CN103209439A - Method, apparatus and device for monitoring data traffic - Google Patents
Method, apparatus and device for monitoring data traffic Download PDFInfo
- Publication number
- CN103209439A CN103209439A CN 201310081923 CN201310081923A CN103209439A CN 103209439 A CN103209439 A CN 103209439A CN 201310081923 CN201310081923 CN 201310081923 CN 201310081923 A CN201310081923 A CN 201310081923A CN 103209439 A CN103209439 A CN 103209439A
- Authority
- CN
- China
- Prior art keywords
- data traffic
- expends
- network
- preset time
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000012544 monitoring process Methods 0.000 title claims abstract description 29
- 230000006870 function Effects 0.000 claims description 19
- 238000005516 engineering process Methods 0.000 claims description 11
- 238000010295 mobile communication Methods 0.000 claims description 8
- 230000004907 flux Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 21
- 238000010586 diagram Methods 0.000 description 10
- 239000000725 suspension Substances 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 238000003860 storage Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 239000012467 final product Substances 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 241000931705 Cicada Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
An embodiment of the invention provides a method, an apparatus and a device for monitoring the data traffic. The method comprises the steps of obtaining the data traffic consumed by all applications of a terminal within a preset time period; and when the data traffic consumed by any one of the preset applications of the terminal within the preset time period is larger than a preset threshold, prompting ending or ending a network access right of the application. By the aid of the method, the apparatus and the device, all applications in the terminal can be monitored, ending is prompted or the network access right of the application is ended when the data traffic consumed by any one of the preset applications of the terminal within the preset time period is larger than the preset threshold, and other applications are not affected.
Description
Technical field
The embodiment of the invention relates to the technical field that data are handled, and particularly relates to a kind of method of data traffic monitoring, a kind of device of data traffic monitoring, and, a kind of equipment.
Background technology
Along with the arrival in mobile multimedia epoch, use the user of mobile terminal Internet access more and more, yet, being accompanied by popularizing of intelligent terminal, the data traffic of terminal applies uses problem day by day to highlight.
Generally speaking, when there not being WIFI(Wireless Fidelity, Wireless Fidelity) portable terminal need expend data traffic and visits network the time, general user's data traffic is all restricted, perhaps pressing flow pays, limit was perhaps arranged in every month, surpass amount or use too much data traffic, may expensive money.Traffic monitoring is exactly in order to address the above problem, to protect user's data traffic within a certain period of time to be no more than limit.
In correlation technique, various data traffic monitoring functions on the market all are the mechanism that adopts monitoring total data flow, and with reference to monitoring data traffic schematic diagram shown in Figure 1, this machine-processed principle is as follows:
(1) user arranges own every month data traffic amount (for example 300MB);
(2) user arranges a data flow warning value (according to the percentage of flow amount recently, for example used 85% arrived warning value);
(3) the data traffic consumption of system monitoring terminal after the data traffic that consumes reaches warning value, is given user prompt or warning;
(4) after the data traffic of terminals consume reached the data traffic amount of setting, system cut off data traffic (suspension) automatically, stoped the further consumption data flow of terminal with this, used in order to avoid generate unexpected mass data traffic fee.
Yet there is following deficiency in the mechanism of this monitoring total data flow:
The mechanism of this monitoring total data flow can not stop the function/application that really expends data traffic targetedly, and a suspension is with regard to the whole suspensions of all applications/functions.Under the overwhelming majority situation, the consumer device data traffic is several applications or function often, the function of data traffic monitoring is only according to the total data flow on the market, when the total data flow reaches certain amount, with regard to suspension, they can not accomplish only to cut off automatically the applications/functions of real consumption data flow, and a software A is for example arranged in the mobile phone, because certain reason it does not stop running data traffic, 99% data traffic all is that its consumes.After ruing out of the data traffic amount, the automatic suspension of system, so every other software all can not accesses network.
Summary of the invention
The embodiment of the invention provides a kind of method of data traffic monitoring, can monitor each application in the terminal, default remind the network access authority that stops or stop this application when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value when arbitrary, other application are unaffected.
Accordingly, the embodiment of the invention also provides a kind of device of data traffic monitoring, and a kind of equipment is in order to realization and the application that guarantees said method.
In order to address the above problem, the embodiment of the invention discloses a kind of method of data traffic monitoring, described method comprises:
Each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
Preferably, described each step that is applied in the data traffic that expends in the Preset Time section of obtaining terminal comprises:
When terminal connects network, obtain the data message of each packet, described data message comprises the protocol number of described packet;
Obtain size and the port numbers of described packet according to the protocol number of described packet;
Determine the application that described packet is affiliated according to the port numbers of described packet;
Record each described application constantly that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
Add up the described data traffic that expends in the Preset Time section that is applied in.
Preferably, described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
Preferably, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, the step that prompting stopped or stopped the network rights of using of described application comprises:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, send prompting message when a certain, judged whether to stop the network rights of using of described application by the user;
Receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
Preferably, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, the step that prompting stopped or stopped the network rights of using of described application comprises:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, stop the network rights of using of described application when a certain;
Send reminder message.
Preferably, described method also comprises:
When stopping the described data traffic that in the Preset Time section, expends greater than the network rights of using of the application of predetermined threshold value, allow in the terminal other to use the normal network that uses.
The embodiment of the invention also discloses a kind of device of data traffic monitoring, described device comprises:
The data traffic acquisition module, each that is used for obtaining terminal is applied in the data traffic that expends in the Preset Time section;
The network rights of using stop module, are used for when described terminal arbitrary default is applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, and prompting stops or stop the network rights of using of described application.
Preferably, described data traffic acquisition module comprises:
Data message obtains submodule, is used for obtaining the data message of each packet when terminal connects network, and described data message comprises the protocol number of described packet;
Port numbers is obtained submodule, is used for obtaining according to the protocol number of described packet size and the port numbers of described packet;
Use and determine submodule, be used for determining the application that described packet is affiliated according to the port numbers of described packet;
The data traffic record sub module, be used for each described application constantly of record that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
The data flux statistics submodule is used for the described data traffic that expends in the Preset Time section that is applied in of statistics.
