Disclosure of Invention
In view of the above, the present invention has been developed to provide a method and system for accessing a network based on a traffic-free platform that overcomes, or at least partially solves, the above-mentioned problems.
According to one aspect of the present invention, there is provided a method for accessing a network based on a traffic-free platform, including:
the method comprises the steps that a mobile terminal receives a flow-free product list sent by a flow-free platform server, application identifications of multiple network-accessible applications are recorded in the flow-free product list, the multiple network-accessible applications belong to different developers respectively, and the multiple applications have flow-free internet access rights;
the method comprises the steps that when the mobile terminal accesses a network based on a first application, a first application identifier of the first application is obtained;
the mobile terminal judges whether the first application identifier is recorded in the flow-free product list, and if so, sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator;
the mobile terminal receives the requested data acquired by the proxy server from the resource server based on the data access request through a network of a mobile communication operator;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
Optionally, the obtaining the first application identifier of the first application when the mobile terminal accesses the network based on the first application includes:
when the mobile terminal accesses a network through an application program, acquiring an application identifier of the application program, wherein the application program is the first application, and the application identifier of the application program is the first application identifier; or
When the mobile terminal accesses a website, acquiring a network address of the website, wherein the website is the first application, and the network address of the website is the first application identifier; or
And when the mobile terminal accesses a webpage, acquiring a network address of the webpage, wherein the webpage is the first application, and the network address of the webpage is the first application identifier.
Optionally, the mobile terminal is credited to the specific service provider by a mobile communication operator based on the traffic-free identifier based on a part of data traffic generated in the process of accessing the network by the first application, and the crediting includes:
the mobile terminal is counted into the appointed service provider based on the data traffic of a specific proportion in the process that the first application accesses the network; or
The mobile terminal is counted into the specified service provider based on a specific amount of data traffic in the process that the first application accesses the network; or
And the data traffic of the specific content in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider.
Optionally, the crediting into the designated service provider includes:
and calculating the cost generated by the corresponding data flow into the cost consumed by the account of the specified service provider.
Optionally, the mobile terminal is credited to the designated service provider by the mobile communication operator based on the traffic-free identifier based on all or part of the data traffic generated in the process of accessing the network by the first application, including:
the data access request comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into the specified service provider based on the flow-free identifier; and/or the presence of a gas in the gas,
the requested data comprises a traffic-exempt identifier, and data traffic corresponding to the requested data is included in the specified service provider based on the traffic-exempt identifier.
Optionally, the mobile terminal is credited to the designated service provider by the mobile communication operator based on the traffic-free identifier based on all or part of the data traffic generated in the process of accessing the network by the first application, including:
when the mobile communication operator charges, when the fact that the data of the mobile terminal in the process of accessing the network based on the first application contain the preset label is determined, all or part of data traffic of the mobile terminal in the process of accessing the network based on the first application is counted in the specified service provider; or
And the mobile terminal transmits data in the first application access network through a proxy server with a preset IP address, and when the mobile communication operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
Optionally, before sending, to the proxy server, the data access request based on the application access network through the network of the mobile communications carrier, the method further includes:
acquiring the preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier; or
And acquiring the proxy server distributed by the flow-free platform server for the network access process, wherein the IP address of the proxy server is the first preset IP address, and the first preset IP address is the flow-free identifier.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes:
and sending the communication identification and the identity authentication information of the mobile terminal to a flow-free platform server so that the flow-free platform server distributes the proxy server to the first application-based network access process after verifying that the communication identification has the flow-free authority based on the identity authentication information.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes:
and sending the communication identification and the identity authentication information of the mobile terminal to the flow-free platform server, so that the flow-free platform server distributes the proxy server to the mobile terminal after verifying that the communication identification has the flow-free permission based on the identity authentication information.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes:
and sending the communication identifier of the mobile terminal and the first application identifier to a flow-free platform server, so that the flow-free platform server allocates the proxy server for the network access process based on the first application after determining that the communication identifier has the flow-free authority based on the first application identifier.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes:
receiving temporary verification information distributed to the mobile terminal by the traffic-free platform server, wherein when the traffic-free platform server determines that the communication identifier has traffic-free rights, the temporary verification information is distributed to the mobile terminal;
the sending, to a proxy server through a network of a mobile communication carrier, a data access request based on the first application accessing a network includes:
and the proxy server is provided with a data access request carrying the communication identifier and the temporary verification information, so that the proxy server verifies the validity of the data access request based on the communication identifier and the temporary verification information.
Optionally, the mobile communication operator adds all or part of the data traffic to a specific service provider based on the traffic-exempt identifier, including:
and the mobile communication operator counts all or part of the data traffic into a service provider corresponding to the traffic-free platform server based on the traffic-free identifier.
Optionally, the method further includes:
the mobile terminal is marked with a first manufacturer label corresponding to a first manufacturer developing the first application based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into the first manufacturer by a service provider corresponding to the traffic-free platform server based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
Optionally, the mobile communication operator adds all or part of the data traffic to a specific service provider based on the traffic-exempt identifier, including:
and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
Optionally, the total or part of the data traffic is included in the first vendor to which the first application belongs by the mobile communication operator based on the traffic exempt identifier, including:
the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on data transmission in the process of accessing the network by the first application, and the mobile terminal is included in the first manufacturer by the mobile communication operator based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label and the traffic-free identifier.
According to another aspect of the present invention, there is provided a mobile terminal including:
the flow-free product list is recorded with application identifications of a plurality of network-accessible applications, the plurality of network-accessible applications belong to different developers respectively, and the plurality of applications all have flow-free internet access permission;
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first application identifier of a first application when accessing a network based on the first application;
the judging module is used for judging whether the first application identifier is recorded in the flow-free product list or not;
a sending module, configured to send, to a proxy server through a network of a mobile communications operator, a data access request based on a network accessed by the first application when the determining module determines that the first application identifier is recorded in the flow-free product list;
the receiving module is further used for receiving the requested data acquired by the proxy server from the resource server based on the data access request through a network of a mobile communication operator;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
Optionally, before the sending module sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator, the obtaining module is further configured to obtain a preset tag allocated by the proxy server in the network access process, where the preset tag is carried during data transmission in the network access process, where the preset tag is the traffic-free identifier, or obtain a traffic-free platform server and allocate to the proxy server in the network access process, an IP address of the proxy server is a first preset IP address, and the first preset IP address is the traffic-free identifier.
Optionally, the sending module is further specifically configured to send the communication identifier and the authentication information of the mobile terminal to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the process based on the first application access network after verifying that the communication identifier has a traffic-exempt right based on the authentication information.
Optionally, the sending module is further specifically configured to send the communication identifier and the authentication information of the mobile terminal to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the mobile terminal after verifying that the communication identifier has a traffic-exempt right based on the authentication information.
Optionally, the sending module is further specifically configured to send the communication identifier of the mobile terminal and the first application identifier to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the process based on the first application access network after determining that the communication identifier has a traffic-exempt right based on the first application identifier.
Optionally, before the sending module sends a data access request based on the first application access network to a proxy server through a network of a mobile communications operator, the receiving module is further configured to receive temporary verification information allocated by the traffic-free platform server to the mobile terminal, where the temporary verification information is allocated to the mobile terminal when the traffic-free platform server determines that the communication identifier has a traffic-free right;
the sending module is specifically configured to include, to the proxy server, a data access request carrying the communication identifier and the temporary validation information, so that the proxy server validates validity of the data access request based on the communication identifier and the temporary validation information.
According to another aspect of the present invention, there is provided a method for accessing a network based on a traffic-free platform, including:
the method comprises the steps that a flow-free platform server collects application identifications of multiple network-accessible applications, the multiple network-accessible applications belong to different developers respectively, and the multiple applications have flow-free internet access permission;
the traffic-free platform server generates a traffic-free product list containing application identifications of the plurality of applications;
the traffic-free platform server sends the traffic-free product list to a mobile terminal so that the mobile terminal can access a network based on a first application in a traffic-free internet access manner when accessing the network based on the first application, wherein an application identifier of the first application is recorded in the traffic-free product list;
the mobile terminal is marked with a traffic-free identifier based on data transmission in the process of accessing the network by the first application in a traffic-free internet access mode, and the mobile terminal is counted into the designated service provider by a mobile communication operator based on the traffic-free identifier based on all or part of data traffic generated in the process of accessing the network by the first application in the traffic-free internet access mode.
Optionally, when the mobile terminal accesses a network through an application program, the application program is the first application, and an application identifier of the application program is the first application identifier; or
When the mobile terminal accesses a website, the website is the first application, and the network address of the website is the first application identifier; or
When the mobile terminal accesses a webpage, the webpage is the first application, and the network address of the webpage is the first application identifier.
Optionally, the charging, by the mobile terminal, part of data traffic generated in the process of accessing the network by the first application in a traffic-free internet access manner into the designated service provider by the mobile communication operator based on the traffic-free identifier includes:
the mobile terminal is counted into the appointed service provider based on the data traffic of a specific proportion in the process that the first application accesses the network; or
The mobile terminal is counted into the specified service provider based on a specific amount of data traffic in the process that the first application accesses the network; or
And the data traffic of the specific content in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider.
Optionally, the crediting into the designated service provider includes:
and calculating the cost generated by the corresponding data flow into the cost consumed by the account of the specified service provider.
Optionally, the charging, by the mobile terminal, all or part of data traffic generated in the process of accessing the network by the first application in a traffic-free internet access manner to the designated service provider by the mobile communication operator based on the traffic-free identifier includes:
when the mobile communication operator charges, when the fact that the data in the process that the mobile terminal accesses the network based on the first application contains the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider; or
The mobile terminal transmits data based on a first application in a network access process to pass through a proxy server of a first preset IP address, and when the mobile communication operator charges, all or part of data traffic flowing through the first preset IP address is counted in the specified service provider.
