 安徽江淮汽车集团股份有限公司 用于车载终端的网络自动互联方法
CN114710758A (zh) * 2022-04-08 2022-07-05 成都中科大旗软件股份有限公司 一种基于多应用和多用户的短信池共享方法及系统

Also Published As

Publication number Publication date
CN105813071A (zh) 2016-07-27
CN105813071B (zh) 2020-09-15

Similar Documents

Publication Publication Date Title
WO2016107124A1 (zh) 流量共享方法及装置、终端
KR102373463B1 (ko) 통신 단말들간 무선 통신을 위한 방법 및 장치
US9288229B2 (en) Device association via video handshake
KR20180026520A (ko) 교차-단말 로그인-프리 방법 및 장치
CN108521644B (zh) 一种网络接入方法及设备、系统
US9450930B2 (en) Device association via video handshake
WO2013071208A2 (en) Device association via video handshake
EP3029908B1 (en) Service authority determination method and device
US20180054527A1 (en) LTE Cellular Mobile Network Access System and Corresponding Communication Method
TW201830949A (zh) 共用使用者身份模組卡的方法和行動終端
US9843686B2 (en) Method, apparatus, and system for allocating phone number
CN105516964A (zh) 一种实现远程控制的方法和终端
US20110286443A1 (en) System, apparatus and method for roaming in dect-voip network
JP5212071B2 (ja) 通信装置および移動端末
RU2439702C2 (ru) Способ осуществления транзакции между двумя серверами с предварительной проверкой достоверности посредством двух мобильных телефонов
US20240031363A1 (en) Multi-Factor Message Authentication
EP3105900B1 (en) Method and system for determining that a sim and a sip client are co-located in the same mobile equipment
WO2016131297A1 (zh) 一种限制非许可用户设备接入家庭网关的方法和装置
JP2009232108A (ja) 通信装置及びコンピュータプログラム
CN104185160A (zh) 一种移动业务应用迁移系统及其代理终端
KR101531198B1 (ko) 푸쉬 메시지를 이용하여 인증을 수행하는 호 처리 장치 및 방법
KR100563711B1 (ko) 통신 단말기를 이용한 계약 인증방법 및 시스템
KR102408355B1 (ko) 이동통신 단말기의 원격 통화 연결 모듈, 원격 통화 연결 모듈의 원격 통화 연결 방법 및 이 방법을 실행시키기 위하여 매체에 저장된 프로그램, 그리고 원격 통화 연결 시스템
KR101408590B1 (ko) Sip 통신 시스템 및 그 제어방법과, sip 통신 시스템에 포함되는 통신 접속 장치 및 그 제어방법
KR102408353B1 (ko) 이동통신 단말기의 원격 통화 연결 모듈, 원격 통화 연결 모듈의 원격 통화 연결 방법 및 이 방법을 실행시키기 위하여 매체에 저장된 프로그램, 그리고 원격 통화 연결 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15874814

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15874814

Country of ref document: EP

Kind code of ref document: A1