Preferably, described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
Preferably, described network rights of using termination module comprises:
First prompting message sends submodule, is used for when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, sending prompting message a certain, is judged whether to stop the network rights of using of described application by the user;
The first terminator module is used for receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
Preferably, described network rights of using termination module comprises:
The second terminator module is used for a certain stopping the network rights of using of described application when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value;
Second prompting message sends submodule, is used for sending reminder message.
Preferably, described device also comprises:
The normal module of using is used for when stopping the described data traffic that expends greater than the network rights of using of the application of predetermined threshold value in the Preset Time section, allows in the terminal other to use the normal network that uses.
The embodiment of the invention also discloses a kind of equipment, described equipment comprises:
One or more processors;
Memory; With
One or more modules, described one or more module stores are in described memory and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
Compare with background technology, the embodiment of the invention comprises following advantage:
At first, the embodiment of the invention can be monitored the situation that arbitrary default application in the terminal expends data traffic, when arbitrary default when being applied in the data traffic that expends in the Preset Time section greater than a certain predetermined threshold value, remind the network rights of using that stop or stop this application, to be lower than the network rights of using of application of a certain threshold value unaffected thereby guarantee other to expend data traffic, and the data traffic that also makes things convenient for the user to know which application expends is more so that more there is planning ground to use this application next month.
Second, the embodiment of the invention is monitored each packet, obtain the port numbers of packet and the size of packet by the protocol number that obtains packet, the application of further obtaining the packet correspondence by port numbers, and then realize each application is monitored by adding up each default situation that expends data traffic of using.The data traffic that above-mentioned each application of calculating that utilizes method that packet monitors each application in the terminal to prepare under the situation of lost data packets not expends, thus guarantee to stop accurately or point out to terminate in the data traffic that expends in the Preset Time section greater than the network rights of using of the application of a certain predetermined threshold value.
The 3rd, the embodiment of the invention is monitoring the default user that in time reminds when being applied in data traffic in the Preset Time section greater than predetermined threshold value, make the user can in time know the data traffic operating position of this application and in time respond, perhaps in time stop the network rights of using of this application and remind the user.Can avoid this to use further consumption data flow like this, use in order to avoid generate unexpected a large amount of traffic fee.
Description of drawings
Monitoring data traffic schematic diagram in method, device and the equipment background technology that a kind of data traffic that Fig. 1 shows the embodiment of the invention to be provided is monitored;
The flow chart of steps of the method embodiment 1 that a kind of data traffic that Fig. 2 shows the embodiment of the invention to be provided is monitored;
The data traffic monitoring schematic diagram of the method embodiment 1 that a kind of data traffic that Fig. 3 shows the embodiment of the invention to be provided is monitored;
The flow chart of steps of the method embodiment 2 that a kind of data traffic that Fig. 4 shows the embodiment of the invention to be provided is monitored;
The flow chart of steps of the method embodiment 3 that a kind of data traffic that Fig. 5 shows the embodiment of the invention to be provided is monitored;
The flow chart of steps of the method embodiment 4 that a kind of data traffic that Fig. 6 shows the embodiment of the invention to be provided is monitored;
The structured flowchart of the device embodiment that a kind of data traffic that Fig. 7 shows the embodiment of the invention to be provided is monitored.
Embodiment
For above-mentioned purpose, the feature and advantage that make the embodiment of the invention can become apparent more, below in conjunction with the drawings and specific embodiments the embodiment of the invention is described in further detail.
With reference to Fig. 2, the flow chart of steps of the method embodiment 1 that a kind of data traffic that showing the embodiment of the invention provides is monitored specifically can comprise:
Step 101: each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
Step 102: when described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
In embodiments of the present invention, described default application can be the whole application in the terminal, also can be the certain applications in the terminal.The embodiment of the invention can be monitored the data traffic of the consumption of arbitrary default applications/functions, if the data traffic that arbitrary default application expends in the Preset Time section greater than predetermined threshold value, then provides the network rights of using that warning prompt stopped or stopped described application.The application only cuts off the network rights of using of the application of consumed flow, and does not influence other function/application.
For example, with reference to figure 3 described data traffic monitoring schematic diagrames, record terminal applies A, B, C, D etc. respectively use the data traffic of (for example passing by 12 hours) to add up consumption in the past period, when a certain application (for example using C) reaches warning value (for example 50M), suspend its access to netwoks and inquire the user, only after having obtained user's affirmation, just can remove the suspension of using C and block, during this period of time, the data traffic visit of using A, B, D is unaffected.
Need to prove, data traffic in the embodiment of the invention is for using 2G(second generation mobile communication technical specification standard) or 3G(3G (Third Generation) Moblie technology) etc. the data traffic that expends of network, because WIFI is generally free nets, so does not consider in the embodiment of the invention.
The embodiment of the invention can be monitored the situation that arbitrary default application in the terminal expends data traffic, when arbitrary default when being applied in the data traffic that expends in the Preset Time section greater than a certain predetermined threshold value, remind the network rights of using that stop or stop this application, to be lower than the network rights of using of application of a certain threshold value unaffected thereby guarantee other to expend data traffic, and the data traffic that also makes things convenient for the user to know which application expends is more so that more there is planning ground to use this application next month.
With reference to Fig. 4, the flow chart of steps of the method embodiment 2 that a kind of data traffic that showing the embodiment of the invention provides is monitored specifically can comprise:
Step 201: each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When not having WIFI, the mobile device accesses network need expend data traffic, and general user's data traffic is all restricted, perhaps presses flow and pays, and limit was perhaps arranged in every month, surpasses amount or uses too much data traffic, may expensive money.Traffic monitoring is exactly in order to address the above problem, to protect user's data traffic within a certain period of time to be no more than limit.
In correlation technique, various data traffic monitoring softwares on the market all are the mechanism that adopts monitoring total data flow, and when the total data flow reached certain amount, with regard to suspension, they can not accomplish only to cut off automatically the applications/functions of real consumption data flow.When for example sending a certain mail with the E-mail address in the mobile phone, because some bug of software, after mail successfully sent, the E-mail address thought that mail does not send success by mistake, therefore constantly repeat the transmission of this envelope mail, and the user often can not notice.Therefore, a large amount of consumption that will cause data traffic unusually of this application of E-mail address may cause data traffic to be run out of in the short time, or cause loss such as subscriber arrearage.And in embodiments of the present invention, not being based on the total data flow carries out traffic monitoring, and monitors based on the data traffic that each applications/functions expends.
