A kind of mobile terminal flow monitoring methodTechnical field
The present invention relates to a kind of mobile terminal flow monitoring methods, belong to field of communication technology.
Background technique
With the continuous development of science and technology, people have also enjoyed the various conveniences of development in science and technology bring.Present peopleIt can be enjoyed by various types of mobile terminals as development in science and technology bring is comfortably lived.For example, smart phone, plateThe mobile terminals such as computer have become an important component part in people's life, and smart phone, plate can be used in userThe mobile terminals such as computer listen to music, play game etc., to mitigate pressure brought by modern fast pace life.
Under normal conditions, mobile terminal all has network access functions, and mobile terminal needs to consume when accessing networkThe data traffic of the user of mobile terminal is paid the fees according to the data traffic of consumption to the operator for providing network service.Due to existingCharging can only be carried out to the data traffic that user uses by operator by having in technology, so cause in the prior art, it is mobile wholeThe customer access network at end needs to expend a large amount of data traffic of mobile terminal;And since the network flow of mobile terminal is more highIt is expensive, thus, it forces the user of mobile terminal to have to pay a large amount of expense thus, so, significantly reduces user's visitThe enthusiasm for asking network is unfavorable for the universal and development of mobile interchange technology.
Summary of the invention
The present invention is exactly in view of the deficienciess of the prior art, provide a kind of mobile terminal flow monitoring method.
To solve the above problems, the technical solution used in the present invention is as follows:
A kind of mobile terminal flow monitoring method, characterized in that include the following steps:
Step 1: mobile terminal transmitted traffic message code, operator on mobile terminals, is edited " flow information code "It is sent on sub-server, whether sub-server automatic identification is that " the flow information code " arranged is opened automatically after confirming "Yes"Follow-up function is opened, and calls related function module;
Step 2: sub-server is handled, sub-server receives " the flow information code " arranged on mobile terminal, startsProcessing routine, including receive process, ciphering process and transmission process:
(1) receive process: sub-server receives " the flow information code " arranged on mobile terminal, by " flow informationCode " is compared with own database, determines the flow monitoring needs of the operator on mobile terminal;
(2) ciphering process: sub-server number identifies the series string of mobile terminal, and by series string number and " flowMessage code " is encrypted, and since the series string number of mobile terminal itself is different, cipher mode is different from,Improve the reliability and security of encryption;
(3) transmission process: the encryption information of generation is sent on primary server by sub-server;
Step 4: primary server is handled, primary server processing includes following two step:
(1) primary server is stored, mobile terminal transmission " flow information code " is stored automatically in the specific of primary serverOn region, by primary server automatically scanning and vacant memory space is identified, and storage address and address procedures are fed back into sub-serviceBusiness device and subsequent network carrier server, storage address and address procedures by sub-server be used to encrypt, and completes secondary addIt is close, safety and reliability is not only further increased in this way, but also primary server can more quickly identify storage location;
(2) send and consult information: the information of secondary encryption is sent in network operator server by primary server, by netNetwork carrier server automatic identification and information processing;
Step 5: network operator server is handled, including following four step:
(1) decrypt: network operator server is solved for the secondary encryption of sub-server encryption and primary serverIt is close, due to primary server automatically scanning and identify vacant memory space, and storage address and address procedures are fed back into sub-service businessDevice and subsequent network carrier server, therefore network operator server is quickly identified and is decrypted;
(2) inquire: network operator server is instructed according to primary server and is required, and counts mobile terminal in certain timeFlow information;
(3) encode: network operator server is edited relevant information, is ready for sending to sub-server according to query structure;
(4) send: the mobile terminal correlative flow information inquired is sent to sub-server by network operator server;
Step 6: flow feedback: the flow information that sub-server provides network operator server feeds back to mobile wholeEnd, is received by mobile terminal.
As an improvement of the above technical solution, uninterruptedly circulation carries out transient flow monitoring on the mobile terminal, graspsFlow information on mobile terminal.
As an improvement of the above technical solution, flow total amount is arranged on the mobile terminal to limit, excess traffic is realizedSuspension.
