WO2016165505A1 - 连接控制方法及装置 - Google Patents

连接控制方法及装置 Download PDF

Info

Publication number
WO2016165505A1
WO2016165505A1 PCT/CN2016/075542 CN2016075542W WO2016165505A1 WO 2016165505 A1 WO2016165505 A1 WO 2016165505A1 CN 2016075542 W CN2016075542 W CN 2016075542W WO 2016165505 A1 WO2016165505 A1 WO 2016165505A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
request
group
information
control
Prior art date
Application number
PCT/CN2016/075542
Other languages
English (en)
French (fr)
Inventor
柳钦
王斌
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016165505A1 publication Critical patent/WO2016165505A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure

Definitions

  • the present invention relates to the field of communications, and in particular to a connection control method and apparatus.
  • the user can access the Internet anytime and anywhere, and with the aging of the mobile phone user, it is difficult for the parent to control the information of the ward's online time and the content of the Internet access, resulting in the vision of the ward being affected by the Internet. And learning. From this, it is understood that there is a problem in that the connection control efficiency is low in the related art.
  • the present invention provides a connection control method and apparatus to at least solve the problem of low connection control efficiency existing in the related art.
  • a connection control method comprising: receiving a request of a terminal, wherein the request is used to request a data service, where the request carries at least an identifier of the terminal; The identifier of the terminal determines the group to which the terminal belongs, wherein the terminal in the group shares a network connection account; and controls the terminal to perform data service according to the control information corresponding to the terminal in the group.
  • control information includes at least one of the following: time information, location information, target information, and a traffic usage policy, where the time information is used to determine whether the terminal is allowed to perform data services at a current time;
  • the location information is used to determine whether the terminal is allowed to perform data service at the current location of the terminal;
  • the target information is used to determine whether the target of the data service requested by the terminal allows the terminal to access; Controlling the traffic generated by the terminal for data services.
  • the traffic usage policy includes at least one of: a time when the terminal is capable of performing data services, a traffic that the terminal performs for data services, and a quality of service QoS of the terminal for performing data services.
  • the location information includes at least one of the following: network protocol IP address information of the terminal, general service packet radio service support node SGSN location information, and base station location information.
  • the receiving the request by the terminal includes: receiving the request forwarded by a core network, where the request is sent by the terminal to a predetermined access point name APN, where the predetermined APN is used according to the The group to which the terminal belongs The data service of the terminal is controlled.
  • controlling the terminal to perform data service according to the control information corresponding to the terminal in the group includes: determining, according to control information corresponding to the terminal in the group, a control policy for the terminal; The interface notifies the control network of the control policy, wherein the core network is configured to control the terminal to perform data services according to the control policy.
  • controlling the terminal to perform data service according to the control information of the terminal in the group includes: creating a session, where the session is used to record information about the data service performed by the terminal; The control information and the information recorded in the session control the terminal to perform data services.
  • the method further includes: releasing the session after the terminal ends the data service.
  • the method further includes: receiving a modification request, where the modification request carries at least an identifier of the initiator of the modification request and a modification password, where the modification request is used to request to modify the group; Whether the identifier and the modified password are legal; if the verification result is legal, the group is modified according to the modification request; and if the verification result is illegal, the modification request is rejected.
  • the modification request is used to modify at least one of: adding a terminal in the group, deleting a terminal in the group, modifying a terminal in the group, modifying a right to manage the group, Modify the control information in the group.
  • the method further includes: receiving a query request, where the query request carries at least an identifier of an initiator of the query request and a query password, where the query request is used to request to query a terminal in the group And verifying whether the identifier and the query password are legal; if the verification result is legal, obtaining the query result according to the query request, and returning the obtained query result to the initiator of the query request; If the verification result is illegal, the query request is rejected.
  • the query request is used to query at least one of: information about a terminal in the group, information about a data service performed by a predetermined terminal in the group, control information corresponding to a predetermined terminal in the group, Permission information for managing the group.
  • a connection control apparatus comprising: a first receiving module configured to receive a request of a terminal, wherein the request is for requesting data service, and at least the request is carried
  • the determining module is configured to determine, according to the identifier of the terminal, a group to which the terminal belongs, where the terminal in the group shares a network connection account; and the control module is configured to be in the group according to the terminal
  • the corresponding control information controls the terminal to perform data services.
  • control information includes at least one of the following: time information, location information, target information, and a traffic usage policy, where the time information is used to determine whether the terminal is allowed to perform data services at a current time;
  • the location information is used to determine whether the terminal is allowed to perform data service at the current location of the terminal;
  • the target information is used to determine whether the target of the data service requested by the terminal allows the terminal to access; Controlling the traffic generated by the terminal for data services.
  • the traffic usage policy includes at least one of the following: a time, a location at which the terminal can perform data services.
  • the location information includes at least one of the following: network protocol IP address information of the terminal, general service packet radio service support node SGSN location information, and base station location information.
  • the first receiving module includes: a receiving unit, configured to receive the request forwarded by a core network, where the request is sent by the terminal to a predetermined access point name APN, where the predetermined APN is used. Controlling data services of the terminal according to the group to which the terminal belongs.
  • control module includes: a determining unit, configured to determine a control policy for the terminal according to control information corresponding to the terminal in the group; and a notification unit, configured to use the control interface by using a data interface Notifying the core network, wherein the core network is configured to control the terminal to perform data services according to the control policy.
  • control module includes: a creating unit, configured to create a session, where the session is used to record information about the data service performed by the terminal; and the control unit is configured to compare the control information with the session The information recorded therein controls the terminal to perform data services.
  • the device further includes: a release module, configured to release the session after the terminal ends the data service.
  • a release module configured to release the session after the terminal ends the data service.
  • the device further includes: a second receiving module, configured to receive a modification request, where the modification request carries at least an identifier of the initiator of the modification request and a modification password, where the modification request is used for the request Modifying the group; the first verification module is configured to verify whether the identifier and the modified password are legal; and the modifying module is configured to: according to the modification request, if the verification result of the first verification module is legal Modifying the group; the first rejecting module is configured to reject the modification request if the verification result of the first verification module is illegal.
  • a second receiving module configured to receive a modification request, where the modification request carries at least an identifier of the initiator of the modification request and a modification password, where the modification request is used for the request Modifying the group
  • the first verification module is configured to verify whether the identifier and the modified password are legal
  • the modifying module is configured to: according to the modification request, if the verification result of the first verification module is legal Modifying the group
  • the first rejecting module is configured to reject
  • the modification request is used to modify at least one of: adding a terminal in the group, deleting a terminal in the group, modifying a terminal in the group, modifying a right to manage the group, Modify the control information in the group.
  • the device further includes: a third receiving module, configured to receive a query request, where the query request carries at least an identifier of the initiator of the query request and a query password, where the query request is used for the request Querying the information of the terminal in the group; the second verification module is configured to verify whether the identifier and the query password are legal; and the query module is configured to: when the verification result of the second verification module is legal, according to The query request acquires the query result and returns the obtained query result to the initiator of the query request; and the second rejection module is configured to reject the verification if the verification result of the second verification module is illegal Query request.
  • a third receiving module configured to receive a query request, where the query request carries at least an identifier of the initiator of the query request and a query password, where the query request is used for the request Querying the information of the terminal in the group
  • the second verification module is configured to verify whether the identifier and the query password are legal
  • the query module is configured to: when the verification result of
  • the query request is used to query at least one of: information about a terminal in the group, information about a data service performed by a predetermined terminal in the group, control information corresponding to a predetermined terminal in the group, Permission information for managing the group.
  • a computer storage medium storing an execution instruction for performing the method of any of the above.
  • a request is received from a receiving terminal, wherein the request is for requesting a data service, the request At least the identifier of the terminal is carried in the group; the group to which the terminal belongs is determined according to the identifier of the terminal, wherein the terminal in the group shares a network connection account; according to the control information corresponding to the terminal in the group
  • the terminal is controlled to perform data services, which solves the problem of low connection control efficiency in the related art, thereby achieving the effect of improving connection control efficiency.
  • FIG. 1 is a flow chart of a connection control method according to an embodiment of the present invention.
  • connection control device is a block diagram showing the structure of a connection control device according to an embodiment of the present invention
  • FIG. 3 is a structural block diagram of a first receiving module 22 in a connection control apparatus according to an embodiment of the present invention
  • FIG. 4 is a block diagram 1 of a control module 26 in a connection control apparatus according to an embodiment of the present invention
  • FIG. 5 is a structural block diagram 2 of a control module 26 in a connection control apparatus according to an embodiment of the present invention.
  • FIG. 6 is a block diagram 1 of a preferred structure of a connection control device according to an embodiment of the present invention.
  • FIG. 7 is a block diagram 2 of a preferred structure of a connection control apparatus according to an embodiment of the present invention.
  • FIG. 8 is a block diagram 3 of a preferred structure of a connection control apparatus according to an embodiment of the present invention.
  • FIG. 9 is a block diagram showing the structure of a system according to an embodiment of the present invention.
  • FIG. 10 is a flowchart of controlling a user's Internet access according to an embodiment of the present invention.
  • FIG. 11 is a flow chart for controlling user location change according to an embodiment of the present invention.
  • FIG. 12 is a flowchart of a system for monitoring a user's Internet access according to an embodiment of the present invention
  • FIG. 13 is a flowchart of ending a user's Internet access according to an embodiment of the present invention.
  • FIG. 14 is a flow chart for controlling user management in accordance with an embodiment of the present invention.
  • FIG. 1 is a flow of a connection control method according to an embodiment of the present invention.
  • the process diagram, as shown in Figure 1, the process includes the following steps:
  • Step S102 Receive a request of the terminal, where the request is used to request a data service, where the request carries at least an identifier of the terminal;
  • Step S104 Determine, according to the identifier of the terminal, a group to which the terminal belongs, where the terminals in the group share a network connection account;