In a kind of preferred embodiment of the embodiment of the invention, described step 201 can comprise following substep:
Substep S11: when terminal connects network, obtain the data message of each packet, described data message comprises the protocol number of described packet;
In specific implementation, when using network, packet is the data unit in the communications, and packet comprises multiple transport protocols in transport layer, and the data of different types bag need use corresponding protocols to resolve, and agreement identifies by protocol number.What when application layer is truncated to a packet, just can determine to use agreement that packet is resolved by the protocol number that obtains this packet.
Substep S12: size and the port numbers of obtaining described packet according to the protocol number of described packet;
In specific implementation, use (program) and in operating system, be presented as process, process is by the PID(process identification (PID)) sign.When certain process and certain webserver connected, system can be port numbers of this course allocation, and can only be used by a process in this port numbers of synchronization.Obtain corresponding protocols according to protocol number packet is resolved, can obtain size and the port numbers of packet.
Substep S13: determine the application that described packet is affiliated according to the port numbers of described packet;
Particularly, because port numbers is corresponding with process, just can obtain the process identification (PID) of this packet correspondence according to port numbers, further can determine the process of this packet correspondence according to process identification (PID), and process is the embodiment that is applied in operating system, therefore, can determine application under the described packet according to port numbers.
Substep S14: record each described application constantly that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
Substep S15: add up the described data traffic that expends in the Preset Time section that is applied in.
Particularly, after the application under the port numbers of foundation packet is determined described packet, record each application of each packet correspondence constantly and the size of packet, thereby further add up each and be applied in the data traffic that expends in the Preset Time section, described data traffic is and the described summation that is applied in the size of each corresponding in Preset Time section packet.
Wherein, can be in the Preset Time section till the distance current time in the described Preset Time section, or with default be in the Preset Time section of zero-time constantly, for example described Preset Time section is for every one hour or do not arrive integral point constantly etc.Can be set by user or developer in the described Preset Time section, the embodiment of the invention is not restricted this.
Step 202: whether the arbitrary default data traffic that expends in the Preset Time section of being applied in of judging described terminal is greater than predetermined threshold value, if then execution in step 203; If not, then return step 201;
Particularly, described predetermined threshold value can be set by user or developer, can be a fixing value, 50M for example, also can be a percentage, for example for the user all can use this month data traffic 10% when user this month, spendable data traffic total amount was as 100M, described predetermined threshold value is 10M.
Step 203: prompting stops or stops the network rights of using of described application.
In embodiments of the present invention, when stopping the described data traffic that expends greater than the network rights of using of the application of predetermined threshold value in the Preset Time section, other application in the terminal are unaffected, can normally use network.
Need to prove, use the network legal power that is terminated use, be the rights of using of 2G or 3G network, this application still can be used the network under the WIFI environment.
The embodiment of the invention is monitored each packet, obtain the port numbers of packet and the size of packet by the protocol number that obtains packet, the application of further obtaining the packet correspondence by port numbers, and then realize each application is monitored by adding up each default situation that expends data traffic of using.The data traffic that above-mentioned each application of calculating that utilizes method that packet monitors each application in the terminal to prepare under the situation of lost data packets not expends, thus guarantee to stop accurately or point out to terminate in the data traffic that expends in the Preset Time section greater than the network rights of using of the application of a certain predetermined threshold value.
With reference to Fig. 5, the flow chart of steps of the method embodiment 3 that a kind of data traffic that showing the embodiment of the invention provides is monitored in the present embodiment, is that example is specifically described with the Android system, can comprise:
Step 301: each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
Step 302: whether the arbitrary default data traffic that expends in the Preset Time section of being applied in of judging described terminal is greater than predetermined threshold value, if then execution in step 303; If not, then return step 301;
Step 303: prompting stops the network rights of using of described application.
In embodiments of the present invention, use the network legal power that is terminated use, be the rights of using of 2G or 3G network, this application still can be used the network under the WIFI environment.
In a kind of preferred embodiment of the embodiment of the invention, described step 303 can comprise following substep:
Substep S31: send prompting message, judged whether to stop the network rights of using of described application by the user;
Substep S32: receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
In embodiments of the present invention, terminal can be monitored each applications/functions, when certain has been applied in Preset Time section internal consumption after the data traffic of predetermined threshold value, message gives a warning, whether the inquiry user continues to use this application, stops or continue to allow the network rights of using of described application then according to user's decision instruction.Certainly, the user also can select to stop the network rights of using of whole system.
The embodiment of the invention can in time be reminded the user when monitoring the data traffic that is applied in the Preset Time section greater than predetermined threshold value, make the user can in time know the data traffic operating position of this application and in time respond, avoid this to use further consumption data flow, use in order to avoid generate unexpected a large amount of traffic fee.
With reference to Fig. 6, the flow chart of steps of the method embodiment 4 that a kind of data traffic that showing the embodiment of the invention provides is monitored in the present embodiment, is that example is specifically described with the Android system, can comprise:
Step 401: each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
Step 402: whether the arbitrary default data traffic that expends in the Preset Time section of being applied in of judging described terminal is greater than predetermined threshold value, if then execution in step 403; If not, then return step 401;
Step 403: the network rights of using that stop described application.
In embodiments of the present invention, use the network legal power that is terminated use, be the rights of using of 2G or 3G network, this application still can be used the network under the WIFI environment.
In the another kind of preferred embodiment of the embodiment of the invention, described step 403 can comprise following substep:
Substep S51: the network rights of using that stop described application;
Substep S52: send reminder message.
In specific implementation, terminal can be monitored each applications/functions, when certain has been applied in Preset Time section internal consumption after the data traffic of predetermined threshold value, (this application will be in the suspension state just initiatively to suspend the network rights of using of this application, can't continue the consumption data flow, but other application is unaffected), and provide reminder message, whether the inquiry user continues to use this application.Another effect of sending reminder message is that the data traffic that makes things convenient for the user to know which application expends is more so that more there is planning ground to use this application next month, avoid this to use further consumption data flow, use in order to avoid generate unexpected mass data traffic fee.