Optionally, after the traffic-free platform server sends the traffic-free product list to the mobile terminal, the method further includes:
the mobile terminal receives the flow-free product list sent by the flow-free platform server;
when a mobile terminal accesses a network based on the first application, the mobile terminal acquires a first application identifier of the first application;
the mobile terminal judges whether the first application identifier is recorded in the flow-free product list or not;
if so, the mobile terminal accesses the network based on the first application in a traffic-free internet access mode;
the method for accessing the network by the mobile terminal based on the first application in a traffic-free internet access mode includes:
the mobile terminal sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator;
the mobile terminal receives, through a network of a mobile communication carrier, the requested data that the proxy server acquired from the resource server based on the data access request.
Optionally, the charging, by the mobile terminal, all or part of data traffic generated in the process of accessing the network by the first application in a traffic-free internet access manner to the designated service provider by the mobile communication operator based on the traffic-free identifier includes:
the data access request comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into the specified service provider based on the flow-free identifier; and/or the presence of a gas in the gas,
the requested data comprises a traffic-exempt identifier, and the data traffic corresponding to the requested data is included in the specified service provider based on the traffic-exempt identifier.
Optionally, the method further includes:
the traffic-free platform server receives the communication identification and the identity verification information of the mobile terminal;
the flow-free platform server verifies whether the communication identifier has a flow-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and when the traffic-free platform server determines that the communication identifier has the traffic-free right, the proxy server is allocated to the mobile terminal.
Optionally, the method further includes:
the traffic-free platform server receives the communication identifier of the mobile terminal and the first application identifier;
and the flow-free platform server distributes the proxy server to the mobile terminal after determining that the communication identifier has the flow-free authority based on the first application identifier.
Optionally, after the mobile terminal sends a data access request based on the first application accessing the network to the proxy server through a network of a mobile communication operator, the method further includes:
the proxy server receives the data access request sent by the mobile terminal, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet;
and the proxy server acquires corresponding requested data from a resource server according to the data access request, and transmits the requested data to the mobile terminal through a network of a mobile communication operator.
Optionally, before the mobile terminal sends a data access request based on the first application accessing the network to the proxy server through the network of the mobile communication operator, the method further includes:
the proxy server sends a preset label to the mobile terminal, the preset label is carried when the mobile terminal carries out data transmission based on the first application network access process, and the preset label is the flow-free identification; or,
the IP address of the proxy server is a first preset IP address, and the first preset IP address is the flow-free identifier.
Optionally, the method further includes:
the proxy server judges whether any data access request of the mobile terminal is received within a preset time period; and
and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal logs out.
Optionally, the method further includes:
the traffic-free platform server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the step of receiving the data access request sent by the mobile terminal by the proxy server comprises the following steps: the proxy server receives the data access request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the requested data obtained from the resource server includes: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires the requested data from the resource server.
Optionally, after the proxy server prompts that the mobile terminal has logged off, the traffic-free platform server logs off the temporary verification information.
Optionally, the mobile communication operator adds all or part of the data traffic to a specific service provider based on the traffic-exempt identifier, including:
and the mobile communication operator counts all or part of the data traffic into a service provider corresponding to the traffic-free platform server based on the traffic-free identifier.
Optionally, the method further includes:
the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on data transmission in the process of accessing the network by the first application, and the mobile terminal is added into the first manufacturer by a service provider corresponding to the traffic-free platform server based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
Optionally, the mobile communication operator adds the whole or part of the data traffic to a specific service provider based on the traffic-free identifier, specifically:
and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
Optionally, the method further includes:
the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on the data transmission in the process of accessing the network by the first application, and the mobile terminal is added into the first manufacturer by the mobile communication operator based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
According to another aspect of the present invention, there is provided a system for accessing a network based on a traffic-free platform, including a traffic-free platform server, where the traffic-free platform server includes:
the system comprises a collecting module, a judging module and a judging module, wherein the collecting module is used for collecting application identifiers of a plurality of network-accessible applications, the network-accessible applications belong to different developers respectively, and the applications have traffic-free internet access permission;
a generating module, configured to generate a flow-free product list including application identifications of the plurality of applications;
a first sending module. The flow-free product list is sent to a mobile terminal, so that the mobile terminal can access a network based on a first application in a flow-free internet access mode when accessing the network based on the first application, and an application identifier of the first application is recorded in the flow-free product list;
the mobile terminal is marked with a traffic-free identifier based on data transmission in the process of accessing the network by the first application in a traffic-free internet access mode, and the mobile terminal is counted into the designated service provider by a mobile communication operator based on the traffic-free identifier based on all or part of data traffic generated in the process of accessing the network by the first application in the traffic-free internet access mode.
Optionally, the traffic-free platform server further includes:
the first receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal;
the verification module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
Optionally, the first receiving module is further configured to receive a communication identifier of the mobile terminal and the first application identifier;
the verification module is further used for determining whether the communication identifier has a traffic exemption permission based on the first application identifier;
the allocation module is further configured to allocate the proxy server to the mobile terminal when it is determined that the communication identifier has the traffic exemption right.
Optionally, the system further includes a proxy server, and the proxy server includes:
the receiving module is used for receiving a data access request sent by the mobile terminal, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet;
and the second sending module is used for acquiring corresponding requested data from a resource server according to the data access request and transmitting the requested data to the mobile terminal through a network of a mobile communication operator.
Optionally, the second sending module is further configured to send a preset tag to the mobile terminal, where the preset tag is carried by the mobile terminal when the mobile terminal performs data transmission based on the first application in a network access process, and the preset tag is the traffic-free identifier.
Optionally, the proxy server further includes:
and the prompting module is used for judging whether any data access request of the mobile terminal is received within a preset time period, and prompting that the mobile terminal logs out when any data access request of the mobile terminal is not received within the preset time period.
Optionally, the traffic-free platform server further includes:
and the logout module is used for logging out the temporary verification information after the prompt module prompts the mobile terminal to log out.
Optionally, the generating module is further configured to generate temporary verification information, and send the temporary verification information to the mobile terminal and the proxy server;
the second receiving module is further configured to receive the data access request carrying the communication identifier and the temporary verification information and sent by the mobile terminal;
the second sending module is further configured to obtain the requested data from the resource server when the data access request is verified to be legitimate through the temporary verification information.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
the method for accessing the network based on the flow-free platform comprises the following steps: receiving a flow-free product list sent by a flow-free platform server, wherein application identifications of a plurality of applications are recorded in the flow-free product list, the plurality of applications belong to a plurality of manufacturers respectively, and the plurality of applications have flow-free internet access permission; when the mobile terminal accesses a network based on a first application, acquiring a first application identifier of the first application; judging whether the first application identifier is recorded in the flow-free product list or not, if so, sending a data access request based on a first application access network to a proxy server through a network of a mobile communication operator; receiving, by a network of a mobile communication operator, requested data acquired by a proxy server from a resource server based on a data access request; the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is assigned to a service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier. That is, when the mobile terminal accesses the network based on an application, all or part of the data traffic in the designated service provider is consumed, so that the data traffic consumed by the mobile terminal can be reduced, the technical problem that the traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect that the mobile terminal entirely or partially accesses the network without a flow is achieved; therefore, the mobile terminal can realize the technical effect of downloading the network content without flow without paying the flow fee. Therefore, the enthusiasm of the user for downloading can be remarkably improved, and the wide spread of the network content on the Internet is facilitated.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a method for accessing a network, a proxy server and a network access system, which are used for solving the technical problem that a large amount of data traffic of a mobile terminal needs to be consumed when the mobile terminal in the prior art accesses the network.
An embodiment of the present invention provides an interaction method based on a flow-free platform to access a network, as shown in fig. 1, which is an interaction diagram of the method, and devices involved in the method include: the system comprises a mobile terminal, a traffic-free platform server, a proxy server and a resource server, wherein the mobile terminal is, for example: mobile phones, tablet computers, and the like, and a user of the mobile terminal is a terminal user; the flow-free platform server is mainly used for providing identity authentication for the mobile terminal, selecting the proxy server and providing a flow-free product list for the mobile terminal; the proxy server is mainly used for providing network access service for the mobile terminal with the internet surfing flow-free authority; resource servers are typically provided by network content providers for providing rich and diverse network contents to end users using network resources of the internet, such as: videos, web pages, pictures, and the like.
Referring to fig. 1, the interaction method based on the traffic-free platform for accessing the network includes the following steps:
step S110: the method comprises the steps that a mobile terminal receives a flow-free product list sent by a flow-free platform server, application identifications of multiple network-accessible applications are recorded in the flow-free product list, the multiple network-accessible applications belong to different developers respectively, and the multiple applications have flow-free internet access rights;
step S120: the method comprises the steps that when the mobile terminal accesses a network based on a first application, a first application identifier of the first application is obtained;
step S130: the mobile terminal judges whether the first application identifier is recorded in the flow-free product list, and if so, sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator;
step S140: the mobile terminal receives the requested data acquired by the proxy server from the resource server based on the data access request through a network of a mobile communication operator;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
In step S110, in order to promote the applications developed by many developers of the applications, the developers are willing to pay traffic fees for the users to view the web pages specified by the users, so that the developers are willing to register the applications for paying traffic with the traffic-exempt platform server, so that a traffic-exempt product list can be determined on the traffic-exempt platform server, wherein in order to distinguish each developer, the traffic-exempt product list may further include a first vendor tag of a first vendor for developing the first application. After determining the flow-free product list, the flow-free platform server can actively send the flow-free product list to the mobile terminal or send the flow-free product list to the mobile terminal according to the application of the mobile terminal. In step S120, the first application may be a plurality of different applications, and further the obtained first application identifiers are also different, and three of the applications are listed below for description, and certainly, in the specific implementation process, the application is not limited to the following three cases.
The first method is that when the mobile terminal accesses the network based on the first application, the first application identifier of the first application is obtained, specifically: when the mobile terminal accesses a network through an application program, acquiring an application identifier of the application program, wherein the application program is the first application, and the application identifier of the application program is the first application identifier.