  • Step S106 Control the terminal to perform data service according to the control information corresponding to the terminal in the group.
  • the terminal when the terminal performs the data service, the terminal can share the network connection account with other terminals in the group, share the traffic, and each terminal corresponds to the control information in the group in which the terminal is located, and the control information can be controlled by the terminal.
  • the data service realizes the effect of effectively controlling the terminal to perform data services. Therefore, the problem of low connection control efficiency existing in the related art is solved, and the effect of improving the connection control efficiency is achieved.
  • control information may include at least one of the following: time information, location information, target information, and traffic usage policy, where The time information is used to determine whether the terminal is allowed to perform data service at the current time; the location information is used to determine whether the terminal allows the terminal to perform data service at the current location of the terminal; the target information is used to determine whether the target of the data service requested by the terminal is allowed. Terminal access; the traffic usage policy is used to control the traffic generated by the terminal for data services.
  • the control information is specified.
  • the time rejects the terminal's data service request.
  • location, target, and traffic usage may be the website connected to the terminal when performing data service, and the content of the web page viewed. Thereby effectively controlling the data service of the terminal.
  • the traffic usage policy described above may include available traffic, which in turn may be subdivided into available traffic at idle time and available traffic at busy time.
  • the foregoing traffic usage policy may include at least one of: a time when the terminal is capable of performing data services, a traffic that the terminal performs for data services, and a quality of service QoS of the terminal for performing data services. .
  • the location of the terminal may be identified by using different information.
  • the location information may include at least one of the following: network protocol IP address information of the terminal, and wireless service support of the general service packet. Node SGSN location information, base station location information. Of course, other information for identifying the location of the terminal can also be used.
  • the receiving the request of the terminal may include: receiving a request forwarded by the core network, where the request may be sent by the terminal to a predetermined access point name APN, where the predetermined APN is used according to the terminal The group controls the data service of the terminal.
  • the controlling the terminal to perform the data service according to the control information corresponding to the terminal in the group includes: determining a control policy for the terminal according to the control information corresponding to the terminal in the group; and notifying the control network to the core network by using the data interface, where The core network is used to control the terminal to perform data services according to the control policy. That is, when controlling the data service of the terminal, it is implemented through the core network.
  • controlling the terminal to perform data services according to the control information corresponding to the terminal in the group includes: creating a session, where the session is used to record information about the terminal performing data services; and comparing the control information with the session.
  • the recorded information controls the terminal to perform data services.
  • the information about the data service performed by the terminal may be recorded in other manners, where the information about the data service of the terminal includes the time when the terminal performs the data service, the time of use, the location of the terminal, and the traffic used by the terminal. Information such as websites and web pages viewed by the terminal. Therefore, the recorded information can clearly determine the specific situation of the terminal performing data services.
  • the created session described above can be used to record the data service of the terminal once (of course, can also record a predetermined number of times). After the terminal ends the data service, the created session can be released.
  • control information may be preset and stored, and different control information may be set for different terminals, control information for a certain terminal may be modified, or related information in the group may be modified.
  • the method further includes: receiving a modification request, where the modification request carries at least an identifier of the initiator of the modification request and a modification password, where the modification request is used to request to modify the group; Whether the modification password is legal; if the verification result is legal, the group is modified according to the above modification request; if the verification result is illegal, the modification request is rejected.
  • the foregoing modification request may be used to modify at least one of the following: adding a terminal in the group, deleting a terminal in the group, modifying a terminal in the group, modifying a right for managing the group, and modifying control information in the group.
  • the terminal in the modified group may be replaced by another terminal that does not belong to the group, or may be the identification information of a terminal in the modified group. Or other information.
  • the method further includes: receiving a query request, where the query request carries at least the initiator of the query request The identifier and the query password are used to request the information of the terminal in the query group; whether the verification identifier and the query password are legal; if the verification result is legal, the query result is obtained according to the query request and the obtained query result is returned to the query. The originator of the request; if the verification result is illegal, the query request is rejected.
  • the query request is used to query at least one of the following: information of the terminal in the group, information about the data service performed by the predetermined terminal in the group, control information corresponding to the predetermined terminal in the group, and authority information for managing the group.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods of various embodiments of the present invention.
  • connection control device which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • module may implement a combination of software and/or hardware of a predetermined function.
  • apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 2 is a block diagram showing the structure of a connection control device according to an embodiment of the present invention. As shown in FIG. 2, the device includes a first receiving module 22, a determining module 24, and a control module 26. The device will be described below.
  • the first receiving module 22 is configured to receive a request of the terminal, where the request is used to request data service, and the request carries at least the identifier of the terminal;
  • the determining module 24 is connected to the first receiving module 22, and is configured to be based on the terminal.
  • the identifier identifies the group to which the terminal belongs, wherein the terminals in the group share the network connection account;
  • the control module 26 is connected to the determining module 24, and is configured to control the terminal to perform data services according to the control information corresponding to the terminal in the group.
  • the network connection control information includes at least one of the following: time information, location information, target information, and a traffic usage policy, where the time information is used to determine whether the terminal is allowed to perform data services at the current time; the location information is used for Determining whether the terminal is allowed to perform data service in the current location of the terminal; the target information is used to determine whether the terminal requests the data service to allow the terminal to access; the traffic usage policy is used to control the traffic generated by the terminal for the data service.
  • the foregoing traffic usage policy may include at least one of the following: a time at which the terminal can perform data services, a traffic that the terminal can use for data services, and a quality of service QoS for the terminal to perform data services.
  • the location information may include at least one of the following: network protocol IP address information of the terminal, general service packet radio service support node SGSN location information, and base station location information.
  • FIG. 3 is a structural block diagram of a first receiving module 22 in a connection control apparatus according to an embodiment of the present invention. As shown in FIG. 3, the first receiving module 22 includes a receiving unit 32, and the first receiving module 22 is described below. .
  • the receiving unit 32 is configured to receive a request forwarded by the core network, where the request is sent by the terminal to the predetermined access point name APN, and the predetermined APN is used to control the data service of the terminal according to the group to which the terminal belongs.
  • control module 26 includes a determining unit 42 and a notifying unit 44.
  • the control module 26 will be described below.
  • the determining unit 42 is configured to determine a control policy for the terminal according to the corresponding control information of the terminal in the group; the notification unit 44 is connected to the determining unit 42 and configured to notify the core network by using a data interface, where the core The network is used to control the terminal to perform data services according to the control policy.
  • control module 26 includes a creation unit 52 and a control unit 54, which will be described below.
  • the creating unit 52 is configured to create a session, wherein the session is used to record information of the terminal performing data service;
  • the control unit 54 is connected to the creating unit 52, and is configured to control the terminal to perform data by comparing the control information with the information recorded in the session. business.
  • FIG. 6 is a block diagram of a preferred structure of a connection control apparatus according to an embodiment of the present invention. As shown in FIG. 6, the apparatus includes a release module 62 in addition to all the modules shown in FIG. 5, and the apparatus is described below. .
  • the release module 62 is connected to the control module 26, and is configured to release the session after the terminal ends the data service.
  • FIG. 7 is a block diagram of a preferred structure of a connection control apparatus according to an embodiment of the present invention.
  • the apparatus includes a second receiving module 72 and a first verification module 74 in addition to all the modules shown in FIG.
  • the modification module 76 and the first rejection module 78 wherein the location relationship between the second receiving module 72 and each module in FIG. 2 may be various, for example, the modification request may be received before receiving the request of the terminal, or A modification request is received after controlling the data service of the terminal. The following is an example of first controlling the service data of the terminal and then receiving the modification request.
  • the second receiving module 72 is connected to the foregoing control module 26, and is configured to receive a modification request, where the modification request carries at least an identifier of the initiator of the modification request and a modification password, and the modification request is used to request the modification group; the first verification module 74, connected to the second receiving module 72, configured to verify whether the identifier and the modified password are legal; the modifying module 76 is connected to the first verification module 74, and is configured to be valid when the verification result of the first verification module 74 is legal.
  • the group is modified according to the modification request;
  • the first rejection module 78 is connected to the first verification module 74, and is configured to reject the modification request if the verification result of the first verification module 74 is illegal.
  • the foregoing modification request is used to modify at least one of the following: adding a terminal in the group, deleting a terminal in the group, modifying a terminal in the group, modifying a right for managing the group, and modifying control information in the group.
  • FIG. 8 is a block diagram 3 of a preferred structure of a connection control apparatus according to an embodiment of the present invention.
  • the apparatus includes a third receiving module 82 and a second verification module 84 in addition to all the modules shown in FIG.
  • the query module 86 and the second reject module 88 are similar to FIG. 7.
  • the positional relationship between the third receiving module 82 and each module in FIG. 2 may be various, for example, the query request may be received before receiving the request of the terminal. It is also possible to receive a query request after controlling the data service of the terminal. The following is an example of receiving a query request after controlling the data service of the terminal.
  • the third receiving module 82 is connected to the control module 26, and is configured to receive a query request, where the query request carries at least an identifier of the initiator of the query request and a query password, and the query request is used to request the terminal in the query group.
  • the second verification module 84 is connected to the third receiving module 82, and is configured to verify whether the identifier and the query password are legal.
  • the query module 86 is connected to the second verification module 84 and configured to be in the second verification module 84.
  • the second rejection module 88 is connected to the second verification module 84, and is set to be in the second If the verification result of the verification module 84 is illegal, the inquiry request is rejected.