For method embodiment, for simple description, so it all is expressed as a series of combination of actions, but those skilled in the art should know, the embodiment of the invention is not subjected to the restriction of described sequence of movement, because according to the embodiment of the invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in the specification all belongs to preferred embodiment, and related action and module might not be that the embodiment of the invention is necessary.
With reference to Fig. 7, the structured flowchart of the device embodiment that a kind of data traffic that showing the embodiment of the invention provides is monitored specifically can comprise:
Data traffic acquisition module 501, each that is used for obtaining terminal is applied in the data traffic that expends in the Preset Time section;
In a kind of preferred embodiment of the embodiment of the invention, described data traffic acquisition module 501 can comprise following submodule:
Data message obtains submodule, is used for obtaining the data message of each packet when terminal connects network, and described data message comprises the protocol number of described packet;
Port numbers is obtained submodule, is used for obtaining according to the protocol number of described packet size and the port numbers of described packet;
Use and determine submodule, be used for determining the application that described packet is affiliated according to the port numbers of described packet;
The data traffic record sub module, be used for each described application constantly of record that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
The data flux statistics submodule is used for the described data traffic that expends in the Preset Time section that is applied in of statistics.
The network rights of using stop module 502, are used for when described terminal arbitrary default is applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, and prompting stops or stop the network rights of using of described application.
In a kind of preferred embodiment of the embodiment of the invention, described network rights of using stop module 502 can comprise following submodule:
First prompting message sends submodule, is used for when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, sending prompting message a certain, is judged whether to stop the network rights of using of described application by the user;
The first terminator module is used for receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
In the another kind of preferred embodiment of the embodiment of the invention, described network rights of using stop module 502 can comprise following submodule:
The second terminator module is used for a certain stopping the network rights of using of described application when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value;
Second prompting message sends submodule, is used for sending reminder message.
Preferably, described device can also comprise:
The normal module of using is used for when stopping the described data traffic that expends greater than the network rights of using of the application of predetermined threshold value in the Preset Time section, allows in the terminal other to use the normal network that uses.
Need to prove that described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
For the described device embodiment of Fig. 7, because it is similar substantially to method embodiment, so description is fairly simple, relevant part gets final product referring to the part explanation of method embodiment.
The embodiment of the invention also provides a kind of equipment, and described equipment comprises:
One or more processors;
Memory; With
One or more modules (programs), described one or more module stores are in described memory and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
Preferably, described obtain terminal each be applied in the data traffic that expends in the Preset Time section, in the following way:
When terminal connects network, obtain the data message of each packet, described data message comprises the protocol number of described packet;
Obtain size and the port numbers of described packet according to the protocol number of described packet;
Determine the application that described packet is affiliated according to the port numbers of described packet;
Record each described application constantly that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
Add up the described data traffic that expends in the Preset Time section that is applied in.
Preferably, described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
Preferably, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stops or stops the network rights of using of described application, in the following way:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, send prompting message when a certain, judged whether to stop the network rights of using of described application by the user;
Receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
Preferably, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stops or stops the network rights of using of described application, in the following way:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, stop the network rights of using of described application when a certain;
Send reminder message.
Preferably, described one or more module can also comprise following function:
When stopping the described data traffic that in the Preset Time section, expends greater than the network rights of using of the application of predetermined threshold value, allow in the terminal other to use the normal network that uses.
Present embodiment also provides a kind of non-volatile readable storage medium, store one or more modules (programs) in this storage medium, when these one or more modules are used in the equipment with touch screen, can be so that this equipment be carried out the instruction (instructions) of following steps:
Each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
Preferably, described obtain terminal each be applied in the data traffic that expends in the Preset Time section, in the following way:
When terminal connects network, obtain the data message of each packet, described data message comprises the protocol number of described packet;
Obtain size and the port numbers of described packet according to the protocol number of described packet;
Determine the application that described packet is affiliated according to the port numbers of described packet;
Record each described application constantly that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
Add up the described data traffic that expends in the Preset Time section that is applied in.
Preferably, described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
Preferably, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stops or stops the network rights of using of described application, in the following way:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, send prompting message when a certain, judged whether to stop the network rights of using of described application by the user;
Receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
Preferably, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stops or stops the network rights of using of described application, in the following way:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, stop the network rights of using of described application when a certain;
Send reminder message.
Preferably, described one or more module can also make this equipment carry out the instruction of following steps:
When stopping the described data traffic that in the Preset Time section, expends greater than the network rights of using of the application of predetermined threshold value, allow in the terminal other to use the normal network that uses.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.
Those skilled in the art should understand that the embodiment of the embodiment of the invention can be provided as method, system or computer program.Therefore, the embodiment of the invention can adopt complete hardware embodiment, complete software embodiment or in conjunction with the form of the embodiment of software and hardware aspect.And the embodiment of the invention can adopt the form of the computer program of implementing in one or more computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) that wherein include computer usable program code.
The embodiment of the invention is that reference is described according to flow chart and/or the block diagram of method, terminal equipment (system) and the computer program of the embodiment of the invention.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or the block diagram and/or square frame and flow chart and/or the block diagram and/or the combination of square frame.Can provide these computer program instructions to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminal equipment to produce a machine, make the instruction of carrying out by the processor of computer or other programmable data processing terminal equipment produce to be used for the device of the function that is implemented in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing terminal equipment with ad hoc fashion work, make the instruction that is stored in this computer-readable memory produce the manufacture that comprises command device, this command device is implemented in the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame.
These computer program instructions also can be loaded on computer or other programmable data processing terminal equipment, make and carry out the sequence of operations step producing computer implemented processing at computer or other programmable terminal equipment, thereby be provided for being implemented in the step of the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame in the instruction that computer or other programmable terminal equipment are carried out.
Although described the preferred embodiment of the embodiment of the invention, in a single day those skilled in the art get the basic creative concept of cicada, then can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into embodiment of the invention scope.
At last, also need to prove, in this article, relational terms such as first and second grades only is used for an entity or operation are made a distinction with another entity or operation, and not necessarily requires or hint and have the relation of any this reality or in proper order between these entities or the operation.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby make and comprise that process, method, article or the terminal equipment of a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or also be included as the intrinsic key element of this process, method, article or terminal equipment.Do not having under the situation of more restrictions, the key element that is limited by statement " comprising ... ", and be not precluded within process, method, article or the terminal equipment that comprises described key element and also have other identical element.