Compared with prior art, implementation result of the invention is as follows by the present invention:
Flow monitoring method of the present invention, mobile terminal carry out flow monitoring and letter by sub-server and primary serverBreath feedback, the flow feedback of network operator server are sent directly to sub-server, mobile terminal and network operator servicesDevice without directly carry out information communication with exchange, it is therefore not necessary to consume the flow of mobile terminal itself, realize that " zero delivery " carries outFlow monitoring.In addition, flow monitoring information encrypted for the first time by sub-server and storage address that primary server is provided andAddress procedures are used for secondary encryption, not only further increase safety and reliability in this way, but also primary server can more quicklyIt identifies storage location, meets operator's requirement.The product is verified by Related product and test simulation, and implementation result is good.
Detailed description of the invention
Fig. 1 is a kind of mobile terminal flow monitoring method structural schematic diagram of the present invention.
Specific embodiment
Illustrate the contents of the present invention below in conjunction with specific embodiments.
As shown in Figure 1, being a kind of mobile terminal flow monitoring method structural schematic diagram of the present invention.Shifting of the present inventionDynamic terminal flow monitoring method, includes the following steps:
Step 1: mobile terminal transmitted traffic message code, operator on mobile terminal 10, edits " flow information generationCode " is sent on sub-server 20, and whether 20 automatic identification of sub-server is " the flow information code " arranged, and confirms "Yes"Afterwards, follow-up function is automatically turned on, and calls related function module;
Step 2: sub-server is handled, sub-server 20 receives " the flow information code " arranged on mobile terminal 10,Start processing routine, including receive process, ciphering process and transmission process:
(1) receive process: sub-server 20 receives " the flow information code " arranged on mobile terminal 10, by " flowMessage code " is compared with own database, determines the flow monitoring needs of the operator on mobile terminal 10;
(2) ciphering process: sub-server No. 20 identifies the series string of mobile terminal 10, and by series string number and" flow information code " is encrypted, and since the series string number of mobile terminal 10 itself is different, cipher mode is allIt is not identical, improve the reliability and security of encryption;
(3) transmission process: the encryption information of generation is sent on primary server 30 by sub-server 20;
Step 3: primary server is handled, primary server processing includes following two step:
(1) primary server 30 is stored, the transmission of mobile terminal 10 " flow information code " is stored automatically in primary server 30Specific region on, by 30 automatically scanning of primary server and identify vacant memory space, and storage address and address procedures is anti-Feed sub-server 20 and subsequent network carrier server 40, storage address and address procedures be used for by sub-server 20 plusIt is close, secondary encryption is completed, not only further increases safety and reliability in this way, but also primary server 30 can be identified more quicklyStorage location;
(2) send and consult information: the information of secondary encryption is sent in network operator server 40 by primary server 30,By 40 automatic identification of network operator server and information processing;
Step 4: network operator server is handled, including following four step:
(1) decrypt: network operator server 40 is encrypted for sub-server 20 and the secondary encryption of primary server 30, intoRow decryption due to 30 automatically scanning of primary server and identifies vacant memory space, and storage address and address procedures is fed back toSub-server 20 and subsequent network carrier server 40, therefore network operator server 40 quickly identifies and place is decryptedReason;
(2) inquiry: network operator server 40 is instructed according to primary server 30 and is required, and counts mobile whole in certain timeThe flow information at end 10;
(3) encode: network operator server 40 edits relevant information according to query structure, is ready for sending to sub-service and is engaged inDevice 20;
(4) send: the 10 correlative flow information of mobile terminal inquired is sent to sub-service by network operator server 40Business device 20;
Step 5: flow feedback: the flow information that network operator server 40 provides is fed back to shifting by sub-server 20Dynamic terminal 10, is received by mobile terminal 10.
Mobile terminal flow monitoring method of the present invention, can also be arranged on mobile terminal 10 uninterruptedly recycle intoThe monitoring of row flow transient state, grasps flow information on mobile terminal 10, and control flow total amount, in this way, avoiding flowing at any timeMeasure excess;Suspension processing is carried out for excess traffic.
Mobile terminal flow monitoring method of the present invention, mobile terminal 10 pass through sub-server 20 and primary server 30Flow monitoring and information feedback are carried out, the flow feedback of network operator server 40 is sent directly to sub-server 20, mobileTerminal 10 without directly progress information communication and is exchanged with network operator server 40, it is therefore not necessary to consume mobile terminal 10The flow of itself realizes that " zero delivery " carries out flow monitoring.
The foregoing is a detailed description of the present invention in conjunction with specific embodiments, and it cannot be said that the present invention is specifically realIt applies and is only limitted to these explanations.For those skilled in the art to which the present invention belongs, before not departing from present inventive conceptIt puts, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to the scope of protection of the invention.