  • the query request is used to query at least one of the following: information of the terminal in the group, information about the data service performed by the predetermined terminal in the group, control information corresponding to the predetermined terminal in the group, and authority information for the management group.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the request of the terminal is received, where the request is used to request a data service, where the request carries at least an identifier of the terminal;
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the above group is a family
  • the terminal in the group is a member of a family
  • the members share a household traffic account as an example to explain the present invention.
  • a virtual private network (VPN) solution is provided. All members in the family share a home traffic account, and the home sharing traffic is used, and the parent can manage the online time and traffic of each member. And control the time and location of each member's Internet access, network speed and Internet content.
  • VPN virtual private network
  • a home flow control method and system are provided, where the system includes:
  • a data communication interface (the same as the first receiving module 22, the second receiving module 72, and the third receiving module 82): providing an external interface, so that the user's online request and management request can be processed by the system;
  • the data storage device (the same as the determination module 24, the control module 26, the first verification module 74, the modification module 76, the first rejection module 78, the second verification module 84, the query module 86, the second rejection module 88) is set to Store user information, as well as various authentication, operation, and control logic;
  • Encryption and decryption operation module set to use a general or customized encryption and decryption algorithm to encrypt and decrypt information such as passwords;
  • User Internet access function For family members, share an online account. Each member does not need to purchase traffic separately, and can directly access the Internet. The generated traffic is calculated in the home Internet account. At the same time, the user requests the Internet, according to the user's family and current. The location and the current time are authenticated, and the user is allowed to use the allocated traffic at the allowed time and location, and automatically cuts off after the time and traffic are exceeded.
  • Step A The home flow control system receives an online request from the core online newspaper, and the interface includes a unique identifier of the terminal connected to the Internet such as an IMSI or a mobile phone number, a location of the Internet, and a Uniform Resource Locator (hereinafter referred to as url) of the requesting website. information.
  • a unique identifier of the terminal connected to the Internet such as an IMSI or a mobile phone number, a location of the Internet, and a Uniform Resource Locator (hereinafter referred to as url) of the requesting website. information.
  • url Uniform Resource Locator
  • Step B The data communication interface performs format authentication on the user's online request and converts it into an internal protocol.
  • Step C The home flow control system identifies the home to which the user belongs according to the unique identifier of the terminal, obtains the allowed online location and time of the terminal, and compares the actual network location and system time of the user to determine that the user is currently Whether the location and the current time allow Internet access, and then determine the user's online content according to the user's url, and whether the user's online content is allowed.
  • Step D If the user authentication fails, the core network is notified through the data communication interface that the online request is not allowed.
  • Step E If the user passes the online request, the data storage device queries the traffic and traffic usage policy that the terminal can allocate in the user's home. At the same time, a user session session is established to control the user to access the Internet at any time.
  • Step F Send information such as the time, traffic, and Quality of Service (QOS) that the user can use at this time to the core network through the data communication interface.
  • QOS Quality of Service
  • Step G When the location of the user changes, the core network notifies the home flow control system of the new location information of the user, and the home flow control system scans the user's session and user data to determine whether the user is allowed to access the Internet at the location, if not allowed. If the Internet access, the core network is notified to terminate the Internet connection; if the user can access the Internet, the time and traffic that the user can use in the new location and the QOS information are queried, and then sent to the core network for management through the data communication interface.
  • Step H The home flow control system scans the session at any time. When it is found that the user's online time reaches or occurs other conditions that trigger the termination of the Internet access, the core network is notified through the data communication interface to terminate the user's Internet connection.
  • Administrator function In order to achieve data security, a unified data communication interface is provided, and the user uses the interface for management without contacting the data storage device and the encryption and decryption operation module.
  • the home can be set up with one or more administrators. After the administrator password is used for authentication, you can modify the information of the members of the family, the time of each member's Internet access, traffic, and QOS security through the management interface.
  • FIG. 9 is a block diagram showing the structure of a system according to an embodiment of the present invention. As shown in FIG. 9, the relationship between the user, the core network, the administrator, the home flow control system, and the internal configuration of the home flow control system are described.
  • FIG. 10 is a flow chart of controlling a user's Internet access according to an embodiment of the present invention. The following describes how to control the user to access the Internet in conjunction with FIG. 9 and FIG.
  • the process includes the following steps:
  • the core network sends the user-initiated online request to the data communication interface of the home flow control system.
  • the triggering example used in this embodiment is that the user sets the APN as the home flow control system, and after receiving the online request of the APN, the core network sends the online request to the data communication interface of the home flow control.
  • the online request includes the unique identifier of the user, location information, and content of the Internet.
  • the unique identifier may be the IMSI, mobile phone number of the terminal, and the communication interface needs to be able to identify the unique user.
  • Step S1004 The data communication interface sends the user password to the encryption and decryption module for decryption, and the encryption and decryption module may use a public encryption algorithm, or may provide a separate encryption and decryption algorithm, or use a dynamic link library (Dynamic Link Library). Abbreviated as dll) directly, to obtain the plaintext of the password; for the algorithm that cannot be decrypted, the password can be directly encrypted by the user, and the ciphertext is matched with the stored ciphertext in the stored user information to determine the user password. Correctness.
  • dll Dynamic Link Library
  • the location information of the core network is matched with the location information of the network that is configured in the system to determine whether the user can access the Internet at the location.
  • the location information of the user may be the IP address of the user. Address, SGSN location information, base station location information, etc.; then use the current time to match the configured allowed online time to determine whether the user is online during the time period.
  • step S1008 when the result of the determination is that the user is not allowed to access the Internet, the feedback information of the user is rejected from the core network and fed back to the user.
  • step S1010 if the result of the determination is that the user is allowed to access the Internet, the online content of the core online report is matched with the content of the Internet-enabled content configured in the system.
  • the online content may be a url.
  • the data storage device obtains the duration, traffic, and QOS security information that the user can currently access the Internet.
  • the location+time+family+current user unique identifier may be used to obtain the available online duration and traffic of the user and the QOS.
  • Step S1012 The main service logic delivers the available traffic of the user, requires the core network to monitor the Internet traffic, and creates a session for recording the details of the user's Internet access, including the user's Internet access location, the Internet start time, and the current Internet access. duration.
  • FIG. 11 is a flowchart of controlling user location change according to an embodiment of the present invention. The flow will be described below with reference to FIG. 9. As shown in FIG. 11, the process includes the following steps:
  • step S1102 when the user changes the location, or the user changes the content of the Internet, or the current available traffic is exhausted, the core network sends an online request to the data communication interface.
  • the location information may be included. Traffic information or Internet content can also contain these three items.
  • step S1104 the main service logic needs to judge according to the online request. If only the location information is included, only the location information needs to be authenticated. If only the online content is included, only the online content needs to be authenticated, and only the traffic information is included. , only need to authenticate the time, duration and remaining traffic that can be used, and return the authentication result.
  • step S1106 when the authentication result is a failure, the user is denied feedback to the user through the core network.
  • step S1108 when the authentication result is passed, the new available duration and traffic, QOS are delivered, and the user has been updated to the data storage device. At the same time, the session is updated according to the result returned by the data storage device and the traffic used by the user. If the request contains both location information, Internet content, and used traffic, you need to authenticate the location information and Internet content, and at the same time authenticate the Internet time, duration, and remaining traffic, and redistribute the new available duration, traffic, and QOS. .
  • step S1110 the re-allocated information is sent to the user through the core network to allow the user to continue to access the Internet.
  • FIG. 12 is a flowchart of a system for monitoring a user's Internet access according to an embodiment of the present invention. As shown in FIG. 12, the process includes the following steps:
  • Step S1202 The system monitors the online time of the user according to the session at any time.
  • the internet time can be a period of time, or a specified point in time.
  • Step S1204 after the user's online time exceeds a predetermined time, the home data flow control system will actively take the core to the core.
  • the network sends a disconnect request, requesting the core network to cut off the user's online activity.
  • step S1206 the core network reports a user usage again, and the home data flow control system processes the user usage result, accumulates the traffic used by the user, and releases the held session.
  • FIG. 13 is a flowchart of ending a user's Internet access according to an embodiment of the present invention. As shown in FIG. 13, the process includes the following steps:
  • step S1302 the core network receives the active offline request of the user.
  • step S1304 the core network reports the usage of the user.
  • step S1306 the home data flow control system processes the user usage result, accumulates the traffic used by the user, and releases the held session.
  • FIG. 14 is a flowchart of controlling user management according to an embodiment of the present invention, wherein a home flow control system provides a series of management operation interfaces, which may adopt an XML protocol or other protocols, and is converted into an internal protocol.
  • Step S1402 receiving an administrator management request.
  • step S1404 the administrator password is sent to the encryption and decryption operation module.
  • step S1406 the decrypted administrator password is obtained and matched with the real password of the user to determine whether it is an operation performed by the allowed administrator, and the administrator authority level is obtained.
  • Step S1408 executing an administrator's management request, including adding/deleting/modifying members, and managing member rights.
  • step S1410 the result is saved to the data storage device after execution.
  • Step S1412 Send the request result to the data communication interface; or query the user information and the Internet access situation, and send the query result to the data communication interface.
  • step S1414 the data communication interface sends the operation result to the administrator.
  • the solution in the embodiment of the present invention uses the concept of group sharing.
  • family sharing as an example, multiple members in a family can share an online account; the administrator can separately allocate Internet access to each member. Permissions, control members' online time, traffic, Internet access and QOS support.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described, or separate them into individual integrated circuit modules, or make multiple modules or steps into a single The integrated circuit module is implemented. Thus, the invention is not limited to any specific combination of hardware and software.
  • connection control method and apparatus provided by the embodiments of the present invention have the following beneficial effects: when the data service is performed, the terminal can share the network connection account with other terminals in the group, share the traffic, and each terminal is in the The control group can control the terminal to perform data services, so that the effect of effectively controlling the terminal to perform data services is realized. Therefore, the problem of low connection control efficiency existing in the related art is solved, and the effect of improving the connection control efficiency is achieved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种连接控制方法及装置,其中,该方法包括:接收终端的请求,其中,该请求用于请求进行数据业务,该请求中至少携带有终端的标识;根据上述终端的标识确定终端所属的组,其中,该组中的终端共用网络连接账号;根据上述终端在组中对应的控制信息控制该终端进行数据业务。通过本发明,解决了相关技术中存在的连接控制效率低的问题,进而达到了提高连接控制效率的效果。