More than method, device and the equipment of a kind of data traffic monitoring that the embodiment of the invention is provided, be described in detail, used specific case herein principle and the execution mode of the embodiment of the invention are set forth, the explanation of above embodiment just is used for helping to understand method and the core concept thereof of the embodiment of the invention; Simultaneously, for one of ordinary skill in the art, according to the thought of the embodiment of the invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the embodiment of the invention.
Claims (13)
1. the method for data traffic monitoring is characterized in that described method comprises:
Each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
2. method according to claim 1 is characterized in that, described each step that is applied in the data traffic that expends in the Preset Time section of obtaining terminal comprises:
When terminal connects network, obtain the data message of each packet, described data message comprises the protocol number of described packet;
Obtain size and the port numbers of described packet according to the protocol number of described packet;
Determine the application that described packet is affiliated according to the port numbers of described packet;
Record each described application constantly that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
Add up the described data traffic that expends in the Preset Time section that is applied in.
3. method according to claim 1 is characterized in that, described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
4. method according to claim 1 is characterized in that, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, the step that prompting stopped or stopped the network rights of using of described application comprises:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, send prompting message when a certain, judged whether to stop the network rights of using of described application by the user;
Receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
5. method according to claim 1 is characterized in that, described when a certain when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, the step that prompting stopped or stopped the network rights of using of described application comprises:
When being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, stop the network rights of using of described application when a certain;
Send reminder message.
6. according to claim 4 or 5 described methods, it is characterized in that described method also comprises:
When stopping the described data traffic that in the Preset Time section, expends greater than the network rights of using of the application of predetermined threshold value, allow in the terminal other to use the normal network that uses.
7. the device of data traffic monitoring is characterized in that described device comprises:
The data traffic acquisition module, each that is used for obtaining terminal is applied in the data traffic that expends in the Preset Time section;
The network rights of using stop module, are used for when described terminal arbitrary default is applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, and prompting stops or stop the network rights of using of described application.
8. device according to claim 7 is characterized in that, described data traffic acquisition module comprises:
Data message obtains submodule, is used for obtaining the data message of each packet when terminal connects network, and described data message comprises the protocol number of described packet;
Port numbers is obtained submodule, is used for obtaining according to the protocol number of described packet size and the port numbers of described packet;
Use and determine submodule, be used for determining the application that described packet is affiliated according to the port numbers of described packet;
The data traffic record sub module, be used for each described application constantly of record that expend with described packet corresponding data flow amount, wherein, described application expend with described packet corresponding data flow amount be the size of described packet;
The data flux statistics submodule is used for the described data traffic that expends in the Preset Time section that is applied in of statistics.
9. device according to claim 7 is characterized in that, described data traffic is the data traffic of using the generation of second generation mobile communication technical specification standard 2G network or the data traffic of using 3G (Third Generation) Moblie technology 3G network to produce.
10. device according to claim 7 is characterized in that, described network rights of using stop module and comprise:
First prompting message sends submodule, is used for when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, sending prompting message a certain, is judged whether to stop the network rights of using of described application by the user;
The first terminator module is used for receiving user's decision instruction, is when stopping the network rights of using of described application in described decision instruction, stops the network rights of using of described application.
11. device according to claim 7 is characterized in that, described network rights of using stop module and comprise:
The second terminator module is used for a certain stopping the network rights of using of described application when being applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value;
Second prompting message sends submodule, is used for sending reminder message.
12. according to claim 10 or 11 described devices, it is characterized in that described device also comprises:
The normal module of using is used for when stopping the described data traffic that expends greater than the network rights of using of the application of predetermined threshold value in the Preset Time section, allows in the terminal other to use the normal network that uses.
13. an equipment is characterized in that, described equipment comprises:
One or more processors;
Memory; With
One or more modules, described one or more module stores are in described memory and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Each that obtains terminal is applied in the data traffic that expends in the Preset Time section;
