Data traffic control method and system for mobile terminal

A mobile terminal and data traffic technology, applied in the communication field, can solve the problems of traffic consumption, high service billing beyond the monthly traffic, high Internet access fees for users, etc.

Inactive Publication Date: 2015-01-07
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF13 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the different billing methods of wireless Internet services, once the user exceeds the monthly subscription limit during use, there will be a large billing difference between the excess data traffic and the data traffic within the monthly subscription range. Higher fees, users usually bear high Internet access fees
[0003] Although many mobile phones or other mobile terminals can count the data traffic generated by surfing the Internet, and users can actively view the traffic generated by surfing the Internet, when the mobile terminal is used by children or other people at home, they only need to simply open the If you are connected to the network, you can use data traffic, or even if you use a mobile terminal, some push messages, automatic updates of applications, etc. are also consuming traffic, or if the user does not check the data traffic generated by the Internet in time, it will often exceed Monthly limited traffic, these will cause certain economic losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data traffic control method and system for mobile terminal
  • Data traffic control method and system for mobile terminal
  • Data traffic control method and system for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 As shown, it is a schematic flowchart of Embodiment 1 of the data flow control method for a mobile terminal according to the present invention. Such as figure 1 As shown, the data flow control method of the mobile terminal in this embodiment includes the following steps:

[0030] Step S101: Receive the flow protection password, control cycle and flow control threshold input by the user through the preset flow control setting interface, control the mobile terminal to enable the flow protection function, and enter step S102;

[0031] In this embodiment, when the user wants to protect the data flow, so as to prevent other people from using the data flow at will, or to avoid some unnecessary flow consumption caused by some applications on the mobile terminal, data flow control can be performed. ;

[0032] When the user wants to protect the data flow, he can operate the mobile terminal to make the mobile terminal display the preset flow control setting interf...

Embodiment 2

[0048] Such as figure 2 As shown, it is a schematic flowchart of the second embodiment of the data flow control method of the mobile terminal of the present invention. In this embodiment, the difference from the first embodiment mainly lies in that considering that the user may If the data flow is greater than the flow control threshold, it will be necessary to continue to use the data network, and the frequently input flow password will cause inconvenience to the user and reduce the user experience. Therefore, in this embodiment, the function of closing the flow protection function is added. step.

[0049] Such as figure 2 As shown, the data flow control method of the mobile terminal in this embodiment includes the following steps:

[0050] Step S201: Receive the flow protection password, control cycle and flow control threshold input by the user through the preset flow control setting interface, control the mobile terminal to enable the flow protection function, and ente...

Embodiment 3

[0059] Such as image 3 As shown, it is a schematic flowchart of the third embodiment of the data flow control method of the mobile terminal according to the present invention. In this embodiment, the main difference from the first embodiment is that the user may close For the traffic protection function of the mobile terminal, a step of detecting whether the traffic protection function is turned off is added.

[0060] Such as image 3 As shown, the data flow control method of the mobile terminal in this embodiment includes the following steps:

[0061] Step S301: Receive the flow protection password, control cycle and flow control threshold input by the user through the preset flow control setting interface, control the mobile terminal to enable the flow protection function, and enter step S302;

[0062] Step S302: When it is detected that the mobile terminal accesses the network to generate data traffic, obtain the total data traffic generated by the mobile terminal access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data traffic control method and system for a mobile terminal. The method includes the steps that a traffic protecting password, a control cycle and a traffic control threshold value input by a user through a preset traffic control setting interface are received, and the mobile terminal is controlled to start the traffic protecting function; when the fact that the mobile terminal gets access to a network and generates data traffic is detected, the total data traffic, generated by access to the network in the control cycle, of the mobile terminal is obtained; whether the total data traffic is larger than or equal to the traffic control threshold value is judged; if yes, the data network is turned off, and the user is reminded to input a traffic using password on a preset password inputting interface; when the traffic using password input by the user is matched with the traffic protecting password, the data network is turned on. By the adoption of the scheme, data flows can be controlled automatically, and unnecessary loss is avoided for the user.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a data flow control method and system for a mobile terminal. Background technique [0002] With the continuous development of wireless communication technology and the continuous maturity of mobile terminals such as mobile phones and tablet computers, users have higher and higher requirements for wireless communication services. In order to meet the needs of users for the network in the process of life and work, many operators promote the monthly subscription service of wireless Internet access. For example, users can enjoy the function of wireless Internet access with a monthly package of 30M, 50M, 100M and other data traffic. Wireless Internet access has the advantage of not being restricted by regions to a large extent, which brings great convenience to users. Users can enjoy low wireless Internet access fees within the scope of monthly subscription traffic, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725G06F21/31
Inventor 甘高亭
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products