Description

连接控制方法及装置 技术领域
本发明涉及通信领域,具体而言,涉及一种连接控制方法及装置。
背景技术
随着移动通讯技术的高速发展,网络在人们的生活中起着必不可少的作用。其中,4G网络正逐渐成为人们日常生活中常用的工具。由于目前移动上网主要是通过移动终端来进行上网,以手机为例,在相关技术中,每个手机必须单独开通上网业务,进行单独计费,一个家庭(或者一组终端)必须开通多个账号,每个账号均需要进行单独计费,由此会带来不可避免的浪费。而同时由于手机的便携特征,用户可以随时随地上网,并且,随着手机使用者的低龄化,家长很难控制被监护人的上网时间、地点上网的内容等信息,导致由于上网影响被监护人的视力和学习。由此可知,在相关技术中存在着连接控制效率低的问题。
针对相关技术中存在的连接控制效率低的问题,目前尚未提出有效的解决方案。
发明内容
本发明提供了一种连接控制方法及装置,以至少解决相关技术中存在的连接控制效率低的问题。
根据本发明的一个方面,提供了一种连接控制方法,包括:接收终端的请求,其中,所述请求用于请求进行数据业务,所述请求中至少携带有所述终端的标识;根据所述终端的标识确定所述终端所属的组,其中,所述组中的终端共用网络连接账号;根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务。
可选地,所述控制信息包括以下至少之一:时间信息、位置信息、目标信息、流量使用策略,其中,所述时间信息用于判断在当前时间是否允许所述终端进行数据业务;所述位置信息用于判断在所述终端的当前位置是否允许所述终端进行数据业务;所述目标信息用于判断所述终端请求进行数据业务的目标是否允许所述终端访问;所述流量使用策略用于控制所述终端进行数据业务产生的流量。
可选地,所述流量使用策略包括以下至少之一:所述终端能够进行数据业务的时间、所述终端进行数据业务的能够使用的流量、所述终端进行数据业务的服务质量QoS。
可选地,所述位置信息包括以下至少之一:所述终端的网络协议IP地址信息、通用服务分组无线业务支撑节点SGSN位置信息、基站位置信息。
可选地,接收所述终端的所述请求包括:接收核心网转发的所述请求,其中,所述请求是所述终端向预定接入点名称APN发送的,所述预定APN用于根据所述终端所属的组对所 述终端的数据业务进行控制。
可选地,根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务包括:根据所述终端在所述组中对应的控制信息确定对所述终端的控制策略;通过数据接口将所述控制策略通知给核心网,其中,所述核心网用于根据所述控制策略控制所述终端进行数据业务。
可选地,根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务包括:创建会话,其中,所述会话用于记录所述终端进行数据业务的信息;通过对比所述控制信息和所述会话中记录的信息控制所述终端进行数据业务。
可选地,所述方法还包括:当所述终端结束数据业务后,释放所述会话。
可选地,所述方法还包括:接收修改请求,其中,所述修改请求中至少携带所述修改请求的发起者的标识和修改密码,所述修改请求用于请求修改所述组;验证所述标识和所述修改密码是否合法;在验证结果为合法的情况下,根据所述修改请求修改所述组;在验证结果为非法的情况下,拒绝所述修改请求。
可选地,所述修改请求用于修改以下至少之一:增加所述组中的终端、删除所述组中的终端、修改所述组中的终端、修改用于管理所述组的权限、修改所述组中的控制信息。
可选地,所述方法还包括:接收查询请求,其中,所述查询请求中至少携带所述查询请求的发起者的标识和查询密码,所述查询请求用于请求查询所述组中终端的信息;验证所述标识和所述查询密码是否合法;在验证结果为合法的情况下,根据所述查询请求获取查询结果并将获取的所述查询结果返回给所述查询请求的发起者;在验证结果为非法的情况下,拒绝所述查询请求。
可选地,所述查询请求用于查询以下至少之一:所述组中的终端的信息、所述组中的预定终端进行数据业务的信息、所述组中的预定终端对应的控制信息、用于管理所述组的权限信息。
根据本发明的另一方面,提供了一种连接控制装置,包括:第一接收模块,设置为接收终端的请求,其中,所述请求用于请求进行数据业务,所述请求中至少携带有所述终端的标识;确定模块,设置为根据所述终端的标识确定所述终端所属的组,其中,所述组中的终端共用网络连接账号;控制模块,设置为根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务。
可选地,所述控制信息包括以下至少之一:时间信息、位置信息、目标信息、流量使用策略,其中,所述时间信息用于判断在当前时间是否允许所述终端进行数据业务;所述位置信息用于判断在所述终端的当前位置是否允许所述终端进行数据业务;所述目标信息用于判断所述终端请求进行数据业务的目标是否允许所述终端访问;所述流量使用策略用于控制所述终端进行数据业务产生的流量。
可选地,所述流量使用策略包括以下至少之一:所述终端能够进行数据业务的时间、所 述终端进行数据业务的能够使用的流量、所述终端进行数据业务的服务质量QoS。
可选地,所述位置信息包括以下至少之一:所述终端的网络协议IP地址信息、通用服务分组无线业务支撑节点SGSN位置信息、基站位置信息。
可选地,所述第一接收模块包括:接收单元,设置为接收核心网转发的所述请求,其中,所述请求是所述终端向预定接入点名称APN发送的,所述预定APN用于根据所述终端所属的组对所述终端的数据业务进行控制。
可选地,所述控制模块包括:确定单元,设置为根据所述终端在所述组中对应的控制信息确定对所述终端的控制策略;通知单元,用于通过数据接口将所述控制策略通知给核心网,其中,所述核心网用于根据所述控制策略控制所述终端进行数据业务。
可选地,所述控制模块包括:创建单元,设置为创建会话,其中,所述会话用于记录所述终端进行数据业务的信息;控制单元,设置为通过对比所述控制信息和所述会话中记录的信息控制所述终端进行数据业务。
可选地,所述装置还包括:释放模块,设置为当所述终端结束数据业务后,释放所述会话。
可选地,所述装置还包括:第二接收模块,设置为接收修改请求,其中,所述修改请求中至少携带所述修改请求的发起者的标识和修改密码,所述修改请求用于请求修改所述组;第一验证模块,设置为验证所述标识和所述修改密码是否合法;修改模块,设置为在所述第一验证模块的验证结果为合法的情况下,根据所述修改请求修改所述组;第一拒绝模块,设置为在所述第一验证模块的验证结果为非法的情况下,拒绝所述修改请求。
可选地,所述修改请求用于修改以下至少之一:增加所述组中的终端、删除所述组中的终端、修改所述组中的终端、修改用于管理所述组的权限、修改所述组中的控制信息。
可选地,所述装置还包括:第三接收模块,设置为接收查询请求,其中,所述查询请求中至少携带所述查询请求的发起者的标识和查询密码,所述查询请求用于请求查询所述组中终端的信息;第二验证模块,设置为验证所述标识和所述查询密码是否合法;查询模块,设置为在所述第二验证模块的验证结果为合法的情况下,根据所述查询请求获取查询结果并将获取的所述查询结果返回给所述查询请求的发起者;第二拒绝模块,设置为在所述第二验证模块的验证结果为非法的情况下,拒绝所述查询请求。
可选地,所述查询请求用于查询以下至少之一:所述组中的终端的信息、所述组中的预定终端进行数据业务的信息、所述组中的预定终端对应的控制信息、用于管理所述组的权限信息。
根据本发明的另一方面,提供了一种计算机存储介质,所述计算机存储介质存储有执行指令,所述执行指令用于执行上述任一项所述的方法。
通过本发明,采用接收终端的请求,其中,所述请求用于请求进行数据业务,所述请求 中至少携带有所述终端的标识;根据所述终端的标识确定所述终端所属的组,其中,所述组中的终端共用网络连接账号;根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务,解决了相关技术中存在的连接控制效率低的问题,进而达到了提高连接控制效率的效果。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是根据本发明实施例的连接控制方法的流程图;
图2是根据本发明实施例的连接控制装置的结构框图;
图3是根据本发明实施例的连接控制装置中第一接收模块22的结构框图;
图4是根据本发明实施例的连接控制装置中控制模块26的结构框图一;
图5是根据本发明实施例的连接控制装置中控制模块26的结构框图二;
图6是根据本发明实施例的连接控制装置的优选结构框图一;
图7是根据本发明实施例的连接控制装置的优选结构框图二;
图8是根据本发明实施例的连接控制装置的优选结构框图三;
图9是根据本发明实施例的系统结构框图;
图10是根据本发明实施例的对用户上网进行控制的流程图;
图11是根据本发明实施例的对用户位置变更进行控制的流程图;
图12是根据本发明实施例的系统监控用户上网过程的流程图;
图13是根据本发明实施例的用户上网结束的流程图;
图14是根据本发明实施例的对用户管理进行控制的流程图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
在本实施例中提供了一种连接控制方法,图1是根据本发明实施例的连接控制方法的流 程图,如图1所示,该流程包括如下步骤:
步骤S102,接收终端的请求,其中,该请求用于请求进行数据业务,该请求中至少携带有终端的标识;
步骤S104,根据上述终端的标识确定终端所属的组,其中,该组中的终端共用网络连接账号;
步骤S106,根据上述终端在组中对应的控制信息控制该终端进行数据业务。
通过上述步骤,终端在进行数据业务时,可以和组内的其他终端共用网络连接账号,共享流量,并且,每个终端在其所在的组中均会对应控制信息,该控制信息可以控制终端进行数据业务,从而实现了有效控制终端进行数据业务的效果。从而解决了相关技术中存在的连接控制效率低的问题,进而达到了提高连接控制效率的效果。