When described terminal arbitrary default was applied in the data traffic that expends in the Preset Time section greater than predetermined threshold value, prompting stopped or stops the network rights of using of described application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310081923.XA CN103209439B (en) | 2013-03-14 | 2013-03-14 | The method of a kind of data traffic monitoring, device and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310081923.XA CN103209439B (en) | 2013-03-14 | 2013-03-14 | The method of a kind of data traffic monitoring, device and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103209439A true CN103209439A (en) | 2013-07-17 |
CN103209439B CN103209439B (en) | 2016-07-06 |
Family
ID=48756493
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310081923.XA Active CN103209439B (en) | 2013-03-14 | 2013-03-14 | The method of a kind of data traffic monitoring, device and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103209439B (en) |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103631586A (en) * | 2013-11-15 | 2014-03-12 | 北京奇虎科技有限公司 | Method and system for carrying out contextualization interactive processing |
CN103686663A (en) * | 2013-12-20 | 2014-03-26 | 海信集团有限公司 | Network traffic monitoring method and device |
CN103763322A (en) * | 2014-01-23 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for controlling process of software and terminals |
CN103945410A (en) * | 2014-03-28 | 2014-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Terminal device and flow control method thereof |
CN104022889A (en) * | 2014-06-23 | 2014-09-03 | 中国联合网络通信集团有限公司 | Method and device for charging net flow |
CN104038929A (en) * | 2014-05-09 | 2014-09-10 | 宇龙计算机通信科技(深圳)有限公司 | Network access anomaly identification method and network access anomaly identification device |
CN104159278A (en) * | 2013-12-17 | 2014-11-19 | 吴飞 | Method and apparatus for controlling wireless access point |
WO2014187258A1 (en) * | 2013-10-23 | 2014-11-27 | 中兴通讯股份有限公司 | Traffic control method and apparatus |
CN104301235A (en) * | 2013-07-18 | 2015-01-21 | 腾讯科技(深圳)有限公司 | Network flow control method and device |
CN104301187A (en) * | 2014-11-10 | 2015-01-21 | 广东欧珀移动通信有限公司 | A mobile terminal network traffic monitoring method |
CN104349340A (en) * | 2013-07-29 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Traffic flow monitoring method and device for mobile terminal |
CN104486505A (en) * | 2014-12-16 | 2015-04-01 | 深圳市中兴移动通信有限公司 | Mobile terminal, and method and device thereof for preventing data stream waste |
CN104486138A (en) * | 2014-11-25 | 2015-04-01 | 北京奇虎科技有限公司 | Flow monitoring method and device and monitoring server |
CN104539809A (en) * | 2015-01-16 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Mobile terminal and flow rate monitoring method and device thereof |
CN104967758A (en) * | 2015-05-27 | 2015-10-07 | 广东欧珀移动通信有限公司 | A method and user terminal for controlling data transmission |
CN105005291A (en) * | 2015-08-17 | 2015-10-28 | 黄可斌 | Smart home control method, smart home control device and smart home control system |
CN105101302A (en) * | 2014-04-30 | 2015-11-25 | 宇龙计算机通信科技(深圳)有限公司 | Flow management method based on use habits of users and system thereof |
CN105337783A (en) * | 2014-07-14 | 2016-02-17 | 北京奇虎科技有限公司 | Method of monitoring abnormal flow consumption of communication equipment and apparatus |
WO2016026277A1 (en) * | 2014-08-22 | 2016-02-25 | 小米科技有限责任公司 | Flow control method and device for portable router |
WO2016065619A1 (en) * | 2014-10-31 | 2016-05-06 | 华为技术有限公司 | Data traffic management method and device |
CN105721713A (en) * | 2016-03-31 | 2016-06-29 | 北京金山安全软件有限公司 | Data network state control method and device for terminal |
CN105721348A (en) * | 2016-02-23 | 2016-06-29 | 周奇 | Traffic control method and device of intelligent terminal |
CN105915546A (en) * | 2016-06-16 | 2016-08-31 | 北京奇虎科技有限公司 | Traffic monitoring method and device of android application |
CN106375978A (en) * | 2015-07-20 | 2017-02-01 | 中兴通讯股份有限公司 | Flow monitoring method and terminal |
CN106452946A (en) * | 2016-09-21 | 2017-02-22 | 深圳市金立通信设备有限公司 | Flow control method and terminal |
CN106453151A (en) * | 2016-10-17 | 2017-02-22 | 上海传英信息技术有限公司 | Single application flow limiting method and apparatus thereof |
CN106550405A (en) * | 2016-11-04 | 2017-03-29 | 惠州Tcl移动通信有限公司 | A kind of network data acceptance control method and system based on mobile terminal |
CN106792892A (en) * | 2016-11-23 | 2017-05-31 | 北京小米移动软件有限公司 | The access control method and device of application program |
CN106973376A (en) * | 2017-02-24 | 2017-07-21 | 上海与德信息技术有限公司 | Application program is selected to access the method and device of network |
CN107087136A (en) * | 2017-04-19 | 2017-08-22 | 宇龙计算机通信科技(深圳)有限公司 | Internet video call method, terminal and computer-readable recording medium |
CN107135127A (en) * | 2017-06-26 | 2017-09-05 | 福建中金在线信息科技有限公司 | A kind of network flow abnormal detecting method and device |
CN107172293A (en) * | 2017-06-09 | 2017-09-15 | 深圳市伊特利网络科技有限公司 | The control based reminding method and system of terminal flow |
CN107204858A (en) * | 2016-03-16 | 2017-09-26 | 中国移动通信集团河北有限公司 | A kind of mobile terminal flow based reminding method and device |
CN107800651A (en) * | 2017-10-31 | 2018-03-13 | 广东欧珀移动通信有限公司 | Closing application program method, apparatus, storage medium and electronic equipment |
US9992115B2 (en) | 2014-08-22 | 2018-06-05 | Xiaomi Inc. | Method and device for controlling traffic of mobile router |
CN108307337A (en) * | 2017-08-22 | 2018-07-20 | 深圳市爱培科技术股份有限公司 | Flux monitoring method, system and the storage device of vehicle mounted guidance terminal |
CN108494753A (en) * | 2018-03-12 | 2018-09-04 | 维沃移动通信有限公司 | A kind of data sharing method and mobile terminal |
CN108551429A (en) * | 2018-04-23 | 2018-09-18 | Oppo广东移动通信有限公司 | Flow control method of application program, electronic device and computer readable storage medium |
CN108632863A (en) * | 2018-04-28 | 2018-10-09 | 中国联合网络通信集团有限公司 | Flow method for early warning, device and server |
CN109450804A (en) * | 2018-10-30 | 2019-03-08 | 武汉思普崚技术有限公司 | A kind of network resource control method |
CN109660430A (en) * | 2018-12-27 | 2019-04-19 | 努比亚技术有限公司 | A kind of flux monitoring method, terminal and computer readable storage medium |
CN110891286A (en) * | 2019-11-08 | 2020-03-17 | 西安广和通无线软件有限公司 | Data flow control method and device, computer equipment and storage medium |