For example, the mobile terminal accessing the network through the application program is, for example: communicating with another mobile terminal by instant chat software, shopping by shopping software, etc., in which case the application identification of the application may be used as a first application identification for uniquely characterizing the application, for example: name of the application, abbreviation, or name of the application + developer name, etc.
Secondly, when the mobile terminal accesses the network based on the first application, acquiring the first application identifier of the first application, specifically: and when the mobile terminal accesses a website, acquiring a network address of the website, wherein the website is the first application, and the network address of the website is the first application identifier.
For example, a user accessing a website usually includes a website address that is used to uniquely characterize the website, and in this case, the website address can be used as a first application identifier, where the first application identifiers belonging to different webpages in the same website are the same.
Thirdly, when the mobile terminal accesses the network based on the first application, acquiring the first application identifier of the first application, specifically: and when the mobile terminal accesses a webpage, acquiring a network address of the webpage, wherein the webpage is the first application, and the network address of the webpage is the first application identifier.
In general, when a user accesses a specific web page, the user also needs to access the corresponding web page through the network address of the specific web page, and since the network address of the specific web page is also unique, the user can use the network address of the specific web page as the first application identifier.
In step S130, the mobile terminal directly determines one by one whether the first application identifier is the same as any application identifier in the flow-free product class table, and if so, it indicates that the first application identifier is recorded in the flow-free product list, otherwise, it indicates that the first application identifier is not recorded in the flow-free product list.
In a specific implementation process, after sending a data access request based on a first application accessing a network to a proxy server, a mobile terminal needs to determine the proxy server providing a traffic-free service for the first application, please continue to refer to fig. 1, and may determine the proxy server through the following steps:
step S101: the traffic-free platform server receives a communication identifier and identity authentication information of the mobile terminal;
step S102: the traffic-free platform server verifies whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
step S103: and when the traffic-free platform server determines that the communication identifier has the traffic-free right, the traffic-free platform server allocates a proxy server for the mobile terminal.
For example, before step S101, the mobile terminal may bind, in advance, the communication identifier of the mobile terminal in the traffic-free platform server through registration or the like, for example: the mobile terminal can firstly apply for the flow-free service from the flow-free platform server, after receiving the application from the mobile terminal, the flow-free platform server determines whether to distribute the flow-free permission to the communication identifier of the mobile terminal according to some preset conditions (for example, whether the software initiating the application is predetermined software, whether the mobile terminal uses the predetermined software, whether the communication identifier is registered in a designated service provider, etc.), and if the flow-free platform server determines to distribute the flow-free permission to the mobile terminal, the flow-free platform server can send a UserKey (user password) to the mobile terminal as the identity authentication information; further, in order to ensure that the communication identifier of the mobile terminal is not falsely used by other users, the traffic-free platform server may first send a verification code to the communication identifier, and the user of the mobile terminal may only distribute the authentication information to the mobile terminal after successfully filling the verification code.
In addition, when providing the flow-free service for the network access process of the mobile terminal, the flow-free platform server may have no flow limitation, or may have a flow limitation, where the absence of the flow limitation means that no matter how much flow the mobile terminal uses in the network access process, as long as the flow-free requirement is met, the flow-free platform server provides the flow-free right to the mobile terminal, for example: the traffic-free platform server can set the VIP identity for certain mobile terminals (such as mobile terminals produced by specific manufacturers, mobile terminals using specific types of operating systems and the like) so as to provide unlimited amount of traffic free for the mobile terminals; and there may be a traffic restriction for the non-VIP user, where the presence of the traffic restriction refers to allocating a specific traffic for each predetermined period of time for the mobile terminal, and if the total traffic that the mobile terminal cumulatively uses in accessing the network does not exceed the specific traffic, it is allocated with a traffic exemption right if it meets the traffic exemption requirement, and if the total traffic that the mobile terminal uses in accessing the network exceeds the specific traffic, it is not allocated with the traffic exemption right, for example; 30M free traffic, 50M free traffic, etc. may be allocated for a mobile terminal for one month.
In an alternative embodiment, if there is a traffic limit for the free traffic allocated to the mobile terminal by the traffic-exempt platform server, the user of the mobile terminal may also obtain the data traffic rewarded by the traffic-exempt platform server through some activities, such as: by the mobile terminal clicking a predetermined advertisement, clicking a predetermined web page, downloading a predetermined APP, etc., in this case, the traffic-free platform server may increase the data traffic allocated to the mobile terminal, for example, 30M, 40M, etc.
Further if the mobile terminal needs to access the network, for example: when the operation that a user of the mobile terminal starts the browser is detected, the mobile terminal sends the communication identification and the authentication information of the mobile terminal to the flow-free platform server.
In step S102, the traffic-free platform server determines whether the received authentication information of the communication identifier matches with the pre-stored authentication information of the communication identifier, and if so, indicates that the corresponding mobile terminal has the traffic-free permission, otherwise, indicates that the corresponding mobile terminal does not have the traffic-free permission.
In step S103, if the traffic-free permission assigned by the traffic-free platform server to the mobile terminal has no traffic limitation, the traffic-free platform server may directly assign a proxy server to the mobile terminal after determining that the mobile terminal has the traffic-free permission, and if the traffic-free permission assigned by the traffic-free platform server to the mobile terminal is limited by traffic, the traffic-free platform server needs to determine whether the remaining traffic exceeds a threshold value after determining that the mobile terminal has the traffic-free permission, and assigns the proxy server to the mobile terminal only when the remaining traffic exceeds the threshold value, where the processing procedure specifically includes the following steps: the flow-free platform server acquires free residual flow information of a communication identifier charged by adopting a charging mode of a specified service provider; judging whether the free remaining traffic of the communication identifier is greater than a preset amount (such as a threshold value) based on the free remaining traffic information; and when the free residual flow is larger than the preset amount, distributing the proxy server for the mobile terminal.
In general, one of the functions of the traffic-free platform server is to count the free remaining traffic information of the communication identifier, where the preset amount is, for example: 0M, 1M, 512K and the like, wherein if the free residual flow is larger than the preset amount, the flow-free residual flow can meet the network access in the normal condition, so that a proxy server can be allocated to the flow-free residual flow; and if the free residual flow is not greater than the preset amount, the situation is shown that the free residual flow cannot meet the current network access under the normal condition, so that the proxy server is not allocated to the free residual flow.
When the traffic-free platform server allocates the proxy server to the mobile terminal, the proxy server closest to the physical location of the mobile terminal may be selected from the plurality of proxy servers to be allocated to the mobile terminal, the proxy server with the lightest network load may be selected to be allocated to the mobile terminal, or the proxy server with the lowest network delay may be selected to be allocated to the mobile terminal, or the like, or at least two policies of the plurality of allocation policies are comprehensively considered to be selected, and as to the manner in which the traffic-free platform server allocates the proxy server to the mobile terminal, the embodiment of the present invention is not listed in detail and is not limited.
As an optional embodiment, under the condition that the traffic-free permission allocated for the mobile terminal has no traffic limitation, if the mobile terminal has the traffic-free permission, the traffic-free platform server may generate temporary verification information (token) for the mobile terminal to access the network at this time; or, in a case where there is traffic limitation for the traffic exemption authority allocated to the mobile terminal, if the mobile terminal has the traffic exemption authority and the free remaining traffic of the mobile terminal is greater than a preset amount, the traffic exempt platform server may also generate the temporary verification information.
In addition, in order to ensure that the subsequent mobile terminal can be connected to the proxy server, the traffic-free platform server needs to send some data to the proxy server, and four data are listed below for description, which is of course not limited to the following four cases in the specific implementation process. Firstly, a traffic-free platform server sends a communication identifier of a mobile terminal to a proxy server; secondly, the traffic-free platform server sends the communication identification and the temporary verification information of the mobile terminal to the proxy server; thirdly, the flow-free platform server sends the communication identification and the free residual flow of the mobile terminal to the proxy server; and fourthly, the flow-free platform server sends the communication identification, the free residual flow and the temporary verification information of the mobile terminal to the proxy server.
In addition, the address information of the proxy server also needs to be provided for the mobile terminal, wherein the address information of the proxy server can be directly sent to the mobile terminal by the traffic-free platform server; the proxy server may also send the communication identifier of the mobile terminal to the mobile terminal through the communication identifier of the mobile terminal after receiving the communication identifier of the mobile terminal. As shown in step S104 in fig. 1, the process is a process of sending address information of the proxy server to the mobile terminal by the traffic-exempt platform server.
As an alternative embodiment, the process of determining the proxy server continues with reference to fig. 1, and includes the following steps:
after the preparation is completed, in step S110, if the traffic-free platform server does not allocate temporary verification information for the current network access process in steps S101 to S103, the mobile terminal directly sends the data access request to the proxy server; if the traffic-free platform server allocates temporary verification information for the network access process in steps S101 to S103, the mobile terminal sends a data access request carrying the temporary verification information to the proxy server.
In step S140, the proxy server may directly obtain the corresponding requested data from the resource server after receiving the data access request sent by the mobile terminal, and based on different information sent to the proxy server before the traffic-free platform server, the proxy server may also perform some verification processes first, which is described by listing three verification processes in the following, and of course, in the specific implementation process, the proxy server is not limited to the following three cases.
The data sent by the traffic-free platform server to the proxy server comprises a communication identifier and temporary verification information of the mobile terminal, in this case, the data access request sent by the mobile terminal also comprises the temporary verification information, and the proxy server acquires the requested data from the resource server when the data access request is verified to be legal through the temporary verification information. The proxy server matches the temporary verification information sent by the mobile terminal with the temporary verification information sent by the traffic-free platform server, if the matching is successful, the data access request is legal, otherwise, the data access request is illegal. By the scheme, the security of the network access process can be ensured.
The data sent by the traffic-free platform server to the proxy server comprises a communication identifier of the mobile terminal and free residual traffic information, and after receiving the data access request, the proxy server firstly judges whether the latest free residual traffic of the mobile terminal is greater than a preset amount or not based on the free residual traffic information; and when the latest free residual flow information is larger than the preset amount, acquiring the requested data from the resource server, and if the latest free residual flow information is not larger than the preset amount, informing the mobile terminal to allow the mobile terminal to access the resource server through another access path (for example, directly sending a data access request to the resource server). Through the scheme, the specified service provider can provide a specific amount of free data flow to the mobile terminal.
If the free residual flow of the mobile terminal is judged to be larger than the preset amount by the flow-free platform server, the proxy server does not need to judge whether the latest free residual flow (namely the free residual flow sent by the flow-free platform server) is larger than the preset amount when receiving the data access request for the first time; the data traffic consumed by the network access request is directly counted, and then the data traffic is subtracted from the free residual traffic sent by the traffic-free platform server, so that the latest free data traffic can be obtained; whether to send the data access request to the resource server can be determined subsequently by judging whether the latest free data flow is larger than a preset amount.
In addition, the proxy server can also count the data traffic information consumed by the mobile terminal according to a preset counting period, and acquire the latest free residual traffic information with traffic-free permission of the mobile terminal.
For example, the preset statistical period may be, for example, a preset statistical time interval, the preset statistical time interval may be, for example, 30s, 50s, 1min, and the like, and the proxy server may set a timer, acquire, every time the preset time interval arrives, the data traffic consumed by the mobile terminal counted in the current time interval, and obtain the latest free remaining traffic information of the mobile terminal based on the data traffic statistics.
The preset statistical period is, for example: the method comprises the steps that preset statistical flow is 512k, 1M and the like, a proxy server can monitor data flow consumed by the mobile terminal, and when the preset statistical flow is consumed, the latest free residual flow information of the mobile terminal is determined according to the preset statistical flow.
Through the scheme, the latest residual flow information of the mobile terminal can be ensured to be obtained in time.
Of course, after the proxy server counts the data traffic information consumed by the mobile terminal in the counting period, the proxy server may also send the data traffic information to the traffic-free platform server, and the traffic-free platform server counts the latest free remaining traffic information of the mobile terminal.
After obtaining the data traffic information consumed by the mobile terminal, the traffic-free platform server can also send the data traffic information to the mobile terminal or inform the data traffic information when the mobile terminal inquires; or after determining the latest free remaining traffic information of the mobile terminal, the traffic-free platform server can also send the latest free remaining traffic information to the mobile terminal, so that the mobile terminal can know the current traffic use condition one by one, and then a better network access strategy is selected. Or upon inquiry by the mobile terminal.
And thirdly, the data sent to the proxy server by the traffic-free platform server comprises the communication identification of the mobile terminal, free residual traffic information and temporary verification information, and under the condition, the proxy server adopts the resource server to acquire the requested data when the proxy server verifies that the data access request is legal through the temporary verification information and the latest free residual traffic information is greater than the preset amount. By the scheme, the security of the network access process can be ensured, and the appointed service provider can be ensured to provide the preset amount of free flow to the mobile terminal.
In step S130, the data in the process of accessing the network by the mobile terminal includes uplink data and downlink data, where the uplink data is data (i.e., a data access request) sent by the mobile terminal to the resource server, and the downlink data is data (i.e., requested data) sent by the resource server to the mobile terminal, where a data traffic of at least one of the uplink data and the downlink data is counted in a data traffic consumed by the designated server.
If the appointed service provider provides the uplink data flow-free for the mobile terminal, the data access request sent by the mobile terminal to the proxy server also carries a flow-free identifier, and the data flow corresponding to the data access request is counted in the appointed service provider based on the flow-free identifier; if the specified service provider provides the mobile terminal with the downlink data flow-free, the requested data carries a flow-free identifier (for example, the proxy server adds the flow-free identifier), and then the data flow of the requested data can be counted into the specified server by the mobile communication operator based on the flow-free identifier.
The flow-free identifier may be a plurality of different forms of flow-free identifiers, and two of them are listed below for description, and certainly, in the specific implementation process, the flow-free identifier is not limited to the following two cases.
The method comprises the steps that after a proxy server receives a communication identifier of a mobile terminal sent by a traffic-free platform server and before a data access request sent by the mobile terminal is received, a preset label is sent to the mobile terminal, the preset label is carried when the mobile terminal accesses a network for data transmission, and the preset label is a traffic-free identifier.
And secondly, the IP address of the proxy server distributed by the traffic-free platform server for the mobile terminal is a first preset IP address, and the first preset IP address is the traffic-free identifier.
In the specific implementation process, data traffic in the process of accessing the network can be counted through a gateway arranged between the mobile terminal and the proxy server.
Aiming at the condition that the flow-free identifier is a first preset IP address, after receiving a data access request sent by a mobile terminal, a corresponding gateway (or a charging system connected with a corresponding network) judges whether the IP of a next node corresponding to the data access request is the first preset IP address, if so, the data flow of the next node is counted into the data flow of a specified service provider, after receiving requested data sent by a proxy server, the corresponding gateway (or the charging system connected with the corresponding network) judges whether the IP of the proxy server is the first preset IP address, and if so, the data flow of the proxy server is counted into the data flow of the specified service provider; in the case that the traffic-free identifier is a preset tag, after receiving a data access request (or receiving requested data sent by a proxy server) sent by a mobile terminal, a corresponding gateway (or a charging system connected to a corresponding network) determines whether the data access request (or the requested data) contains the preset tag, and if the data access request (or the requested data) contains the preset tag, the data traffic of the gateway is added to the data traffic of a specified service provider.
In the specific implementation process, the designated service provider may be service providers in a plurality of different situations, and further, the manner of counting all or part of the data traffic into the designated service provider is also different, and two of them are listed below for introduction, and of course, in the specific implementation process, the specific implementation process is not limited to the following two situations.
First, the designated service provider is a service provider that provides traffic-free service uniformly, in this case, the designated service provider is, for example: and the mobile communication operator counts and charges the service provider corresponding to the flow-free platform server aiming at all products in the flow-free product list.
In this case, as an optional embodiment, the mobile terminal marks a first vendor tag corresponding to a first vendor that develops the first application based on data transmission in the process of accessing the network by the first application, and the mobile terminal enters, by a service provider corresponding to the traffic-exempt platform server, all or part of data traffic generated in the process of accessing the network by the first application into the first vendor based on the first vendor tag.
For example, a first vendor tag is typically used to uniquely characterize the vendor, such as: vendor name, vendor number, etc., in which case, after the service provider corresponding to the traffic-free platform server provides the traffic-free service for the application program of different vendors, the service provider may also charge the corresponding vendor.
Secondly, the whole or part of the data traffic is included in a specified service provider by a mobile communication operator based on the traffic-exempt identifier, and the method comprises the following steps:
and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
For example, different manufacturers may set different proxy servers respectively, and then in step S101, the content sent by the mobile terminal to the traffic-exempt platform server includes, in addition to the communication identifier and the authentication information of the mobile terminal, a first application identifier of a first application used by the mobile terminal, and then the traffic-exempt platform server determines, based on the first application identifier, a first manufacturer identifier corresponding to the first application, and then allocates, to the mobile terminal, the proxy server corresponding to the first manufacturer identifier.
Furthermore, the transmission data in the process that the mobile terminal accesses the network through the first application also comprises a first manufacturer identification of the first manufacturer, and when the mobile communication operator charges, if the transmission data comprises the flow-free identification and the first manufacturer identification, the data flow corresponding to the transmission data is counted in the first manufacturer.
In the specific implementation process, the fact that all data traffic in the process of the mobile terminal accessing the network is included in the designated service provider means that in the process of accessing the network, the mobile network operator determines the data traffic in the process of accessing the mobile terminal and then all the data traffic is included in the designated service provider.
The mobile network operator adds part of data traffic generated in the process that the mobile terminal accesses the network through the proxy server into a designated service provider based on the traffic-free identifier, and there may be a plurality of cases, three of which are listed below for introduction, and certainly, in the specific implementation process, the cases are not limited to the following three cases.
First, a specific percentage of data traffic during a mobile terminal's network access is accounted for by a designated service provider.
For example, the specific ratios are, for example: 50%, 70%, etc., wherein when the mobile terminal has a traffic exemption right (for example, the data transmission carries a traffic exempt identifier) during accessing the network, the corresponding gateway (or a charging system connected to the corresponding network) credits a specific proportion of the gateway to a specified service provider, and credits the rest of the gateway to the communication identifier, for example: assuming that the mobile terminal consumes 10M of traffic in the process of accessing the network at this time, and the specific proportion is 50%, the charging system counts 5M of traffic into the designated service provider during charging, and counts the rest 5M of traffic into the communication identifier of the mobile terminal. Of course, the above data are by way of example only and not by way of limitation.
Second, a certain amount of data traffic during the mobile terminal's access to the network is accounted for by the designated service provider.
For example, the specific number is, for example: 10M, 20M, etc., wherein when the mobile terminal has a traffic exemption right in the process of accessing the network, the corresponding gateway (or a charging system connected with the corresponding network) judges whether the data traffic in the process of accessing the network exceeds the specific quantity after the process of accessing the network is finished, and if the data traffic does not exceed the specific quantity, all the data traffic is counted in a specified service provider; if the number exceeds a certain number, no more than a portion of the data traffic is included in the designated service provider and more than a portion is included in the communication identification of the mobile terminal.
Third, the data traffic of the specific content during the mobile terminal's access to the network is credited to the designated service provider.
For example, the specific content is, for example: when the mobile terminal has a traffic-free right in a network access process, the corresponding gateway (or a charging system connected with the corresponding network) acquires data transmitted in the network access process, then determines data such as characters and pictures from the data transmitted in the network access process, and records the corresponding data traffic into a specified service provider; while for other types of content, for example: and the video records the corresponding data flow into the communication identifier of the mobile terminal.
As a possible implementation manner, the method for accounting in the designated service provider includes: and the cost generated by the corresponding data flow is counted as the cost consumed by the account of the designated service provider.
For example, since the corresponding data traffic is charged to the specified service provider, and the mobile communication operator does not perform repeated charging for one-time network access process, the corresponding data traffic is not charged to the identifier of the mobile terminal, and therefore, when the mobile communication operator charges, the charge generated by the mobile communication operator is charged to the charge consumed by the account of the specified service provider, so as to charge the specified service provider. As an alternative embodiment, with continued reference to fig. 1, the method further includes:
step S150: the proxy server judges whether any data access request of the mobile terminal is received within a preset time period;
step S160: and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal is logged out.
For example, the preset time period is, for example: 10min, 30min, 40min and so on, if the proxy server does not receive any data access request sent by the mobile terminal within the preset time period, it indicates that the process of the mobile terminal accessing the network is finished, so a corresponding prompt message can be generated. Further, after the proxy server generates the prompt message, the proxy server may also send the prompt message to the traffic-free platform server.
In this case, if the traffic-free platform server has previously allocated the temporary authentication information for the current network access process, the traffic-free platform server cancels the temporary authentication information based on the prompt information sent by the proxy server, and in addition, the proxy server also cancels the temporary authentication information. By the scheme, the distributed temporary verification information can be ensured to be only used as the verification information in the network access process at this time, and new temporary verification information still needs to be generated in the next network access, so that the security of the network access is improved.
As an alternative embodiment, if the proxy server prompts that the mobile terminal has logged off, please continue to refer to fig. 1, the method further includes:
the proxy server sends the initial internet surfing time, the end internet surfing time and the consumed data traffic information of the mobile terminal to the traffic-free platform server;
and the traffic-free platform server counts the free residual traffic of the mobile terminal based on the data traffic information sent by the proxy server.
For example, the proxy server may send the traffic-free platform server the information shown in table 1:
TABLE 1
Assuming that the total free data traffic distributed by the traffic-free platform server to the mobile terminal is: 30M, and the mobile terminal has consumed 20M traffic before the network access, it may be determined that the free remaining traffic of the mobile terminal after the network access process is as follows: 10M-1.6M ═ 8.4M. Of course, the above data traffic is by way of example only and not by way of limitation.
According to the interaction method based on the flow-free platform to access the network provided by the embodiment of the invention, the embodiment of the invention also provides a method based on the flow-free platform to access the network, as shown in fig. 2, the method comprises the following steps:
step S201, a mobile terminal receives a flow-free product list sent by a flow-free platform server, wherein application identifications of a plurality of network-accessible applications are recorded in the flow-free product list, the network-accessible applications belong to different developers respectively, and the applications have flow-free internet access rights;
step S202, when the mobile terminal accesses a network based on a first application, a first application identifier of the first application is obtained;
step S203, the mobile terminal judges whether the first application identifier is recorded in the flow-free product list, if so, the mobile terminal sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator;
step S204, the mobile terminal receives the requested data which is acquired by the proxy server from the resource server based on the data access request through the network of the mobile communication operator;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
Optionally, the obtaining the first application identifier of the first application when the mobile terminal accesses the network based on the first application includes: when the mobile terminal accesses a network through an application program, acquiring an application identifier of the application program, wherein the application program is the first application, and the application identifier of the application program is the first application identifier; or when the mobile terminal accesses a website, acquiring a network address of the website, wherein the website is the first application, and the network address of the website is the first application identifier; or when the mobile terminal accesses a webpage, acquiring a network address of the webpage, wherein the webpage is the first application, and the network address of the webpage is the first application identifier.
Optionally, the mobile terminal is credited to the specific service provider by a mobile communication operator based on the traffic-free identifier based on a part of data traffic generated in the process of accessing the network by the first application, and the crediting includes: the mobile terminal is counted into the appointed service provider based on the data traffic of a specific proportion in the process that the first application accesses the network; or the mobile terminal is counted into the specified service provider based on a specific amount of data traffic in the process that the first application accesses the network; or the data traffic of the specific content in the process that the mobile terminal accesses the network based on the first application is counted in the specified service provider.
Optionally, the crediting into the designated service provider includes: and calculating the cost generated by the corresponding data flow into the cost consumed by the account of the specified service provider.
Optionally, the mobile terminal is credited to the designated service provider by the mobile communication operator based on the traffic-free identifier based on all or part of the data traffic generated in the process of accessing the network by the first application, including: the data access request comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into the specified service provider based on the flow-free identifier; and/or the requested data comprises a traffic-exempt identifier, and the data traffic corresponding to the requested data is credited to the specified service provider based on the traffic-exempt identifier.
Optionally, the mobile terminal is credited to the designated service provider by the mobile communication operator based on the traffic-free identifier based on all or part of the data traffic generated in the process of accessing the network by the first application, including: when the mobile communication operator charges, when the fact that the data of the mobile terminal in the process of accessing the network based on the first application contain the preset label is determined, all or part of data traffic of the mobile terminal in the process of accessing the network based on the first application is counted in the specified service provider; or the mobile terminal transmits data in the first application access network through a proxy server with a preset IP address, and when the mobile communication operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
Optionally, before sending, to the proxy server, the data access request based on the application access network through the network of the mobile communications carrier, the method further includes: acquiring the preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier; or acquiring the proxy server distributed by the flow-free platform server for the network access process, wherein the IP address of the proxy server is the first preset IP address, and the first preset IP address is the flow-free identifier.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes: and sending the communication identification and the identity authentication information of the mobile terminal to a flow-free platform server so that the flow-free platform server distributes the proxy server to the first application-based network access process after verifying that the communication identification has the flow-free authority based on the identity authentication information.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes: and sending the communication identification and the identity authentication information of the mobile terminal to the flow-free platform server, so that the flow-free platform server distributes the proxy server to the mobile terminal after verifying that the communication identification has the flow-free permission based on the identity authentication information.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes: and sending the communication identifier of the mobile terminal and the first application identifier to a flow-free platform server, so that the flow-free platform server allocates the proxy server for the network access process based on the first application after determining that the communication identifier has the flow-free authority based on the first application identifier.
Optionally, before sending, to the proxy server, the data access request based on the first application accessing the network through the network of the mobile communication carrier, the method further includes: receiving temporary verification information distributed to the mobile terminal by the traffic-free platform server, wherein when the traffic-free platform server determines that the communication identifier has traffic-free rights, the temporary verification information is distributed to the mobile terminal; the sending, to a proxy server through a network of a mobile communication carrier, a data access request based on the first application accessing a network includes: and the proxy server is provided with a data access request carrying the communication identifier and the temporary verification information, so that the proxy server verifies the validity of the data access request based on the communication identifier and the temporary verification information.
Optionally, the mobile communication operator adds all or part of the data traffic to a specific service provider based on the traffic-exempt identifier, including: and the mobile communication operator counts all or part of the data traffic into a service provider corresponding to the traffic-free platform server based on the traffic-free identifier.
Optionally, the method further includes: the mobile terminal is marked with a first manufacturer label corresponding to a first manufacturer developing the first application based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into the first manufacturer by a service provider corresponding to the traffic-free platform server based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
Optionally, the mobile communication operator adds all or part of the data traffic to a specific service provider based on the traffic-exempt identifier, including: and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
Optionally, the total or part of the data traffic is included in the first vendor to which the first application belongs by the mobile communication operator based on the traffic exempt identifier, including: the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on data transmission in the process of accessing the network by the first application, and the mobile terminal is included in the first manufacturer by the mobile communication operator based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label and the traffic-free identifier.
According to the interaction method based on the flow-free platform to access the network provided by the embodiment of the present invention, an embodiment of the present invention further provides a mobile terminal, as shown in fig. 3, including:
a receiving module 301, configured to receive a flow-free product list sent by a flow-free platform server, where application identifiers of multiple network-accessible applications are recorded in the flow-free product list, the multiple network-accessible applications belong to different developers, and the multiple applications all have a flow-free internet access right;
an obtaining module 302, configured to obtain a first application identifier of a first application when accessing a network based on the first application;
a determining module 303, configured to determine whether the first application identifier is recorded in the flow-free product list;
a sending module 304, configured to send, to a proxy server through a network of a mobile communications operator, a data access request based on network access by the first application when the determining module determines that the first application identifier is recorded in the flow-free product list;
the receiving module 301 is further configured to receive, through a network of a mobile communication operator, requested data that is obtained by the proxy server from a resource server based on the data access request;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
Optionally, before the sending module sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator, the obtaining module is further configured to obtain a preset tag allocated by the proxy server in the network access process, where the preset tag is carried during data transmission in the network access process, where the preset tag is the traffic-free identifier, or obtain a traffic-free platform server and allocate to the proxy server in the network access process, an IP address of the proxy server is a first preset IP address, and the first preset IP address is the traffic-free identifier.
Optionally, the sending module is further specifically configured to send the communication identifier and the authentication information of the mobile terminal to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the process based on the first application access network after verifying that the communication identifier has a traffic-exempt right based on the authentication information.
Optionally, the sending module is further specifically configured to send the communication identifier and the authentication information of the mobile terminal to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the mobile terminal after verifying that the communication identifier has a traffic-exempt right based on the authentication information.
Optionally, the sending module is further specifically configured to send the communication identifier of the mobile terminal and the first application identifier to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the process based on the first application access network after determining that the communication identifier has a traffic-exempt right based on the first application identifier.
Optionally, before the sending module sends a data access request based on the first application access network to a proxy server through a network of a mobile communications operator, the receiving module is further configured to receive temporary verification information allocated by the traffic-free platform server to the mobile terminal, where the temporary verification information is allocated to the mobile terminal when the traffic-free platform server determines that the communication identifier has a traffic-free right; the sending module is specifically configured to include, to the proxy server, a data access request carrying the communication identifier and the temporary validation information, so that the proxy server validates validity of the data access request based on the communication identifier and the temporary validation information.
According to the interaction method based on the flow-free platform to access the network provided by the embodiment of the invention, the embodiment of the invention also provides a method based on the flow-free platform to access the network, as shown in fig. 4, the method comprises the following steps:
step S401, a traffic-free platform server collects application identifiers of a plurality of network-accessible applications, the network-accessible applications belong to different developers respectively, and the applications have traffic-free internet access permission;
step S402, the flow-free platform server generates a flow-free product list containing application identifications of the plurality of applications;
step S403, the traffic-free platform server sends the traffic-free product list to the mobile terminal, so that the mobile terminal can access the network based on the first application in a traffic-free internet access manner when accessing the network based on the first application, and an application identifier of the first application is recorded in the traffic-free product list;
the mobile terminal is marked with a traffic-free identifier based on data transmission in the process of accessing the network by the first application in a traffic-free internet access mode, and the mobile terminal is counted into the designated service provider by a mobile communication operator based on the traffic-free identifier based on all or part of data traffic generated in the process of accessing the network by the first application in the traffic-free internet access mode.
Optionally, when the mobile terminal accesses a network through an application program, the application program is the first application, and an application identifier of the application program is the first application identifier; or when the mobile terminal accesses a website, the website is the first application, and the network address of the website is the first application identifier; or when the mobile terminal accesses a webpage, the webpage is the first application, and the network address of the webpage is the first application identifier.
Optionally, the charging, by the mobile terminal, part of data traffic generated in the process of accessing the network by the first application in a traffic-free internet access manner into the designated service provider by the mobile communication operator based on the traffic-free identifier includes: the mobile terminal is counted into the appointed service provider based on the data traffic of a specific proportion in the process that the first application accesses the network; or the mobile terminal is counted into the specified service provider based on a specific amount of data traffic in the process that the first application accesses the network; or the data traffic of the specific content in the process that the mobile terminal accesses the network based on the first application is counted in the specified service provider.
Optionally, the crediting into the designated service provider includes: and calculating the cost generated by the corresponding data flow into the cost consumed by the account of the specified service provider.
Optionally, the charging, by the mobile terminal, all or part of data traffic generated in the process of accessing the network by the first application in a traffic-free internet access manner to the designated service provider by the mobile communication operator based on the traffic-free identifier includes: when the mobile communication operator charges, when the fact that the data in the process that the mobile terminal accesses the network based on the first application contains the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider; or the mobile terminal transmits data based on the first application in the process of accessing the network through the proxy server of the first preset IP address, and when the mobile communication operator charges, all or part of data traffic flowing through the first preset IP address is counted in the specified service provider.
Optionally, after the traffic-free platform server sends the traffic-free product list to the mobile terminal, the method further includes: the mobile terminal receives the flow-free product list sent by the flow-free platform server; when a mobile terminal accesses a network based on the first application, the mobile terminal acquires a first application identifier of the first application; the mobile terminal judges whether the first application identifier is recorded in the flow-free product list or not; if so, the mobile terminal accesses the network based on the first application in a traffic-free internet access mode; the method for accessing the network by the mobile terminal based on the first application in a traffic-free internet access mode includes: the mobile terminal sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator; the mobile terminal receives, through a network of a mobile communication carrier, the requested data that the proxy server acquired from the resource server based on the data access request.
Optionally, the charging, by the mobile terminal, all or part of data traffic generated in the process of accessing the network by the first application in a traffic-free internet access manner to the designated service provider by the mobile communication operator based on the traffic-free identifier includes: the data access request comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into the specified service provider based on the flow-free identifier; and/or the requested data comprises a traffic-exempt identifier, and the data traffic corresponding to the requested data is credited to the specified service provider based on the traffic-exempt identifier.
Optionally, the method further includes: the traffic-free platform server receives the communication identification and the identity verification information of the mobile terminal; the flow-free platform server verifies whether the communication identifier has a flow-free permission or not based on the communication identifier and the identity verification information of the mobile terminal; and when the traffic-free platform server determines that the communication identifier has the traffic-free right, the proxy server is allocated to the mobile terminal.
Optionally, the method further includes: the traffic-free platform server receives the communication identifier of the mobile terminal and the first application identifier; and the flow-free platform server distributes the proxy server to the mobile terminal after determining that the communication identifier has the flow-free authority based on the first application identifier.
Optionally, after the mobile terminal sends a data access request based on the first application accessing the network to the proxy server through a network of a mobile communication operator, the method further includes: the proxy server receives the data access request sent by the mobile terminal, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet; and the proxy server acquires corresponding requested data from a resource server according to the data access request, and transmits the requested data to the mobile terminal through a network of a mobile communication operator.
Optionally, before the mobile terminal sends a data access request based on the first application accessing the network to the proxy server through the network of the mobile communication operator, the method further includes: the proxy server sends a preset label to the mobile terminal, the preset label is carried when the mobile terminal carries out data transmission based on the first application network access process, and the preset label is the flow-free identification; or the IP address of the proxy server is a first preset IP address, and the first preset IP address is the flow-free identifier.
Optionally, the method further includes: the proxy server judges whether any data access request of the mobile terminal is received within a preset time period; and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal logs out.
Optionally, the method further includes: the traffic-free platform server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server; the step of receiving the data access request sent by the mobile terminal by the proxy server comprises the following steps: the proxy server receives the data access request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information; the requested data obtained from the resource server includes: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires the requested data from the resource server.
Optionally, after the proxy server prompts that the mobile terminal has logged off, the traffic-free platform server logs off the temporary verification information.
Optionally, the mobile communication operator adds all or part of the data traffic to a specific service provider based on the traffic-exempt identifier, including: and the mobile communication operator counts all or part of the data traffic into a service provider corresponding to the traffic-free platform server based on the traffic-free identifier.
Optionally, the method further includes: the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on data transmission in the process of accessing the network by the first application, and the mobile terminal is added into the first manufacturer by a service provider corresponding to the traffic-free platform server based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
Optionally, the mobile communication operator adds the whole or part of the data traffic to a specific service provider based on the traffic-free identifier, specifically: and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
Optionally, the method further includes: the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on the data transmission in the process of accessing the network by the first application, and the mobile terminal is added into the first manufacturer by the mobile communication operator based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
According to the interaction method based on the flow-free platform to access the network provided by the embodiment of the present invention, the embodiment of the present invention further provides a system based on the flow-free platform to access the network, which includes a flow-free platform server, as shown in fig. 5, where the flow-free platform server includes:
a collecting module 501, configured to collect application identifiers of multiple network-accessible applications, where the multiple network-accessible applications belong to different developers, and the multiple applications all have traffic-free internet access rights;
a generating module 502 for generating a flow-free product list containing application identifications of the plurality of applications;
a first sending module 503, configured to send the flow-free product list to a mobile terminal, so that the mobile terminal can access a network based on a first application in a flow-free internet access manner when accessing the network based on the first application, where an application identifier of the first application is recorded in the flow-free product list;
the mobile terminal is marked with a traffic-free identifier based on data transmission in the process of accessing the network by the first application in a traffic-free internet access mode, and the mobile terminal is counted into the designated service provider by a mobile communication operator based on the traffic-free identifier based on all or part of data traffic generated in the process of accessing the network by the first application in the traffic-free internet access mode.
Optionally, the traffic-free platform server further includes: the first receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal; the verification module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal; and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
Optionally, the first receiving module is further configured to receive a communication identifier of the mobile terminal and the first application identifier; the verification module is further used for determining whether the communication identifier has a traffic exemption permission based on the first application identifier; the allocation module is further configured to allocate the proxy server to the mobile terminal when it is determined that the communication identifier has the traffic exemption right.
Optionally, the system further includes a proxy server, and the proxy server includes: the receiving module is used for receiving a data access request sent by the mobile terminal, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet; and the second sending module is used for acquiring corresponding requested data from a resource server according to the data access request and transmitting the requested data to the mobile terminal through a network of a mobile communication operator.
Optionally, the second sending module is further configured to send a preset tag to the mobile terminal, where the preset tag is carried by the mobile terminal when the mobile terminal performs data transmission based on the first application in a network access process, and the preset tag is the traffic-free identifier.
Optionally, the proxy server further includes: and the prompting module is used for judging whether any data access request of the mobile terminal is received within a preset time period, and prompting that the mobile terminal logs out when any data access request of the mobile terminal is not received within the preset time period.
Optionally, the traffic-free platform server further includes: and the logout module is used for logging out the temporary verification information after the prompt module prompts the mobile terminal to log out.
Optionally, the generating module is further configured to generate temporary verification information, and send the temporary verification information to the mobile terminal and the proxy server; the second receiving module is further configured to receive the data access request carrying the communication identifier and the temporary verification information and sent by the mobile terminal; the second sending module is further configured to obtain the requested data from the resource server when the data access request is verified to be legitimate through the temporary verification information.
One or more embodiments of the invention have at least the following beneficial effects:
in the embodiment of the invention, the flow-free product list sent by the flow-free platform server is received at first, the application identifications of a plurality of applications are recorded in the flow-free product list, the plurality of applications belong to a plurality of manufacturers respectively, and the plurality of applications have flow-free internet access permission; when the mobile terminal accesses a network based on a first application, acquiring a first application identifier of the first application; judging whether the first application identifier is recorded in the flow-free product list or not, if so, sending a data access request based on a first application access network to a proxy server through a network of a mobile communication operator; receiving, by a network of a mobile communication operator, requested data acquired by a proxy server from a resource server based on a data access request; the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is assigned to a service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier. That is, when the mobile terminal accesses the network based on an application, all or part of the data traffic in the designated service provider is consumed, so that the data traffic consumed by the mobile terminal can be reduced, the technical problem that the traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art is solved, and the technical effect that the mobile terminal entirely or partially accesses the network without a flow is achieved; therefore, the mobile terminal can realize the technical effect of downloading the network content without flow without paying the flow fee. Therefore, the enthusiasm of the user for downloading can be remarkably improved, and the wide spread of the network content on the Internet is facilitated.
The flow-free platform server and the proxy server introduced by the embodiment of the invention can be two servers with completely independent physical positions; the present invention may also be two different functional modules of the same server, and the embodiment of the present invention is not limited thereto.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a xxx device in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses A1, a method for accessing network based on flow-free platform, which is characterized in that the method comprises:
the method comprises the steps that a mobile terminal receives a flow-free product list sent by a flow-free platform server, application identifications of multiple network-accessible applications are recorded in the flow-free product list, the multiple network-accessible applications belong to different developers respectively, and the multiple applications have flow-free internet access rights;
the method comprises the steps that when the mobile terminal accesses a network based on a first application, a first application identifier of the first application is obtained;
the mobile terminal judges whether the first application identifier is recorded in the flow-free product list, and if so, sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator;
the mobile terminal receives the requested data acquired by the proxy server from the resource server based on the data access request through a network of a mobile communication operator;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
A2, the method as claimed in a1, wherein the obtaining a first application id of a first application when the mobile terminal accesses the network based on the first application, includes:
when the mobile terminal accesses a network through an application program, acquiring an application identifier of the application program, wherein the application program is the first application, and the application identifier of the application program is the first application identifier; or
When the mobile terminal accesses a website, acquiring a network address of the website, wherein the website is the first application, and the network address of the website is the first application identifier; or
And when the mobile terminal accesses a webpage, acquiring a network address of the webpage, wherein the webpage is the first application, and the network address of the webpage is the first application identifier.
A3, the method as claimed in a1, wherein the mobile terminal is included in the designated service provider by a mobile communication carrier based on the traffic-free id based on a part of data traffic generated during the first application accessing the network, the method includes:
the mobile terminal is counted into the appointed service provider based on the data traffic of a specific proportion in the process that the first application accesses the network; or
The mobile terminal is counted into the specified service provider based on a specific amount of data traffic in the process that the first application accesses the network; or
And the data traffic of the specific content in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider.
A4, the method as recited in a1, wherein said crediting with a designated facilitator comprises:
and calculating the cost generated by the corresponding data flow into the cost consumed by the account of the specified service provider.
A5, the method as claimed in a1, wherein the mobile terminal is credited to a specific service provider by a mobile communication carrier based on the traffic-free identifier based on all or part of data traffic generated during the first application accessing the network, comprising:
the data access request comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into the specified service provider based on the flow-free identifier; and/or the presence of a gas in the gas,
the requested data comprises a traffic-exempt identifier, and data traffic corresponding to the requested data is included in the specified service provider based on the traffic-exempt identifier.
A6, the method as claimed in a5, wherein the mobile terminal is credited to a specific service provider by a mobile communication carrier based on the traffic-free identifier based on all or part of data traffic generated during the first application accessing the network, comprising:
when the mobile communication operator charges, when the fact that the data of the mobile terminal in the process of accessing the network based on the first application contain the preset label is determined, all or part of data traffic of the mobile terminal in the process of accessing the network based on the first application is counted in the specified service provider; or
And the mobile terminal transmits data in the first application access network through a proxy server with a preset IP address, and when the mobile communication operator charges, all or part of data traffic flowing through the preset IP address is counted in the appointed service provider.
A7, wherein before the sending the data access request based on the application access network to the proxy server through the network of the mobile communication carrier, the method of a6 further comprises:
acquiring the preset label distributed by the proxy server for the network access process, wherein the preset label is carried during data transmission in the network access process, and the preset label is the flow-free identifier; or
And acquiring the proxy server distributed by the flow-free platform server for the network access process, wherein the IP address of the proxy server is the first preset IP address, and the first preset IP address is the flow-free identifier.
A8, the method as claimed in a1, wherein before sending the data access request based on the first application accessing the network to the proxy server through the network of the mobile communication carrier, the method further comprises:
and sending the communication identification and the identity authentication information of the mobile terminal to a flow-free platform server so that the flow-free platform server distributes the proxy server to the first application-based network access process after verifying that the communication identification has the flow-free authority based on the identity authentication information.
A9, the method as claimed in a1, wherein before sending the data access request based on the first application accessing the network to the proxy server through the network of the mobile communication carrier, the method further comprises:
and sending the communication identification and the identity authentication information of the mobile terminal to the flow-free platform server, so that the flow-free platform server distributes the proxy server to the mobile terminal after verifying that the communication identification has the flow-free permission based on the identity authentication information.
A10, the method as claimed in a1, wherein before sending the data access request based on the first application accessing the network to the proxy server through the network of the mobile communication carrier, the method further comprises:
and sending the communication identifier of the mobile terminal and the first application identifier to a flow-free platform server, so that the flow-free platform server allocates the proxy server for the network access process based on the first application after determining that the communication identifier has the flow-free authority based on the first application identifier.
A11, the method as claimed in a1, wherein before sending the data access request based on the first application accessing the network to the proxy server through the network of the mobile communication carrier, the method further comprises:
receiving temporary verification information distributed to the mobile terminal by the traffic-free platform server, wherein when the traffic-free platform server determines that the communication identifier has traffic-free rights, the temporary verification information is distributed to the mobile terminal;
the sending, to a proxy server through a network of a mobile communication carrier, a data access request based on the first application accessing a network includes:
and the proxy server is provided with a data access request carrying the communication identifier and the temporary verification information, so that the proxy server verifies the validity of the data access request based on the communication identifier and the temporary verification information.
A12, the method as claimed in a1, wherein the full or partial data traffic is included in a designated service provider by a mobile communication carrier based on the traffic-free id, comprising:
and the mobile communication operator counts all or part of the data traffic into a service provider corresponding to the traffic-free platform server based on the traffic-free identifier.
A13, the method of A12, wherein the method further comprises:
the mobile terminal is marked with a first manufacturer label corresponding to a first manufacturer developing the first application based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into the first manufacturer by a service provider corresponding to the traffic-free platform server based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
A14, the method as claimed in a1, wherein the full or partial data traffic is included in a designated service provider by a mobile communication carrier based on the traffic-free id, comprising:
and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
A15, the method as claimed in a14, wherein the full or partial data traffic is included by the mobile communication carrier in a first vendor to which the first application belongs based on the traffic-exempt identifier, comprising:
the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on data transmission in the process of accessing the network by the first application, and the mobile terminal is included in the first manufacturer by the mobile communication operator based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label and the traffic-free identifier.
B16, a mobile terminal, comprising:
the flow-free product list is recorded with application identifications of a plurality of network-accessible applications, the plurality of network-accessible applications belong to different developers respectively, and the plurality of applications all have flow-free internet access permission;
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first application identifier of a first application when accessing a network based on the first application;
the judging module is used for judging whether the first application identifier is recorded in the flow-free product list or not;
a sending module, configured to send, to a proxy server through a network of a mobile communications operator, a data access request based on a network accessed by the first application when the determining module determines that the first application identifier is recorded in the flow-free product list;
the receiving module is further used for receiving the requested data acquired by the proxy server from the resource server based on the data access request through a network of a mobile communication operator;
the mobile terminal is marked with a flow-free identifier based on data transmission in the process of accessing the network by the first application, and the mobile terminal is counted into a designated service provider by a mobile communication operator based on all or part of data flow generated in the process of accessing the network by the first application based on the flow-free identifier.
B17, the mobile terminal as B16, wherein before the sending module sends a data access request based on the first application to the proxy server through the network of the mobile communication operator, the obtaining module is further configured to obtain the preset tag allocated by the proxy server for the network access process, and carry the preset tag during data transmission in the network access process, where the preset tag is the traffic-free identifier, or obtain the proxy server allocated by the traffic-free platform server for the network access process, and the IP address of the proxy server is the first preset IP address, and the first preset IP address is the traffic-free identifier.
B18, the mobile terminal according to B16 or B17, wherein the sending module is further configured to send the communication identifier and the authentication information of the mobile terminal to the traffic-exempt platform server before sending the data access request based on the first application access network to the proxy server through a network of a mobile communication operator, so that the traffic-exempt platform server allocates the proxy server to the process based on the first application access network after verifying that the communication identifier has traffic-exempt rights based on the authentication information.
B19, the mobile terminal according to B16 or B17, wherein the sending module is further configured to send a communication identifier and authentication information of the mobile terminal to the platform server for traffic exemption before sending a data access request based on the first application access network to the proxy server through a network of a mobile communications carrier, so that the platform server for traffic exempt allocates the proxy server to the mobile terminal after verifying that the communication identifier has a traffic exempt right based on the authentication information.
B20, the mobile terminal according to B16 or B17, wherein the sending module is further configured to send the communication identifier of the mobile terminal and the first application identifier to the traffic exempt platform server before sending a data access request based on the first application access network to a proxy server through a network of a mobile communication carrier, so that the traffic exempt platform server allocates the proxy server for the process based on the first application access network after determining that the communication identifier has traffic exempt rights based on the first application identifier.
B21, the mobile terminal according to B16 or B17, wherein before the sending module sends a data access request based on the first application access network to a proxy server through a network of a mobile communications carrier, the receiving module is further configured to receive temporary verification information allocated to the mobile terminal by the platform traffic exempt server, wherein the temporary verification information is allocated to the mobile terminal when the platform traffic exempt server determines that the communication identifier has traffic exempt rights;
the sending module is specifically configured to include, to the proxy server, a data access request carrying the communication identifier and the temporary validation information, so that the proxy server validates validity of the data access request based on the communication identifier and the temporary validation information.
C1, a method for accessing network based on traffic-free platform, comprising:
the method comprises the steps that a flow-free platform server collects application identifications of multiple network-accessible applications, the multiple network-accessible applications belong to different developers respectively, and the multiple applications have flow-free internet access permission;
the traffic-free platform server generates a traffic-free product list containing application identifications of the plurality of applications;
the traffic-free platform server sends the traffic-free product list to a mobile terminal so that the mobile terminal can access a network based on a first application in a traffic-free internet access manner when accessing the network based on the first application, wherein an application identifier of the first application is recorded in the traffic-free product list;
the mobile terminal is marked with a traffic-free identifier based on data transmission in the process of accessing the network by the first application in a traffic-free internet access mode, and the mobile terminal is counted into the designated service provider by a mobile communication operator based on the traffic-free identifier based on all or part of data traffic generated in the process of accessing the network by the first application in the traffic-free internet access mode.
C2, the method according to C1,
when the mobile terminal accesses a network through an application program, the application program is the first application, and an application identifier of the application program is the first application identifier; or
When the mobile terminal accesses a website, the website is the first application, and the network address of the website is the first application identifier; or
When the mobile terminal accesses a webpage, the webpage is the first application, and the network address of the webpage is the first application identifier.
C3, the method according to C1, wherein the mobile terminal credits the designated service provider in a traffic-free internet access manner based on a part of data traffic generated during the first application accessing the network by a mobile communication carrier based on the traffic-free identifier, comprising:
the mobile terminal is counted into the appointed service provider based on the data traffic of a specific proportion in the process that the first application accesses the network; or
The mobile terminal is counted into the specified service provider based on a specific amount of data traffic in the process that the first application accesses the network; or
And the data traffic of the specific content in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider.
C4, the method according to C1, wherein the crediting to the designated service provider comprises:
and calculating the cost generated by the corresponding data flow into the cost consumed by the account of the specified service provider.
C5, the method as in C1, wherein the mobile terminal is included in the designated service provider by a mobile communication carrier based on the traffic-free identifier in a traffic-free internet access manner based on all or part of data traffic generated during the process of accessing the network by the first application, the method comprises:
when the mobile communication operator charges, when the fact that the data in the process that the mobile terminal accesses the network based on the first application contains the preset label is determined, all or part of data traffic in the process that the mobile terminal accesses the network based on the first application is counted into the specified service provider; or
The mobile terminal transmits data based on a first application in a network access process to pass through a proxy server of a first preset IP address, and when the mobile communication operator charges, all or part of data traffic flowing through the first preset IP address is counted in the specified service provider.
C6, the method according to any of C1-C5, wherein the method further comprises, after the traffic-free platform server sends the traffic-free product list to the mobile terminal:
the mobile terminal receives the flow-free product list sent by the flow-free platform server;
when a mobile terminal accesses a network based on the first application, the mobile terminal acquires a first application identifier of the first application;
the mobile terminal judges whether the first application identifier is recorded in the flow-free product list or not;
if so, the mobile terminal accesses the network based on the first application in a traffic-free internet access mode;
the method for accessing the network by the mobile terminal based on the first application in a traffic-free internet access mode includes:
the mobile terminal sends a data access request based on the first application access network to a proxy server through a network of a mobile communication operator;
the mobile terminal receives, through a network of a mobile communication carrier, the requested data that the proxy server acquired from the resource server based on the data access request.
C7, the method as in C6, wherein the mobile terminal is included in the designated service provider by a mobile communication carrier based on the traffic-free identifier in a traffic-free internet access manner based on all or part of data traffic generated during the process of accessing the network by the first application, the method comprises:
the data access request comprises a flow-free identifier, and the data flow corresponding to the data access request is counted into the specified service provider based on the flow-free identifier; and/or the presence of a gas in the gas,
the requested data comprises a traffic-exempt identifier, and the data traffic corresponding to the requested data is included in the specified service provider based on the traffic-exempt identifier.
C8, the method according to C6, further comprising:
the traffic-free platform server receives the communication identification and the identity verification information of the mobile terminal;
the flow-free platform server verifies whether the communication identifier has a flow-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and when the traffic-free platform server determines that the communication identifier has the traffic-free right, the proxy server is allocated to the mobile terminal.
C9, the method according to C6, further comprising:
the traffic-free platform server receives the communication identifier of the mobile terminal and the first application identifier;
and the flow-free platform server distributes the proxy server to the mobile terminal after determining that the communication identifier has the flow-free authority based on the first application identifier.
C10, the method according to C6, wherein after the mobile terminal sends a data access request based on the first application access network to a proxy server through a network of a mobile communication carrier, the method further comprises:
the proxy server receives the data access request sent by the mobile terminal, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet;
and the proxy server acquires corresponding requested data from a resource server according to the data access request, and transmits the requested data to the mobile terminal through a network of a mobile communication operator.
C11, the method according to C6, wherein before the mobile terminal sends a data access request based on the first application access network to a proxy server through a network of a mobile communication carrier, the method further comprises:
the proxy server sends a preset label to the mobile terminal, the preset label is carried when the mobile terminal carries out data transmission based on the first application network access process, and the preset label is the flow-free identification; or,
the IP address of the proxy server is a first preset IP address, and the first preset IP address is the flow-free identifier.
C12, the method according to C6, further comprising:
the proxy server judges whether any data access request of the mobile terminal is received within a preset time period; and
and if any data access request of the mobile terminal is not received within a preset time period, prompting that the mobile terminal logs out.
C13, the method according to C6, further comprising:
the traffic-free platform server generates temporary verification information and sends the temporary verification information to the mobile terminal and the proxy server;
the step of receiving the data access request sent by the mobile terminal by the proxy server comprises the following steps: the proxy server receives the data access request which is sent by the mobile terminal and carries the communication identifier and the temporary verification information;
the requested data obtained from the resource server includes: and when the proxy server verifies that the data access request is legal through the temporary verification information, the proxy server acquires the requested data from the resource server.
C14, the method according to C13, wherein the platform server logs out the temporary authentication information after the proxy server prompts the mobile terminal to log out.
C15, the method according to C1, wherein the full or partial data traffic is included in a specific service provider by a mobile communication carrier based on the traffic-exempt identifier, comprising:
and the mobile communication operator counts all or part of the data traffic into a service provider corresponding to the traffic-free platform server based on the traffic-free identifier.
C16, the method according to C15, wherein the method further comprises:
the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on data transmission in the process of accessing the network by the first application, and the mobile terminal is added into the first manufacturer by a service provider corresponding to the traffic-free platform server based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
C17, the method according to C1, wherein the mobile communication carrier credits all or part of the data traffic to a specific service provider based on the traffic-free id, specifically:
and the mobile communication operator counts all or part of the data traffic into a first vendor to which the first application belongs based on the traffic-free identification, wherein the first vendor belongs to the plurality of vendors.
C18, the method according to C17, further comprising:
the mobile terminal is marked with a first manufacturer label corresponding to the first manufacturer based on the data transmission in the process of accessing the network by the first application, and the mobile terminal is added into the first manufacturer by the mobile communication operator based on all or part of data traffic generated in the process of accessing the network by the first application based on the first manufacturer label.
D19, a system based on exempt from traffic platform access network, its characterized in that, including exempting from traffic platform server, exempt from traffic platform server and include:
the system comprises a collecting module, a judging module and a judging module, wherein the collecting module is used for collecting application identifiers of a plurality of network-accessible applications, the network-accessible applications belong to different developers respectively, and the applications have traffic-free internet access permission;
a generating module, configured to generate a flow-free product list including application identifications of the plurality of applications;
a first sending module. The flow-free product list is sent to a mobile terminal, so that the mobile terminal can access a network based on a first application in a flow-free internet access mode when accessing the network based on the first application, and an application identifier of the first application is recorded in the flow-free product list;
the mobile terminal is marked with a traffic-free identifier based on data transmission in the process of accessing the network by the first application in a traffic-free internet access mode, and the mobile terminal is counted into the designated service provider by a mobile communication operator based on the traffic-free identifier based on all or part of data traffic generated in the process of accessing the network by the first application in the traffic-free internet access mode.
D20, the system according to D19, wherein the traffic-free platform server further comprises:
the first receiving module is used for receiving the communication identification and the identity authentication information of the mobile terminal;
the verification module is used for verifying whether the communication identifier has the traffic-free permission or not based on the communication identifier and the identity verification information of the mobile terminal;
and the allocation module is used for allocating the proxy server to the mobile terminal when the communication identifier is determined to have the traffic exemption right.
D21, the system according to D20, wherein the first receiving module is further configured to receive the communication identifier of the mobile terminal and the first application identifier;
the verification module is further used for determining whether the communication identifier has a traffic exemption permission based on the first application identifier;
the allocation module is further configured to allocate the proxy server to the mobile terminal when it is determined that the communication identifier has the traffic exemption right.
D22, the system according to D19, wherein the system further comprises a proxy server comprising:
the receiving module is used for receiving a data access request sent by the mobile terminal, wherein the data access request comprises a communication identifier of the mobile terminal, and the communication identifier has a traffic-free access right to the internet;
and the second sending module is used for acquiring corresponding requested data from a resource server according to the data access request and transmitting the requested data to the mobile terminal through a network of a mobile communication operator.
D23, the system according to D22, wherein the second sending module is further configured to send a preset tag to the mobile terminal, where the preset tag is carried when the mobile terminal performs data transmission based on the first application in a network access process, and the preset tag is the traffic-free identifier.
24. The system of claim 22, wherein the proxy server further comprises:
and the prompting module is used for judging whether any data access request of the mobile terminal is received within a preset time period, and prompting that the mobile terminal logs out when any data access request of the mobile terminal is not received within the preset time period.
D25, the system according to D24, wherein the traffic-free platform server further comprises:
and the logout module is used for logging out the temporary verification information after the prompt module prompts the mobile terminal to log out.
D26, the system according to D25, wherein the generating module is further configured to generate temporary authentication information and send the temporary authentication information to the mobile terminal and the proxy server;
the second receiving module is further configured to receive the data access request carrying the communication identifier and the temporary verification information and sent by the mobile terminal;
the second sending module is further configured to obtain the requested data from the resource server when the data access request is verified to be legitimate through the temporary verification information.