在控制终端进行数据业务时,可以从多个方面控制该终端,在一个可选的实施例中,上述控制信息可以包括以下至少之一:时间信息、位置信息、目标信息、流量使用策略,其中,该时间信息用于判断在当前时间是否允许终端进行数据业务;该位置信息用于判断在终端的当前位置是否允许终端进行数据业务;该目标信息用于判断终端请求进行数据业务的目标是否允许终端访问;该流量使用策略用于控制终端进行数据业务产生的流量。以时间信息为例,当终端当前请求进行数据业务的时间点不在网络连接控制信息所包括的时间点内时,说明当前的时间点是不允许终端进行数据业务的,那么就会根据控制信息规定的时间拒绝终端的数据业务请求。同理,对于位置、目标、流量使用也是一样的,其中,这里所说的目标可以是终端进行数据业务时所连接的网站,所浏览的网页内容。从而有效控制终端的数据业务。
上述的流量使用策略可以包括可使用的流量,其中又可细分为闲时的可用流量、忙时的可用流量。在一个可选的实施例中,上述的流量使用策略可以包括以下至少之一:该终端能够进行数据业务的时间、该终端进行数据业务的能够使用的流量、该终端进行数据业务的服务质量QoS。
在根据位置信息控制终端的数据业务时,可以通过不同的信息来标识终端的位置,例如,上述的位置信息可以包括以下至少之一:该终端的网络协议IP地址信息、通用服务分组无线业务支撑节点SGSN位置信息、基站位置信息。当然,也可以使用其他的用于标识终端位置的信息。
在一个可选的实施例中,接收上述终端的请求可以包括:接收核心网转发的请求,其中,该请求可以是终端向预定接入点名称APN发送的,该预定APN用于根据终端所属的组对终端的数据业务进行控制。
上述的根据终端在组中对应的控制信息控制该终端进行数据业务包括:根据终端在组中对应的控制信息确定对该终端的控制策略;通过数据接口将控制策略通知给核心网,其中,该核心网用于根据控制策略控制终端进行数据业务。即,在控制终端的数据业务时,是通过核心网来实现的。
在一个可选的实施例中,根据上述终端在组中对应的控制信息控制终端进行数据业务包括:创建会话,其中,该会话用于记录终端进行数据业务的信息;通过对比控制信息和会话中记录的信息控制该终端进行数据业务。当然,也可以通过其他的方式来记录终端的进行数据业务的信息,其中,该终端进行数据业务的信息包括终端进行数据业务时的时间,使用的时间、终端的位置、终端所使用的流量、终端所浏览的网站、网页等信息。从而通过记录的信息可以清楚的确定终端进行数据业务的具体情况。
上述的创建的会话可以用于记录终端一次(当然,也可以记录预定次数)数据业务的情况,当该终端结束该次数据业务后,可以释放创建的会话。
上述的控制信息可以是预先设置并存储的,可以针对不同的终端设置不同的控制信息,也可以修改针对某个终端的控制信息,或者修改组中的相关信息。在一个可选的实施例中,上述方法还包括:接收修改请求,其中,该修改请求中至少携带修改请求的发起者的标识和修改密码,该修改请求用于请求修改该组;验证标识和修改密码是否合法;在验证结果为合法的情况下,根据上述修改请求修改组;在验证结果为非法的情况下,拒绝上述修改请求。
其中,上述的修改请求可以用于修改以下至少之一:增加组中的终端、删除组中的终端、修改组中的终端、修改用于管理该组的权限、修改组中的控制信息。其中,修改组中的终端可以是在保证组中终端数量不变的情况下,将某个终端替换为其他的不属于该组的终端,或者也可以是修改组中的某个终端的标识信息或其他信息。
由于组的相关信息是预先存储的,因此,可以查询存储的信息,在一个可选的实施例中,上述方法还包括:接收查询请求,其中,该查询请求中至少携带查询请求的发起者的标识和查询密码,该查询请求用于请求查询组中终端的信息;验证标识和查询密码是否合法;在验证结果为合法的情况下,根据查询请求获取查询结果并将获取的查询结果返回给查询请求的发起者;在验证结果为非法的情况下,拒绝该查询请求。
其中,上述查询请求用于查询以下至少之一:组中的终端的信息、组中的预定终端进行数据业务的信息、组中的预定终端对应的控制信息、用于管理该组的权限信息。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例的方法。
在本实施例中还提供了一种连接控制装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图2是根据本发明实施例的连接控制装置的结构框图,如图2所示,该装置包括第一接收模块22、确定模块24和控制模块26,下面对该装置进行说明。
第一接收模块22,设置为接收终端的请求,其中,该请求用于请求进行数据业务,请求中至少携带有终端的标识;确定模块24,连接至上述第一接收模块22,设置为根据终端的标识确定终端所属的组,其中,该组中的终端共用网络连接账号;控制模块26,连接至上述确定模块24,设置为根据终端在组中对应的控制信息控制终端进行数据业务。
其中,上述的网络连接控制信息包括以下至少之一:时间信息、位置信息、目标信息、流量使用策略,其中,该时间信息用于判断在当前时间是否允许终端进行数据业务;该位置信息用于判断在终端的当前位置是否允许终端进行数据业务;该目标信息用于判断终端请求进行数据业务的目标是否允许终端访问;该流量使用策略用于控制终端进行数据业务产生的流量。
上述的流量使用策略可以包括以下至少之一:终端能够进行数据业务的时间、终端进行数据业务的能够使用的流量、终端进行数据业务的服务质量QoS。
上述的位置信息可以包括以下至少之一:终端的网络协议IP地址信息、通用服务分组无线业务支撑节点SGSN位置信息、基站位置信息。
图3是根据本发明实施例的连接控制装置中第一接收模块22的结构框图,如图3所示,该第一接收模块22包括接收单元32,下面对该第一接收模块22进行说明。
接收单元32,设置为接收核心网转发的请求,其中,该请求是终端向预定接入点名称APN发送的,该预定APN用于根据终端所属的组对终端的数据业务进行控制。
图4是根据本发明实施例的连接控制装置中控制模块26的结构框图一,如图4所示,该控制模块26包括确定单元42和通知单元44,下面对该控制模块26进行说明。
确定单元42,设置为根据终端在组中对应的控制信息确定对终端的控制策略;通知单元44,连接至上述确定单元42,设置为通过数据接口将控制策略通知给核心网,其中,该核心网用于根据控制策略控制终端进行数据业务。
图5是根据本发明实施例的连接控制装置中控制模块26的结构框图二,如图5所示,该控制模块26包括创建单元52和控制单元54,下面对该控制模块26进行说明。
创建单元52,设置为创建会话,其中,该会话用于记录终端进行数据业务的信息;控制单元54,连接至上述创建单元52,设置为通过对比控制信息和会话中记录的信息控制终端进行数据业务。
图6是根据本发明实施例的连接控制装置的优选结构框图一,如图6所示,该装置除包括图5所示的所有模块外,还包括释放模块62,下面对该装置进行说明。
释放模块62,连接至上述控制模块26,设置为当终端结束数据业务后,释放该会话。
图7是根据本发明实施例的连接控制装置的优选结构框图二,如图7所示,该装置除包括图2所示的所有模块外,还包括第二接收模块72、第一验证模块74、修改模块76和第一拒绝模块78,其中,该第二接收模块72与图2中的各个模块之间的位置关系可以有多种,例如可以在接收终端的请求之前接收修改请求,也可以在控制终端的数据业务之后接收修改请求。下面以先控制终端的业务数据,再接收修改请求为例进行说明。
第二接收模块72,连接至上述控制模块26,设置为接收修改请求,其中,该修改请求中至少携带修改请求的发起者的标识和修改密码,修改请求用于请求修改组;第一验证模块74,连接至上述第二接收模块72,设置为验证标识和修改密码是否合法;修改模块76,连接至上述第一验证模块74,设置为在第一验证模块的74的验证结果为合法的情况下,根据修改请求修改组;第一拒绝模块78,连接至上述第一验证模块74,设置为在第一验证模块74的验证结果为非法的情况下,拒绝上述修改请求。
其中,上述的修改请求用于修改以下至少之一:增加组中的终端、删除组中的终端、修改组中的终端、修改用于管理组的权限、修改组中的控制信息。
图8是根据本发明实施例的连接控制装置的优选结构框图三,如图8所示,该装置除包括图2所示的所有模块外,还包括第三接收模块82、第二验证模块84、查询模块86和第二拒绝模块88,和图7类似,该第三接收模块82与图2中的各个模块之间的位置关系可以有多种,例如可以在接收终端的请求之前接收查询请求,也可以在控制终端的数据业务之后接收查询请求。下面以在控制终端的数据业务之后接收查询请求为例进行说明。
第三接收模块82,连接至上述的控制模块26,设置为接收查询请求,其中,该查询请求中至少携带查询请求的发起者的标识和查询密码,该查询请求用于请求查询组中终端的信息;第二验证模块84,连接至上述的第三接收模块82,设置为验证标识和查询密码是否合法;查询模块86,连接至上述的第二验证模块84,设置为在第二验证模块84的验证结果为合法的情况下,根据查询请求获取查询结果并将获取的查询结果返回给查询请求的发起者;第二拒绝模块88,连接至上述的第二验证模块84,设置为在第二验证模块84的验证结果为非法的情况下,拒绝查询请求。
其中,上述的查询请求用于查询以下至少之一:组中的终端的信息、组中的预定终端进行数据业务的信息、组中的预定终端对应的控制信息、用于管理组的权限信息。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述模块分别位于多个处理器中。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,接收终端的请求,其中,该请求用于请求进行数据业务,该请求中至少携带有终端的标识;
S2,根据上述终端的标识确定终端所属的组,其中,该组中的终端共用网络连接账号;