CN111698730A (en) * | 2019-03-15 | 2020-09-22 | 阿里巴巴集团控股有限公司 | Flow control method, operating system, end equipment and distributed system |
CN112953755A (en) * | 2021-01-18 | 2021-06-11 | 上海商米科技集团股份有限公司 | Equipment flow early warning method, system and storage medium |
CN117729055A (en) * | 2024-02-08 | 2024-03-19 | 中汽智联技术有限公司 | Network flow statistics method and system based on Linux process |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340449B (en) * | 2008-08-15 | 2011-09-14 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for obtaining network access information |
CN101820641A (en) * | 2010-01-11 | 2010-09-01 | 华为终端有限公司 | Method and device for controlling data traffic |
CN101854649A (en) * | 2010-05-20 | 2010-10-06 | 中兴通讯股份有限公司 | Mobile terminal and method and device for monitoring Internet surfing data traffic of mobile terminal |
-
2013
- 2013-03-14 CN CN201310081923.XA patent/CN103209439B/en active Active
Cited By (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104301235A (en) * | 2013-07-18 | 2015-01-21 | 腾讯科技(深圳)有限公司 | Network flow control method and device |
CN104301235B (en) * | 2013-07-18 | 2018-10-02 | 腾讯科技(深圳)有限公司 | The control method and device of network flow |
CN104349340B (en) * | 2013-07-29 | 2018-08-28 | 腾讯科技(深圳)有限公司 | The surfing flow monitoring method and device of mobile terminal |
CN104349340A (en) * | 2013-07-29 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Traffic flow monitoring method and device for mobile terminal |
WO2015154495A1 (en) * | 2013-10-23 | 2015-10-15 | 中兴通讯股份有限公司 | Traffic control method and device |
WO2014187258A1 (en) * | 2013-10-23 | 2014-11-27 | 中兴通讯股份有限公司 | Traffic control method and apparatus |
CN104580684A (en) * | 2013-10-23 | 2015-04-29 | 中兴通讯股份有限公司 | Flow control method and device |
CN103631586A (en) * | 2013-11-15 | 2014-03-12 | 北京奇虎科技有限公司 | Method and system for carrying out contextualization interactive processing |
CN104159278A (en) * | 2013-12-17 | 2014-11-19 | 吴飞 | Method and apparatus for controlling wireless access point |
CN103686663A (en) * | 2013-12-20 | 2014-03-26 | 海信集团有限公司 | Network traffic monitoring method and device |
CN103686663B (en) * | 2013-12-20 | 2017-01-11 | 海信集团有限公司 | Network flow monitoring method and device |
CN103763322A (en) * | 2014-01-23 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for controlling process of software and terminals |
CN103945410A (en) * | 2014-03-28 | 2014-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Terminal device and flow control method thereof |
CN105101302A (en) * | 2014-04-30 | 2015-11-25 | 宇龙计算机通信科技(深圳)有限公司 | Flow management method based on use habits of users and system thereof |
CN105101302B (en) * | 2014-04-30 | 2019-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Flow managing method and system based on user's use habit |
CN104038929A (en) * | 2014-05-09 | 2014-09-10 | 宇龙计算机通信科技(深圳)有限公司 | Network access anomaly identification method and network access anomaly identification device |
CN104022889A (en) * | 2014-06-23 | 2014-09-03 | 中国联合网络通信集团有限公司 | Method and device for charging net flow |
CN105337783B (en) * | 2014-07-14 | 2018-09-04 | 北京奇虎科技有限公司 | Monitor the method and device of communication equipment non-normal consumption flow |
CN105337783A (en) * | 2014-07-14 | 2016-02-17 | 北京奇虎科技有限公司 | Method of monitoring abnormal flow consumption of communication equipment and apparatus |
US9992115B2 (en) | 2014-08-22 | 2018-06-05 | Xiaomi Inc. | Method and device for controlling traffic of mobile router |
RU2645751C2 (en) * | 2014-08-22 | 2018-02-28 | Сяоми Инк. | Flow control method and device for portable router |
WO2016026277A1 (en) * | 2014-08-22 | 2016-02-25 | 小米科技有限责任公司 | Flow control method and device for portable router |
US20170317942A1 (en) * | 2014-10-31 | 2017-11-02 | Huawei Technologies Co., Ltd. | Data traffic management method and apparatus |
US11349767B2 (en) | 2014-10-31 | 2022-05-31 | Honor Device Co., Ltd. | Device and method for disabling a WLAN hotspot based on data traffic value |
US10791060B2 (en) * | 2014-10-31 | 2020-09-29 | Huawei Technologies Co., Ltd. | Data traffic management method and apparatus |
CN106031227A (en) * | 2014-10-31 | 2016-10-12 | 华为技术有限公司 | Data traffic management method and device |
WO2016065619A1 (en) * | 2014-10-31 | 2016-05-06 | 华为技术有限公司 | Data traffic management method and device |
EP3749006A1 (en) * | 2014-10-31 | 2020-12-09 | Huawei Technologies Co., Ltd. | Data traffic management method and apparatus |
US11799786B2 (en) | 2014-10-31 | 2023-10-24 | Honor Device Co., Ltd. | Device and method for disabling a WLAN hotspot based on data traffic value |
CN106031227B (en) * | 2014-10-31 | 2021-02-12 | 华为技术有限公司 | Data traffic management method and device |
EP4161126A1 (en) * | 2014-10-31 | 2023-04-05 | Honor Device Co., Ltd. | Data traffic management method and apparatus |
CN112911637A (en) * | 2014-10-31 | 2021-06-04 | 荣耀终端有限公司 | Data traffic management method and device |
EP3206428A4 (en) * | 2014-10-31 | 2017-10-25 | Huawei Technologies Co., Ltd. | Data traffic management method and device |
CN104301187A (en) * | 2014-11-10 | 2015-01-21 | 广东欧珀移动通信有限公司 | A mobile terminal network traffic monitoring method |
CN104301187B (en) * | 2014-11-10 | 2017-11-03 | 广东欧珀移动通信有限公司 | A kind of network flow monitoring method of mobile terminal |
CN104486138A (en) * | 2014-11-25 | 2015-04-01 | 北京奇虎科技有限公司 | Flow monitoring method and device and monitoring server |
CN104486505A (en) * | 2014-12-16 | 2015-04-01 | 深圳市中兴移动通信有限公司 | Mobile terminal, and method and device thereof for preventing data stream waste |
CN104539809A (en) * | 2015-01-16 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Mobile terminal and flow rate monitoring method and device thereof |
CN104539809B (en) * | 2015-01-16 | 2019-10-08 | 努比亚技术有限公司 | The monitoring method and device of a kind of mobile terminal and its flow |
CN104967758A (en) * | 2015-05-27 | 2015-10-07 | 广东欧珀移动通信有限公司 | A method and user terminal for controlling data transmission |
CN106375978A (en) * | 2015-07-20 | 2017-02-01 | 中兴通讯股份有限公司 | Flow monitoring method and terminal |
CN105005291A (en) * | 2015-08-17 | 2015-10-28 | 黄可斌 | Smart home control method, smart home control device and smart home control system |
CN105721348A (en) * | 2016-02-23 | 2016-06-29 | 周奇 | Traffic control method and device of intelligent terminal |
CN107204858A (en) * | 2016-03-16 | 2017-09-26 | 中国移动通信集团河北有限公司 | A kind of mobile terminal flow based reminding method and device |