S3,根据上述终端在组中对应的控制信息控制该终端进行数据业务。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
下面以上述的组为一个家庭,组中的终端为一个家庭中的成员,该些成员公用一个家庭流量账号为例,对本发明进行说明。
本实施例中提供了一种类似虚拟专用网络(Virtual Private Network,简称为VPN)的方案,家庭中所有成员共用一个家庭流量账号,使用家庭共享流量,家长可以管理每个成员的上网时长和流量,并对每个成员的上网时间和地点、网速以及上网内容进行控制。
在本发明实施例中,提供了一种家庭流量控制方法和系统,其中,该系统中包括:
数据通信接口(同上述的第一接收模块22、第二接收模块72、第三接收模块82):提供一个对外接口,使用户的上网请求和管理请求能够被本系统处理;
数据存储设备(同上述的确定模块24、控制模块26、第一验证模块74、修改模块76、第一拒绝模块78、第二验证模块84、查询模块86、第二拒绝模块88):设置为存放用户信息,以及各种鉴权、操作、控制逻辑;
加解密运算模块:设置为使用通用或者定制的加解密算法对密码等信息进行加解密操作;
通过上述系统可以实现的功能如下:
用户上网功能:对家庭成员,共享一个上网账号,每个成员不需要单独购买流量,直接上网即可,所产生的流量计算在家庭上网账号中;同时对用户上网请求,根据用户所属家庭、当前所在位置和当前时间进行鉴权,只允许用户在允许的上网时间、地点使用所分配的流量,超过时间和流量后自动切断。
步骤A:家庭流程控制系统收到来自核心网上报的上网请求,接口中包含上网的终端唯一标识如IMSI或者手机号,上网地点以及请求网站的统一资源定位符(Uniform Resource Locator,简称为url)信息。
步骤B:数据通信接口将用户上网请求进行格式鉴权,并转换为内部协议。
步骤C:家庭流程控制系统将根据终端的唯一标识,识别出用户所属的家庭,获取到该终端的允许的上网地点和时间,再根据用户的实际上网地点和系统时间进行比较,判断用户在当前地点和当前时间是否允许上网,再根据用户的url判断用户的上网内容,鉴权用户的上网内容是否允许。
步骤D:如果用户鉴权不通过,通过数据通信接口通知核心网本次上网请求不允许。
步骤E:如果用户本次上网请求通过,则在数据存储设备中查询用户所属家庭中该终端可以分配到的流量以及流量使用策略;同时建立一个用户会话session以便随时可以控制用户上网。
步骤F:通过数据通信接口,将用户本次可以使用的时间、流量以及服务质量(Quality of Service,简称为QOS)等信息发送到核心网。
步骤G:当用户位置发生变化,则核心网将用户所在的新的位置信息通知家庭流量控制系统,家庭流量控制系统扫描用户的session和用户数据,判断用户在该地点是否允许上网,如果不允许上网,则通知核心网终止上网连接;如果用户可以上网,则查询用户在新位置可以使用的时长和流量以及QOS信息,然后通过数据通信接口发送到核心网进行管理。
步骤H:家庭流量控制系统随时扫描session,当发现用户上网时间达到或者发生其它触发终止上网的条件时,则通过数据通信接口通知核心网将该用户的上网连接终止。
管理员功能:为了实现数据的安全性,提供一个统一的数据通信接口,用户使用该接口来进行管理,不接触数据存储设备和加解密运算模块。家庭可以设置一个或者多个管理员,通过管理员密码鉴权后,可以通过管理接口修改自己家庭的成员、每个成员的上网时间、流量以及QOS保障等信息。
图9是根据本发明实施例的系统结构框图,如图9所示,该图中描述了用户、核心网、管理员、家庭流量控制系统之间的关系,以及家庭流量控制系统的内部构造。图10是根据本发明实施例的对用户上网进行控制的流程图。下面结合图9和图10,对如何控制用户上网进行说明。
如图10所示,该流程包括如下步骤:
步骤S1002,核心网将用户发起的上网请求送到家庭流量控制系统的数据通信接口。本实施例中采用的触发示例为,用户将APN设置为家庭流量控制系统,核心网收到该APN的上网请求后,将该上网请求发送到家庭流量控制的数据通信接口。该上网请求中包括用户的唯一标识、位置信息以及上网的内容。在一个实施方式中,唯一标识可以是该终端的IMSI、手机号,通信接口需要能识别出唯一用户。
步骤S1004,数据通信接口将用户密码发送到加解密模块进行解密,加解密模块可以采用公用的加密算法,也可以单独提供私有的加解密算法,或者使用加解密的动态链接库(Dynamic Link Library,简称为dll)直接调用,得到密码的明文;如对无法解密的算法,也可以将用户输入的密码明文直接加密,得到密文后与存储的用户信息中的密文进行匹配,判定用户密码的正确性。
步骤S1006,将核心网上报的以上位置信息与系统中配置的允许上网的位置信息进行匹配,判断用户是否可以在该位置上网,在一个实施方式中,用户的位置信息可以是用户的IP 地址、SGSN位置信息、基站位置信息等;然后使用当前时间与配置的允许上网时间进行匹配,判断用户是否在该时间段上网。
步骤S1008,当判断结果为不允许用户上网时,通过核心网将拒绝用户上述的反馈信息反馈给用户。
步骤S1010,若判断结果为允许用户上网,则将核心网上报的上网内容与系统中配置的允许上网的内容进行匹配,在一个实施方式中,上网内容可以是url。
根据用户的当前位置和当前时间,以及用户所属家庭所配置的策略,在数据存储设备获取用户当前可以上网的时长、流量以及QOS保障信息。在一个实施方式中,可以采用位置+时间+家庭+当前用户唯一标识,得到用户的可用上网时长和流量以及QOS。
步骤S1012,主业务逻辑下发用户可用流量,要求核心网对上网流量进行监控,同时创建一个session,用于记录用户上网的详细情况,包括用户上网地点、上网开始时间以及本次上网可以使用的时长。
图11是根据本发明实施例的对用户位置变更进行控制的流程图,下面结合图9对该流程进行说明。如图11所示,该流程包括如下步骤:
步骤S1102,当用户出现位置变换,或者用户改变了上网内容,或者申请到的本次可用流量用尽时,核心网向数据通信接口发送上网请求,在一个实施方式中,可以只包含位置信息或者流量信息或者上网内容,也可以同时包含这三项。
步骤S1104,主业务逻辑需要根据上网请求进行判断,如果只包含位置信息,那么只需要对位置信息进行鉴权,如果只包含上网内容,那么只需要对上网内容进行鉴权,如果只包含流量信息,则只需要对上网时间、时长和剩余可以使用的流量进行鉴权,并返回鉴权结果。
步骤S1106,当鉴权结果为失败时,通过核心网向用户反馈拒绝用户上网的信息。
步骤S1108,当鉴权结果为通过时,下发本次新的可用时长和流量、QOS,并将用户已用部分更新到数据存储设备。同时根据数据存储设备返回的结果以及用户已用的流量等信息更新session。如果请求中同时包含位置信息、上网内容和已用流量,则需要鉴权位置信息和上网内容,并同时鉴权上网时间、时长和剩余流量,并重新分配新的可以使用的时长、流量和QOS。
步骤S1110,通过核心网将重新分配的信息下发给用户,以允许用户继续上网。
图12是根据本发明实施例的系统监控用户上网过程的流程图,如图12所示,该流程包括如下步骤:
步骤S1202系统根据session对用户的上网时间进行随时监控。在一个实施方式中,上网时间可以是一段时长,或者一个指定的时间点。
步骤S1204,当用户的上网时间超过预定的时间后,家庭数据流量控制系统将主动向核心 网发送断线请求,要求核心网将该用户的上网活动切断。
步骤S1206,核心网再次上报一个用户使用情况,家庭数据流量控制系统将用户使用结果进行处理,累加用户所使用的流量,同时将保持的session释放掉。
图13是根据本发明实施例的用户上网结束的流程图,如图13所示,该流程包括如下步骤:
步骤S1302,核心网接收到用户的主动下线请求。
步骤S1304,核心网上报用户的使用情况。
步骤S1306,家庭数据流量控制系统将用户使用结果进行处理,累加用户所使用的流量,同时将保持的session释放掉。
图14是根据本发明实施例的对用户管理进行控制的流程图,其中,家庭流量控制系统提供了一系列的管理操作接口,可以采用XML协议或者其它协议,并转换为内部协议,本实施方式采用的一个示例为:101=增加成员,102=删除成员,103=修改成员;201=设置成员允许上网时间,202:=设置成员允许上网地点,203=设置成员的QOS;301=查询用户的上网情况,302=查询用户配置信息;如图14所示,该流程包括如下步骤:
步骤S1402,接收管理员管理请求。
步骤S1404,将管理员密码发送到加解密运算模块。
步骤S1406,得到解密后的管理员密码并与用户的真实密码进行匹配,确定是否是允许的管理员进行的操作,并获取管理员权限级别。
步骤S1408,执行管理员的管理请求,包括增加/删除/修改成员、管理成员的权限。
步骤S1410,执行后将结果保存到数据存储设备。
步骤S1412,将请求结果发送到数据通信接口;或者查询用户信息、上网情况,将查询结果发送到数据通信接口。
步骤S1414,数据通信接口将操作结果发送给管理员。
与相关技术相比较,本发明实施例中的方案使用了组共享的概念,以家庭共享为例,一个家庭中的多个成员可以共享使用一个上网账户;管理员可以对每个成员单独分配上网的权限,控制成员的上网时长、流量、上网地点以及QOS保障等功能。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个 集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
如上所述,本发明实施例提供的一种连接控制方法及装置具有以下有益效果:终端在进行数据业务时,可以和组内的其他终端共用网络连接账号,共享流量,并且,每个终端在其所在的组中均会对应控制信息,该控制信息可以控制终端进行数据业务,从而实现了有效控制终端进行数据业务的效果。从而解决了相关技术中存在的连接控制效率低的问题,进而达到了提高连接控制效率的效果。

Claims (25)

  1. 一种连接控制方法,包括:
    接收终端的请求,其中,所述请求用于请求进行数据业务,所述请求中至少携带有所述终端的标识;
    根据所述终端的标识确定所述终端所属的组,其中,所述组中的终端共用网络连接账号;
    根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务。
  2. 根据权利要求1所述的方法,其中,所述控制信息包括以下至少之一:
    时间信息、位置信息、目标信息、流量使用策略,其中,所述时间信息用于判断在当前时间是否允许所述终端进行数据业务;所述位置信息用于判断在所述终端的当前位置是否允许所述终端进行数据业务;所述目标信息用于判断所述终端请求进行数据业务的目标是否允许所述终端访问;所述流量使用策略用于控制所述终端进行数据业务产生的流量。
  3. 根据权利要求2所述的方法,其中,所述流量使用策略包括以下至少之一:所述终端能够进行数据业务的时间、所述终端进行数据业务的能够使用的流量、所述终端进行数据业务的服务质量QoS。
  4. 根据权利要求2所述的方法,其中,所述位置信息包括以下至少之一:
    所述终端的网络协议IP地址信息、通用服务分组无线业务支撑节点SGSN位置信息、基站位置信息。
  5. 根据权利要求1所述的方法,其中,接收所述终端的所述请求包括:
    接收核心网转发的所述请求,其中,所述请求是所述终端向预定接入点名称APN发送的,所述预定APN用于根据所述终端所属的组对所述终端的数据业务进行控制。
  6. 根据权利要求1所述的方法,其中,根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务包括:
    根据所述终端在所述组中对应的控制信息确定对所述终端的控制策略;
    通过数据接口将所述控制策略通知给核心网,其中,所述核心网用于根据所述控制策略控制所述终端进行数据业务。
  7. 根据权利要求1所述的方法,其中,根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务包括:
    创建会话,其中,所述会话用于记录所述终端进行数据业务的信息;
    通过对比所述控制信息和所述会话中记录的信息控制所述终端进行数据业务。
  8. 根据权利要求7所述的方法,其中,还包括:
    当所述终端结束数据业务后,释放所述会话。
  9. 根据权利要求1所述的方法,其中,还包括:
    接收修改请求,其中,所述修改请求中至少携带所述修改请求的发起者的标识和修改密码,所述修改请求用于请求修改所述组;
    验证所述标识和所述修改密码是否合法;
    在验证结果为合法的情况下,根据所述修改请求修改所述组;
    在验证结果为非法的情况下,拒绝所述修改请求。
  10. 根据权利要求9所述的方法,其中,所述修改请求用于修改以下至少之一:
    增加所述组中的终端、删除所述组中的终端、修改所述组中的终端、修改用于管理所述组的权限、修改所述组中的控制信息。
  11. 根据权利要求1所述的方法,其中,还包括:
    接收查询请求,其中,所述查询请求中至少携带所述查询请求的发起者的标识和查询密码,所述查询请求用于请求查询所述组中终端的信息;
    验证所述标识和所述查询密码是否合法;
    在验证结果为合法的情况下,根据所述查询请求获取查询结果并将获取的所述查询结果返回给所述查询请求的发起者;
    在验证结果为非法的情况下,拒绝所述查询请求。
  12. 根据权利要求11所述的方法,其中,所述查询请求用于查询以下至少之一:
    所述组中的终端的信息、所述组中的预定终端进行数据业务的信息、所述组中的预定终端对应的控制信息、用于管理所述组的权限信息。
  13. 一种连接控制装置,包括:
    第一接收模块,设置为接收终端的请求,其中,所述请求用于请求进行数据业务,所述请求中至少携带有所述终端的标识;
    确定模块,设置为根据所述终端的标识确定所述终端所属的组,其中,所述组中的终端共用网络连接账号;
    控制模块,设置为根据所述终端在所述组中对应的控制信息控制所述终端进行数据业务。
  14. 根据权利要求13所述的装置,其中,所述控制信息包括以下至少之一:
    时间信息、位置信息、目标信息、流量使用策略,其中,所述时间信息用于判断在当前时间是否允许所述终端进行数据业务;所述位置信息用于判断在所述终端的当前位置是否允许所述终端进行数据业务;所述目标信息用于判断所述终端请求进行数据业务的目标是否允许所述终端访问;所述流量使用策略用于控制所述终端进行数据业务产生的流量。
  15. 根据权利要求14所述的装置,其中,所述流量使用策略包括以下至少之一:所述终端能够进行数据业务的时间、所述终端进行数据业务的能够使用的流量、所述终端进行数据业务的服务质量QoS。
  16. 根据权利要求14所述的装置,其中,所述位置信息包括以下至少之一:
    所述终端的网络协议IP地址信息、通用服务分组无线业务支撑节点SGSN位置信息、基站位置信息。
  17. 根据权利要求13所述的装置,其中,所述第一接收模块包括:
    接收单元,设置为接收核心网转发的所述请求,其中,所述请求是所述终端向预定接入点名称APN发送的,所述预定APN用于根据所述终端所属的组对所述终端的数据业务进行控制。
  18. 根据权利要求13所述的装置,其中,所述控制模块包括:
    确定单元,设置为根据所述终端在所述组中对应的控制信息确定对所述终端的控制策略;
    通知单元,设置为通过数据接口将所述控制策略通知给核心网,其中,所述核心网用于根据所述控制策略控制所述终端进行数据业务。
  19. 根据权利要求13所述的装置,其中,所述控制模块包括:
    创建单元,设置为创建会话,其中,所述会话用于记录所述终端进行数据业务的信息;
    控制单元,设置为通过对比所述控制信息和所述会话中记录的信息控制所述终端进行数据业务。
  20. 根据权利要求19所述的装置,其中,还包括:
    释放模块,设置为当所述终端结束数据业务后,释放所述会话。
  21. 根据权利要求13所述的装置,其中,还包括:
    第二接收模块,设置为接收修改请求,其中,所述修改请求中至少携带所述修改请求的发起者的标识和修改密码,所述修改请求用于请求修改所述组;
    第一验证模块,设置为验证所述标识和所述修改密码是否合法;
    修改模块,设置为在所述第一验证模块的验证结果为合法的情况下,根据所述修改请求修改所述组;
    第一拒绝模块,设置为在所述第一验证模块的验证结果为非法的情况下,拒绝所述修改请求。
  22. 根据权利要求21所述的装置,其中,所述修改请求用于修改以下至少之一:
    增加所述组中的终端、删除所述组中的终端、修改所述组中的终端、修改用于管理所述组的权限、修改所述组中的控制信息。
  23. 根据权利要求13所述的装置,其中,还包括:
    第三接收模块,设置为接收查询请求,其中,所述查询请求中至少携带所述查询请求的发起者的标识和查询密码,所述查询请求用于请求查询所述组中终端的信息;
    第二验证模块,设置为验证所述标识和所述查询密码是否合法;
    查询模块,设置为在所述第二验证模块的验证结果为合法的情况下,根据所述查询请求获取查询结果并将获取的所述查询结果返回给所述查询请求的发起者;
    第二拒绝模块,设置为在所述第二验证模块的验证结果为非法的情况下,拒绝所述查询请求。
  24. 根据权利要求23所述的装置,其中,所述查询请求用于查询以下至少之一:
    所述组中的终端的信息、所述组中的预定终端进行数据业务的信息、所述组中的预定终端对应的控制信息、用于管理所述组的权限信息。
  25. 一种计算机存储介质,所述计算机存储介质存储有执行指令,所述执行指令用于执行权利要求1至12中任一项所述的方法。
PCT/CN2016/075542 2015-04-16 2016-03-03 连接控制方法及装置 WO2016165505A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510180874.4 2015-04-16
CN201510180874.4A CN104780623A (zh) 2015-04-16 2015-04-16 连接控制方法及装置

Publications (1)

Publication Number Publication Date
WO2016165505A1 true WO2016165505A1 (zh) 2016-10-20

Family

ID=53621766

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/075542 WO2016165505A1 (zh) 2015-04-16 2016-03-03 连接控制方法及装置

Country Status (2)

Country Link
CN (1) CN104780623A (zh)
WO (1) WO2016165505A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113271259A (zh) * 2017-10-30 2021-08-17 创新先进技术有限公司 流量控制系统、方法、装置及设备

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780623A (zh) * 2015-04-16 2015-07-15 中兴通讯股份有限公司 连接控制方法及装置
CN106817361A (zh) * 2015-12-01 2017-06-09 中兴通讯股份有限公司 集团上网的控制方法及装置
CN107070712B (zh) * 2017-04-05 2019-08-13 中国联合网络通信集团有限公司 网络侧功能扩展方法及网络侧服务器
CN107333322B (zh) * 2017-06-01 2020-06-23 京信通信系统(中国)有限公司 一种家长控制方法和基站
CN110557269B (zh) * 2018-05-31 2022-09-06 阿里巴巴集团控股有限公司 业务数据的处理方法和系统、数据处理方法
CN109981572A (zh) * 2019-02-20 2019-07-05 博泰雄森(北京)网络科技有限公司 一种基于运营商apn流量牵引方式的上网管控方法及系统
CN112751779B (zh) * 2020-12-15 2023-09-01 广州极飞科技股份有限公司 设备的数据流量控制方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141418A (zh) * 2006-09-08 2008-03-12 中国电信股份有限公司 基于策略的家庭网络业务识别的系统和方法
CN103874134A (zh) * 2012-12-15 2014-06-18 华为终端有限公司 一种流量控制方法及装置
WO2015045296A2 (en) * 2013-09-27 2015-04-02 Nec Corporation Communication system, base station, communication method, and non-transitory computer readable medium storing program
CN104780623A (zh) * 2015-04-16 2015-07-15 中兴通讯股份有限公司 连接控制方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159630B (zh) * 2007-11-09 2011-05-18 华为技术有限公司 流量监管方法、系统和宽带接入服务器
CN103124403B (zh) * 2011-11-18 2017-11-28 富泰华工业(深圳)有限公司 移动通讯终端及其上网控制方法
CN103167186B (zh) * 2011-12-12 2015-03-04 联想(北京)有限公司 一种控制上网接入方式的方法及电子终端
CN103179556B (zh) * 2011-12-20 2016-06-08 深圳业拓讯通信科技有限公司 一种基于移动网络策略和计费架构的绿色上网系统和方法
CN103096384B (zh) * 2012-12-17 2016-04-06 东莞宇龙通信科技有限公司 限制从机上网流量的方法及其系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141418A (zh) * 2006-09-08 2008-03-12 中国电信股份有限公司 基于策略的家庭网络业务识别的系统和方法
CN103874134A (zh) * 2012-12-15 2014-06-18 华为终端有限公司 一种流量控制方法及装置
WO2015045296A2 (en) * 2013-09-27 2015-04-02 Nec Corporation Communication system, base station, communication method, and non-transitory computer readable medium storing program
CN104780623A (zh) * 2015-04-16 2015-07-15 中兴通讯股份有限公司 连接控制方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113271259A (zh) * 2017-10-30 2021-08-17 创新先进技术有限公司 流量控制系统、方法、装置及设备
CN113271259B (zh) * 2017-10-30 2023-08-29 创新先进技术有限公司 流量控制系统、方法、装置及设备

Also Published As

Publication number Publication date
CN104780623A (zh) 2015-07-15

Similar Documents

Publication Publication Date Title
WO2016165505A1 (zh) 连接控制方法及装置
EP3912374B1 (en) Improved handling of unique identifiers for stations
US9198038B2 (en) Apparatus and methods of identity management in a multi-network system
CN108337677B (zh) 网络鉴权方法及装置
US7512973B1 (en) Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content
EP2534889B1 (en) Method and apparatus for redirecting data traffic
WO2017036216A1 (zh) 一种虚拟号码的处理方法及装置
EP1690189B1 (en) On demand session provisioning of ip flows
EP3987417A1 (en) Apparatuses and methods relating to authorisation of network functions
CN111132305B (zh) 5g用户终端接入5g网络的方法、用户终端设备及介质
US20140122867A1 (en) Encryption and decryption of user data across tiered self-encrypting storage devices
WO2017219748A1 (zh) 访问权限的确定、页面的访问方法及装置
JP2020501440A (ja) 緊急番号設定方法、取得方法および装置
CN105075182B (zh) 用于通过提供安全性信息来允许合法拦截的方法
US10412585B2 (en) User identity authentication method and device
CN106878099B (zh) 一种流量管理方法、终端设备、服务器及系统
CN108259249A (zh) 网络接入方法、路由器、终端设备、服务器及网络系统
US9232078B1 (en) Method and system for data usage accounting across multiple communication networks
WO2016090927A1 (zh) 实现共享waln管理的方法、系统及wlan共享注册服务器
WO2017092403A1 (zh) 集团上网的控制方法及装置
CN106487776B (zh) 一种保护机器类通信设备的方法、网络实体及系统
WO2016177126A1 (zh) 流量分享方法及装置
US20230396715A1 (en) Method, apparatus and system of charging management
US12041529B2 (en) Handling of unique identifiers for stations
CN109155913A (zh) 网络连接方法、安全节点的确定方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16779480

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16779480

Country of ref document: EP

Kind code of ref document: A1