CN105721713A (en) * | 2016-03-31 | 2016-06-29 | 北京金山安全软件有限公司 | Data network state control method and device for terminal |
CN105915546A (en) * | 2016-06-16 | 2016-08-31 | 北京奇虎科技有限公司 | Traffic monitoring method and device of android application |
CN106452946A (en) * | 2016-09-21 | 2017-02-22 | 深圳市金立通信设备有限公司 | Flow control method and terminal |
CN106453151A (en) * | 2016-10-17 | 2017-02-22 | 上海传英信息技术有限公司 | Single application flow limiting method and apparatus thereof |
CN106550405A (en) * | 2016-11-04 | 2017-03-29 | 惠州Tcl移动通信有限公司 | A kind of network data acceptance control method and system based on mobile terminal |
CN106792892A (en) * | 2016-11-23 | 2017-05-31 | 北京小米移动软件有限公司 | The access control method and device of application program |
CN106792892B (en) * | 2016-11-23 | 2020-03-17 | 北京小米移动软件有限公司 | Access control method and device for application program |
CN106973376A (en) * | 2017-02-24 | 2017-07-21 | 上海与德信息技术有限公司 | Application program is selected to access the method and device of network |
CN107087136A (en) * | 2017-04-19 | 2017-08-22 | 宇龙计算机通信科技(深圳)有限公司 | Internet video call method, terminal and computer-readable recording medium |
CN107172293A (en) * | 2017-06-09 | 2017-09-15 | 深圳市伊特利网络科技有限公司 | The control based reminding method and system of terminal flow |
CN107135127A (en) * | 2017-06-26 | 2017-09-05 | 福建中金在线信息科技有限公司 | A kind of network flow abnormal detecting method and device |
CN108307337A (en) * | 2017-08-22 | 2018-07-20 | 深圳市爱培科技术股份有限公司 | Flux monitoring method, system and the storage device of vehicle mounted guidance terminal |
CN107800651A (en) * | 2017-10-31 | 2018-03-13 | 广东欧珀移动通信有限公司 | Closing application program method, apparatus, storage medium and electronic equipment |
CN108494753B (en) * | 2018-03-12 | 2021-08-20 | 维沃移动通信有限公司 | A data sharing method and mobile terminal |
CN108494753A (en) * | 2018-03-12 | 2018-09-04 | 维沃移动通信有限公司 | A kind of data sharing method and mobile terminal |
CN108551429A (en) * | 2018-04-23 | 2018-09-18 | Oppo广东移动通信有限公司 | Flow control method of application program, electronic device and computer readable storage medium |
CN108632863A (en) * | 2018-04-28 | 2018-10-09 | 中国联合网络通信集团有限公司 | Flow method for early warning, device and server |
CN108632863B (en) * | 2018-04-28 | 2022-01-25 | 中国联合网络通信集团有限公司 | Traffic early warning method and device and server |
CN109450804A (en) * | 2018-10-30 | 2019-03-08 | 武汉思普崚技术有限公司 | A kind of network resource control method |
CN109660430A (en) * | 2018-12-27 | 2019-04-19 | 努比亚技术有限公司 | A kind of flux monitoring method, terminal and computer readable storage medium |
CN111698730A (en) * | 2019-03-15 | 2020-09-22 | 阿里巴巴集团控股有限公司 | Flow control method, operating system, end equipment and distributed system |
CN111698730B (en) * | 2019-03-15 | 2023-11-21 | 斑马智行网络(香港)有限公司 | Flow control methods, operating systems, terminal devices and distributed systems |
CN110891286A (en) * | 2019-11-08 | 2020-03-17 | 西安广和通无线软件有限公司 | Data flow control method and device, computer equipment and storage medium |
CN110891286B (en) * | 2019-11-08 | 2023-11-24 | 西安广和通无线软件有限公司 | Data flow control method, device, computer equipment and storage medium |
CN112953755A (en) * | 2021-01-18 | 2021-06-11 | 上海商米科技集团股份有限公司 | Equipment flow early warning method, system and storage medium |
CN117729055A (en) * | 2024-02-08 | 2024-03-19 | 中汽智联技术有限公司 | Network flow statistics method and system based on Linux process |
Also Published As
Publication number | Publication date |
---|---|
CN103209439B (en) | 2016-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103209439A (en) | Method, apparatus and device for monitoring data traffic | |
CN110493080B (en) | Block link point monitoring method and device, electronic equipment and storage medium | |
CN104009892A (en) | Method, device and client for monitoring mobile terminal traffic | |
EP2905931B1 (en) | Method and apparatus for determining data flow rate of service access port | |
CN110830548B (en) | Internet of things card operation platform, data updating method and device and storage medium | |
EP2807553A1 (en) | Managing data transfers over network connections based on priority and a data usage plan | |
KR101332814B1 (en) | Apparatus and Method for Controlling Polling | |
CN102916854A (en) | Traffic statistical method and device and proxy server | |
CA2968506C (en) | Application platform operable on network node | |
CN103546266A (en) | Smart Scheduled Synchronization Method for Synchronizing Applications | |
CN111953648A (en) | Data processing method and device based on block chain prediction machine and electronic equipment | |
CN102711139A (en) | Data flow counting method and terminal | |
CN105101412A (en) | Notification message sending method and device | |
EP3313041A1 (en) | Application download method and device | |
KR20160145116A (en) | Battery efficient synchronization of communications using a token bucket | |
CN107734033A (en) | A kind of method, terminal, system and computer-readable recording medium exempted from flow and download application program | |
CN104734983A (en) | Scheduling system, method and device for service data request | |
TWI539273B (en) | Concurrent network application scheduling for reduced power consumption | |
CN104346563A (en) | Information processing method and electronic equipment | |
CN103198404A (en) | Phone wallet loss reporting method based on short messages and system thereof | |
CN105848130A (en) | Data traffic management method and terminal | |
CN106550405B (en) | Network data receiving control method and system based on mobile terminal | |
CN110298001B (en) | Method and device for acquiring log data packet and computer readable storage medium | |
CN105259744A (en) | Alarm clock controlling method and device, alarm clock and electronic equipment | |
CN113923249B (en) | High-performance network long connection establishment method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent for invention or patent application | ||
CB02 | Change of applicant information |
Address after: 100085 Beijing city Haidian District Qinghe Street No. 68 Huarun colorful city shopping center two floor 13 Applicant after: Xiaomi Technology Co., Ltd. Address before: 100102 Beijing Wangjing West Road, a volume of stone world building, A, block, floor 12 Applicant before: Beijing Xiaomi Technology Co., Ltd. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |