CN111225112A - Flow use control method, device and storage medium - Google Patents

Flow use control method, device and storage medium Download PDF

Info

Publication number
CN111225112A
CN111225112A CN202010007042.3A CN202010007042A CN111225112A CN 111225112 A CN111225112 A CN 111225112A CN 202010007042 A CN202010007042 A CN 202010007042A CN 111225112 A CN111225112 A CN 111225112A
Authority
CN
China
Prior art keywords
space
traffic
application
flow
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010007042.3A
Other languages
Chinese (zh)
Other versions
CN111225112B (en
Inventor
罗占伟
米思远
范林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202010007042.3A priority Critical patent/CN111225112B/en
Publication of CN111225112A publication Critical patent/CN111225112A/en
Application granted granted Critical
Publication of CN111225112B publication Critical patent/CN111225112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure relates to a flow use control method, a flow use control device and a storage medium. The flow use control method comprises the following steps: acquiring flow use information of different user spaces in the mobile terminal; and according to the flow use information, carrying out flow use limitation on the first class of space in the user space. Therefore, flow using of a certain space can be limited by flow statistics of user-divided spaces, so that the phenomenon of no restriction of flow using in the first space is realized, and the phenomenon of drowning, excessive eye use and the like caused by long-time internet surfing of specific users in the first space such as children and the like caused by the phenomenon of no restriction is reduced.

Description

Flow use control method, device and storage medium
Technical Field
The present disclosure relates to the field of network technologies, and in particular, to a method and an apparatus for controlling traffic usage, and a storage medium.
Background
In order to meet the development requirements of intellectualization and multiple purposes of the mobile terminal, in the related art, the mobile terminal can realize a multi-user mechanism, and the same mobile terminal provides different services for different users. Under the use mechanism of multiple users, different users can log in different accounts to use functions authorized to be used under the account. For example, a mobile terminal such as a tablet computer may be provided for use by different members of a family. However, some users who need to limit the use of the common mobile terminal, for example, children, are prone to an overuse problem when using the parent's mobile terminal.
Disclosure of Invention
The disclosure provides a traffic usage control method, a traffic usage control device and a storage medium.
A first aspect of an embodiment of the present application provides a method for controlling traffic usage, including:
acquiring flow use information of different user spaces in the mobile terminal;
and according to the flow use information, carrying out flow use limitation on the first class of space in the user space.
Based on the scheme, the same application program is installed in different user spaces and corresponds to different application identification IDs;
the method further comprises the following steps: monitoring the flow of the mobile terminal to obtain a flow monitoring record;
the acquiring of the traffic usage information of different user spaces in the mobile terminal includes:
and acquiring the traffic use information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record.
Based on the scheme, different application identification sections are configured in different user spaces;
the obtaining the traffic usage information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record includes:
and determining the user space corresponding to the flow generated by the application program according to the application identifier section where the application identifier is located in the flow monitoring record, so as to obtain the flow use information of different user spaces.
Based on the scheme, the unused user spaces have different space identifications; the application identification sections corresponding to different user spaces contain the same number of application identifications;
the determining, according to the application identifier segment in which the application identifier is located in the traffic monitoring record, the user space corresponding to the traffic generated by the application program includes:
and rounding the quotient of the application identification and the identification number corresponding to the application identification segment to obtain the space identification of the user space where the application program generates the flow.
Based on the above scheme, the method further comprises:
and according to the user empty space installed by the application program, distributing the application identifier for the application program from an application identifier section corresponding to the user space installed by the application program.
Based on the above scheme, the monitoring the flow of the mobile terminal to obtain a flow monitoring record includes:
and monitoring the traffic condition of the mobile terminal through the NETD service in the mobile terminal to obtain the traffic monitoring record.
Based on the above scheme, the performing traffic usage restriction on the first class of space in the user space according to the traffic usage information includes:
and when the usage flow of the first type space exceeds the upper flow limit, forbidding the issuing of the network access request generated in the first type space.
Based on the above scheme, the user space further includes: a second type of space; the method further comprises the following steps:
receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space;
the traffic use limiting, according to the traffic use information, on the first class of space in the user space includes:
and carrying out flow use limitation on the first class space according to the configuration rule and the flow.
A second aspect of the embodiments of the present application provides a flow usage control device, including:
the acquisition module is used for acquiring flow use information of different user spaces in the mobile terminal;
and the limiting module is used for limiting the flow use of the first class of space in the user space according to the flow use information.
Based on the scheme, the same application program is installed in different user spaces and corresponds to different application identification IDs;
the device further comprises:
the monitoring module is used for monitoring the flow of the mobile terminal and obtaining a flow monitoring record;
the obtaining module is specifically configured to obtain the traffic usage information of different user spaces according to an application identifier used when the application program generates traffic in the traffic monitoring record.
Based on the scheme, different application identification sections are configured in different user spaces;
the obtaining module is specifically configured to determine, according to the application identifier segment in which the application identifier is located in the traffic monitoring record, the user space corresponding to traffic generated by the application program, so as to obtain the traffic usage information of different user spaces.
Based on the scheme, the unused user spaces have different space identifications; the application identification sections corresponding to different user spaces contain the same number of application identifications;
the obtaining module is specifically configured to round a quotient of the application identifier and the identifier number corresponding to the application identifier segment to obtain a space identifier of the user space where the application program is located when generating the traffic.
Based on the above scheme, the apparatus further comprises:
and the distribution module is used for distributing the application identifier for the application program from the application identifier section corresponding to the user space installed by the application program according to the user space installed by the application program.
Based on the above scheme, the monitoring module is specifically configured to monitor the traffic condition of the mobile terminal through the NETD service in the mobile terminal, and obtain the traffic monitoring record.
Based on the above scheme, the restriction module is specifically configured to prohibit sending of a network access request generated in the first class of space when the usage traffic of the first class of space exceeds the upper traffic limit.
Based on the above scheme, the user space further includes: a second type of space; the device further comprises:
a configuration module for receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space;
the restriction module is specifically configured to perform traffic usage restriction on the first class space according to the configuration rule and the traffic.
A third aspect of the embodiments of the present application provides a flow usage control apparatus, including a processor, a memory, and an executable program stored on the memory and capable of being executed by the processor, where the processor executes the steps of the flow usage control method according to any of the foregoing technical solutions when executing the executable program.
A fourth aspect of the embodiments of the present application provides a storage medium, on which an executable program is stored, where the executable program is executed by a processor to implement the steps of the traffic usage control method provided in any of the foregoing first aspects.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
in the embodiment of the application, the flow use information of different user spaces in the mobile terminal is obtained; and according to the flow use information, carrying out flow use limitation on the first class of space in the user space. Therefore, flow using of a certain space can be limited by flow statistics of user-divided spaces, so that the phenomenon of no restriction of flow using in the first space is realized, and the phenomenon of drowning, excessive eye use and the like caused by long-time internet surfing of specific users in the first space such as children and the like caused by the phenomenon of no restriction is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present examples and together with the description, serve to explain the principles of the examples.
Fig. 1 is a flow chart illustrating a method of traffic usage control according to an exemplary embodiment.
Fig. 2 is a flow diagram illustrating a method of traffic usage control in accordance with an exemplary embodiment.
FIG. 3 is a diagram illustrating a correspondence of application identifiers that do not correspond with user space in accordance with an illustrative embodiment;
FIG. 4 is a block diagram illustrating a flow usage control device in accordance with an exemplary embodiment;
FIG. 5 is a block diagram illustrating a flow usage control device in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the present examples. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present examples, as detailed in the appended claims.
As shown in fig. 1, the present embodiment provides a flow rate usage control method, including:
s11: acquiring flow use information of different user spaces in the mobile terminal;
s12: and according to the flow use information, carrying out flow use limitation on the first class of space in the user space.
The traffic usage control method provided by the embodiment can be applied to each mobile terminal. The mobile terminal includes but is not limited to: a mobile phone, a tablet computer, a smart television or a wearable device, etc.
In some embodiments, the first type of space may be some or all of the different user spaces. For example, the first type of space may be one or more of a plurality of user spaces configured within the mobile terminal. The plurality of user spaces may be equal parallel user spaces or different user spaces having different permission levels.
In other embodiments, a plurality of the user spaces may be divided into a first type space and a second type space. At this time, the user rights of the first type space and the second type space are different. For example, the user authority range of the second type space is larger than that of the first type space. For another example, the second-type space is a master user space, and the first-type user space is a slave user space. Alternatively, the second type of space is the administrative user space of the first type of space.
At least two user spaces are configured within an operating system of a mobile terminal. For example, a user space within the Android system is configured with at least two user spaces. The usage of different user spaces is user-different. For example, for a child and a parent, a user space for the parent (referred to simply as a parent space) and a user space for the child (referred to simply as a child space) are configured. In this case, the parent space may be the second type of space, and the child space may be the first type of space.
For another example, if the mobile terminal is a mobile terminal used by a family member in common, different user spaces may be set for different family members, for example, for elders, a user space of elders (may be simply referred to as elder space), a child space for children, and a young person (young person space) may be configured in consideration of age. The same or different applications may be configured in different user spaces. Different user spaces may have a spatial setting that is adapted to the age or characteristics of the user.
For another example, if the mobile terminal can be a teaching terminal, different user spaces are configured for teachers and students respectively. Different user spaces are configured with different usage rights. At this time, the teacher user space used by the teacher may be the aforementioned second type space, and the user space used by the student may be the aforementioned first type space.
In the embodiment of the application, the user spaces are distinguished for carrying out traffic statistics, so that traffic use conditions of each user space are obtained. As such, a traffic usage limit may be determined for the first type of space.
For example, in S12, when the usage flow rate of the first type space has reached the upper limit of the flow rate in the current usage period, the traffic flow rate in the first type space may be prohibited from being used continuously according to the monitored traffic flow rate usage information of each user space in the usage period of days, weeks, or months. And when the used flow of the first type of space does not reach the upper flow limit of the current use period, allowing the flow of the first type of space to be continuously used.
If the traffic of the first type space is allowed to be continuously used, the mobile terminal can continuously surf the internet through the cellular mobile network in the first type space; denying that the mobile terminal cannot continue to surf the internet through the cellular mobile network in the first-class space.
Therefore, the flow use information of the user-divided space is obtained, the flow use can be limited for the first space needing flow control, the situations of flow waste and excessive internet access caused by the first space unlimited use flow of the child space and the like are reduced, and the safe use of the mobile terminal of a specific user such as a child is realized.
Performing traffic usage restriction in S12 may include:
a total volume limit of flow;
rate limiting of the traffic;
a time limit for the flow rate to be used, etc.
In short, one or more of the traffic usage restrictions of the first type space can reduce the physical and psychological health problems caused by the unregulated internet access of the first type space users.
For example, the maximum internet speed of a child when the child uses the mobile terminal in the child space can be limited by the speed limit of the traffic, so that the child is prohibited from viewing internet access at a high traffic rate such as a network video.
For another example, children are allowed to use traffic to surf the internet before 7 pm and are not allowed to use traffic to surf the internet after 7 pm, which is achieved by using time limit of traffic.
In some embodiments, different applications are installed in different user spaces.
However, in a particular implementation, one application may be installed into multiple user spaces. However, in the embodiment of the present application, for monitoring usage traffic of different user spaces, one application program is installed in the mobile terminal, but different application identifications are configured when the application program belongs to different user spaces.
For example, one application is installed in both the user space 1 and the user space 2, and the application is installed only once in the mobile terminal, but is configured with two application ids, an application id1 used when the application is used in the user space 1 and an application id2 used when the application is used in the user space 2. When the user space 1 is used, the application program adopts the application identifier 1, so that the traffic monitoring record includes the application identifier 1 and the traffic usage of the application program.
As shown in fig. 2, the method further comprises: s10: and monitoring the flow of the mobile terminal to obtain a flow monitoring record.
For example, the entire mobile terminal may monitor the data amount of its network interface, and the traffic of the entire mobile terminal may be obtained.
In some embodiments, the NETD service is used to monitor traffic of the entire mobile terminal, and the traffic monitoring record is obtained. For example, the S10 may include: and monitoring the traffic condition of the mobile terminal through the NETD service in the mobile terminal to obtain the traffic monitoring record. However, the NETD service does not distinguish the space identifier for traffic monitoring, and in the embodiment of the present application, traffic is distinguished by the application identifier, so that traffic use information of each user space can be obtained.
The NETD service is a background daemon specially responsible for network management and control in the Android system, and a central module for forwarding and processing network related messages and commands in the Android system is mainly responsible for realizing functions related to network operation of some physical ports.
The S11 may include: and acquiring the traffic use information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record.
When the mobile terminal performs statistics of the usage traffic, the mobile terminal may be integrated. When the flow use information of the unused user space is distinguished, hydrogen is used according to the whole flow of the mobile terminal, and the flow generated by the current application program can be distinguished to belong to the user space by combining application identifications of the application program in different application spaces.
The application identification may in turn become a User Identification (UID).
Therefore, even if the mobile terminal cannot directly distinguish the application spaces for traffic monitoring, the traffic use information of each user space can be distinguished according to the application identifiers of the application programs in different application spaces after the whole monitoring, and the method has the characteristic of simplicity and convenience in realization.
In some embodiments, different ones of the user spaces are configured with different application identification segments. For example, one user space is configured with one application identifier segment, and the number of application identifiers contained in one application identifier segment may be 100, 1000, 10000, and the like.
In some embodiments, the number of application identifications included in the application identification segments that are not configured in user space may be the same or different. For example, the user space with a large authority range has application identification segments with a larger identification number, so that the number of application programs installed in the user space with a small authority range is limited.
The S12 may include:
and determining the user space corresponding to the flow generated by the application program according to the application identifier section where the application identifier is located in the flow monitoring record, so as to obtain the flow use information of different user spaces.
By means of table lookup, the application identifier which generates the traffic consumption in the traffic monitoring record can be determined to the application identifier section where the application identifier section is located, and then traffic use information of each user space is counted according to the user space to which the application identifier section belongs.
As shown in fig. 3, a mobile terminal is configured with 3 user spaces, which are user space 1, user space 2, and user space 3, and the space identifiers of these user spaces are: user ID1, User ID2, and User ID 3. Each space identifier corresponds to a user identifier segment, which is a user identifier segment 1, a user identifier segment 2 and a user identifier segment 3 in sequence.
In some embodiments, the traffic usage information includes at least: total flow used by each user space. In some cases, the traffic usage information may further include: time information of traffic generation, etc.
In some embodiments, the unused user spaces have different space identifications; the application identification sections corresponding to different user spaces contain the same number of application identifications;
the S12 may include:
and rounding the quotient of the application identification and the identification number corresponding to the application identification segment to obtain the space identification of the user space where the application program generates the flow.
Rounding here may include rounding up, or rounding down.
For example,
Figure BDA0002355622710000071
alternatively, the first and second electrodes may be,
Figure BDA0002355622710000072
wherein, UserID is space identification; UID is application identification; and N is the number of the application identifications contained in the application identification section corresponding to one user space.
In the embodiment of the application, the user space to which the corresponding flow belongs can be known directly through the calculation, a table look-up mode is not needed, memory occupied by table storage and time delay generated by query are reduced when the table look-up mode is used, and the method has the characteristic of simple implementation mode.
In some embodiments, the method further comprises:
and according to the user empty space installed by the application program, distributing the application identifier for the application program from an application identifier section corresponding to the user space installed by the application program.
In the embodiment of the invention, the application identifier is allocated to the application program by the mobile terminal. If an application program is installed in the mobile terminal, the application program is configured to each user space, and when the application program is configured to the user space (which is equivalent to being installed to the corresponding user space), an application identifier is correspondingly allocated to the application program when the application program is used in the application space.
In some embodiments, the S12 may include: and when the usage flow of the first type space exceeds the upper flow limit, forbidding the issuing of the network access request generated in the first type space.
Therefore, when the usage flow of the first type of space exceeds the upper flow limit, the network access request can not be sent out by intercepting the network access request generated in the first type of space, so that the flow can not be further generated, and the internet surfing behavior of the user in the first type of space is limited.
In some embodiments, the user space further comprises: a second type of space; the method further comprises the following steps:
receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space;
the traffic use limiting, according to the traffic use information, on the first class of space in the user space includes:
and carrying out flow use limitation on the first class space according to the configuration rule and the flow.
For example, the second type space may be a parent space, and the child space may be configured with a rule of traffic usage restriction, so as to obtain a configuration rule.
The configuration rule may include: and configuring the total traffic usage amount, wherein the configuration rule includes the traffic upper limit. The configuration rule may further include: configuration of traffic usage rate and/or traffic usage time, etc.
In a word, according to the traffic use information of the first-class space, the upper limit of the traffic use, the traffic use time and/or the traffic use rate of the first-class space are/is limited, and the phenomena that users in the first-class space such as children surf the internet excessively or waste traffic are simplified.
In some embodiments, the second type of space, that is, the first type of space is created under the usage right of a general user or an administrator, and the second type of space may regulate traffic usage of the first type of space. A child may not use a mobile cellular communication network on a mobile terminal for a limited period of time. The first type of space may not continue to use the mobile cellular communication network on the mobile terminal beyond the usage time. The second space can be opened without limitation, or closed forcibly. Meanwhile, the second type space is not limited by the first type space.
As shown in fig. 4, the present embodiment provides a flow rate usage control device including:
an obtaining module 41, configured to obtain traffic usage information of different user spaces in the mobile terminal;
and a limiting module 42, configured to perform traffic usage limitation on the first class space in the user space according to the traffic usage information.
In some embodiments, acquisition module 41 and restriction module 42 may both be program modules; the program module can determine the flow use information acquisition for distinguishing the user space and carry out the flow use limitation of the first type space after being executed by the processor.
In other embodiments, the obtaining module 41 and the limiting module 42 may be both hard and soft combining modules; a soft and hard combination module; the soft and hard combining module can comprise: various programmable arrays; programmable arrays include, but are not limited to: complex programmable arrays or field programmable arrays.
In still other embodiments, the obtaining module 41 and the limiting module 42 may be both soft and hard combining modules; a pure hardware module; the pure hardware module may include: an application specific integrated circuit.
In some embodiments, the same application is installed in different user spaces corresponding to different application identification IDs;
the device further comprises:
the monitoring module is used for monitoring the flow of the mobile terminal and obtaining a flow monitoring record;
the obtaining module 41 is specifically configured to obtain the traffic usage information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record.
In some embodiments, different ones of the user spaces are configured with different application identification segments;
the obtaining module 41 is specifically configured to determine, according to the application identifier segment in which the application identifier is located in the traffic monitoring record, the user space corresponding to the traffic generated by the application program, so as to obtain the traffic usage information of different user spaces.
In some embodiments, the unused user spaces have different space identifications; the application identification sections corresponding to different user spaces contain the same number of application identifications;
the obtaining module 41 is specifically configured to round the quotient of the application identifier and the identifier number corresponding to the application identifier segment to obtain the space identifier of the user space where the application program is located when generating the traffic.
In some embodiments, the apparatus further comprises:
and the distribution module is used for distributing the application identifier for the application program from the application identifier section corresponding to the user space installed by the application program according to the user space installed by the application program.
In some embodiments, the monitoring module is specifically configured to monitor a traffic condition of the mobile terminal through a NETD service in the mobile terminal, and obtain the traffic monitoring record.
In some embodiments, the restriction module 42 is specifically configured to prohibit issuance of a network access request generated in the first type of space when the usage traffic of the first type of space exceeds the upper traffic limit.
In some embodiments, the user space further comprises: a second type of space; the device further comprises:
a configuration module for receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space;
the limiting module 42 is specifically configured to perform traffic usage limitation on the first class space according to the configuration rule and the traffic.
Several specific examples are provided below in connection with any of the embodiments described above:
example 1:
the present example provides a method for controlling traffic usage across system spaces, which implements separate statistics on application traffic in each user space in a dual-user space, and implements traffic access usage limitation on applications in a single user space in the dual-user space.
The current application scene is that the flow usage of the application in the child space is counted in the child space, when the flow value set by a parent is exceeded, the application in the child space cannot continue to use a data network to surf the internet, and meanwhile, the application in the parent space is not limited to surf the internet. Therefore, unnecessary economic loss caused by operation error or long-time internet surfing without supervision of the children is avoided. Meanwhile, the method does not cause any influence on the use of the mobile phone by parents.
Example 2:
the application traffic in each user space in the dual-user space needs to be separately counted, and meanwhile, the traffic access use limitation of the application in a single user space in the dual-user space needs to be realized.
And realizing separate statistics on the application flow in each user space of the double user spaces. Each Android application can determine the UID of one application when installed, and a multi-space scheme under an Android multi-user mechanism can determine a userId for each user space. The UIDs of applications in different spaces (users) are regular, and the userId can be calculated from the UID of the application. The userId may be calculated as follows:
UserID is UID/100000 and is rounded;
this makes it possible to confirm under which user space an application belongs.
In addition, the statistics and management of the Android on the data traffic use are carried out in the process of the NETD, the NETD has no concept of userId, and only the traffic used by each application UID is counted. And confirming the UserID corresponding to the UID so as to screen the information acquired by the NETD, thereby acquiring the traffic usage statistics under each user space (user).
And limiting the use of the flow internet access applied in the single user space in the double user space. By the method, the user space to which the application belongs can be confirmed.
By modifying the process of accessing the NETD to the network, when the use of the space traffic reaches the upper limit, the application in the space can be prohibited from sending out network access when the data traffic is sent out.
The method and the device realize the separate statistics of the application flow in each user space of the dual-user space, and simultaneously realize the flow internet access use limitation of the application in a single user space in the dual-user space.
The embodiment provides a flow usage control device, which includes a processor, a memory, and an executable program stored on the memory and capable of being executed by the processor, and is characterized in that when the processor executes the executable program, the flow usage control method provided by any of the foregoing technical solutions is executed, for example, as shown in fig. 1 and fig. 2.
Fig. 5 is a block diagram illustrating a flow usage control device 800 in accordance with an exemplary embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operation at the device 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 806 provides power to the various components of device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed state of the device 800, the relative positioning of the components, such as a display and keypad of the apparatus 800, the sensor assembly 814 may also detect a change in position of the apparatus 800 or a component of the apparatus 800, the presence or absence of user contact with the apparatus 800, orientation or acceleration/deceleration of the apparatus 800, and a change in temperature of the apparatus 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Embodiments of the present application provide a non-transitory computer-readable storage medium, which may be referred to as a storage medium for short. The instructions in the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a traffic usage control method, the method comprising:
acquiring flow use information of different user spaces in the mobile terminal;
and according to the flow use information, carrying out flow use limitation on the first class of space in the user space.
In some cases, the same application is installed in different user spaces corresponding to different application identification IDs;
the method further comprises the following steps: monitoring the flow of the mobile terminal to obtain a flow monitoring record;
the acquiring of the traffic usage information of different user spaces in the mobile terminal includes:
and acquiring the traffic use information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record.
In some cases, different ones of the user spaces are configured with different application identification segments; the obtaining the traffic usage information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record includes: and determining the user space corresponding to the flow generated by the application program according to the application identifier section where the application identifier is located in the flow monitoring record, so as to obtain the flow use information of different user spaces.
In some cases, the unused user space has a different space identification; the application identification sections corresponding to different user spaces contain the same number of application identifications; the determining, according to the application identifier segment in which the application identifier is located in the traffic monitoring record, the user space corresponding to the traffic generated by the application program includes: and rounding the quotient of the application identification and the identification number corresponding to the application identification segment to obtain the space identification of the user space where the application program generates the flow.
In some cases, the method further comprises: and according to the user empty space installed by the application program, distributing the application identifier for the application program from an application identifier section corresponding to the user space installed by the application program.
In some cases, the monitoring the traffic of the mobile terminal and obtaining a traffic monitoring record includes: and monitoring the traffic condition of the mobile terminal through the NETD service in the mobile terminal to obtain the traffic monitoring record.
In some cases, said restricting traffic usage to a first type of space within said user space according to said traffic usage information comprises: and when the usage flow of the first type space exceeds the upper flow limit, forbidding the issuing of the network access request generated in the first type space.
In some cases, the user space further comprises: a second type of space; the method further comprises the following steps: receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space; the traffic use limiting, according to the traffic use information, on the first class of space in the user space includes: and carrying out flow use limitation on the first class space according to the configuration rule and the flow.
Other embodiments of the present examples will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the present examples following, in general, the principles of the examples and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the examples being indicated by the following claims.
It will be understood that the present examples are not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present example is limited only by the appended claims.

Claims (18)

1. A traffic usage control method, comprising:
acquiring flow use information of different user spaces in the mobile terminal;
and according to the flow use information, carrying out flow use limitation on the first class of space in the user space.
2. The method of claim 1, wherein the same application is installed in different user spaces corresponding to different application identification IDs;
the method further comprises the following steps: monitoring the flow of the mobile terminal to obtain a flow monitoring record;
the acquiring of the traffic usage information of different user spaces in the mobile terminal includes:
and acquiring the traffic use information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record.
3. The method of claim 2, wherein different user spaces are configured with different application identification segments;
the obtaining the traffic usage information of different user spaces according to the application identifier used when the application program generates traffic in the traffic monitoring record includes:
and determining the user space corresponding to the flow generated by the application program according to the application identifier section where the application identifier is located in the flow monitoring record, so as to obtain the flow use information of different user spaces.
4. The method of claim 3, wherein the unused user spaces have different space identifications; the application identification sections corresponding to different user spaces contain the same number of application identifications;
the determining, according to the application identifier segment in which the application identifier is located in the traffic monitoring record, the user space corresponding to the traffic generated by the application program includes:
and rounding the quotient of the application identification and the identification number corresponding to the application identification segment to obtain the space identification of the user space where the application program generates the flow.
5. The method of claim 3, further comprising:
and according to the user space installed by the application program, distributing the application identifier for the application program from an application identifier section corresponding to the user space installed by the application program.
6. The method according to claim 2, wherein the monitoring the traffic of the mobile terminal and obtaining a traffic monitoring record comprises:
and monitoring the traffic condition of the mobile terminal through the NETD service in the mobile terminal to obtain the traffic monitoring record.
7. The method according to any one of claims 1 to 6, wherein said limiting traffic usage of a first type of space within said user space according to said traffic usage information comprises:
and when the usage flow of the first type space exceeds the upper flow limit, forbidding the issuing of the network access request generated in the first type space.
8. The method of any of claims 1 to 6, wherein the user space further comprises: a second type of space; the method further comprises the following steps:
receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space;
the traffic use limiting, according to the traffic use information, on the first class of space in the user space includes:
and carrying out flow use limitation on the first class space according to the configuration rule and the flow.
9. A flow usage control device, comprising:
the acquisition module is used for acquiring flow use information of different user spaces in the mobile terminal;
and the limiting module is used for limiting the flow use of the first class of space in the user space according to the flow use information.
10. The apparatus of claim 9, wherein the same application is installed in different user spaces corresponding to different application ID;
the device further comprises:
the monitoring module is used for monitoring the flow of the mobile terminal and obtaining a flow monitoring record;
the obtaining module is specifically configured to obtain the traffic usage information of different user spaces according to an application identifier used when the application program generates traffic in the traffic monitoring record.
11. The apparatus of claim 10, wherein different user spaces are configured with different application identification segments;
the obtaining module is specifically configured to determine, according to the application identifier segment in which the application identifier is located in the traffic monitoring record, the user space corresponding to traffic generated by the application program, so as to obtain the traffic usage information of different user spaces.
12. The apparatus of claim 11, wherein the unused user spaces have different space identifications; the application identification sections corresponding to different user spaces contain the same number of application identifications;
the obtaining module is specifically configured to round a quotient of the application identifier and the identifier number corresponding to the application identifier segment to obtain a space identifier of the user space where the application program is located when generating the traffic.
13. The apparatus of claim 11, further comprising:
and the distribution module is used for distributing the application identifier for the application program from the application identifier section corresponding to the user space installed by the application program according to the user space installed by the application program.
14. The apparatus according to claim 11, wherein the monitoring module is specifically configured to monitor a traffic condition of the mobile terminal through a NETD service in the mobile terminal, and obtain the traffic monitoring record.
15. The apparatus according to any of the claims 9 to 14, wherein the restriction module is specifically configured to prohibit issuing of a network access request generated in the first type of space when the usage traffic of the first type of space exceeds an upper traffic limit.
16. The apparatus of any of claims 9 to 14, wherein the user space further comprises: a second type of space; the device further comprises:
a configuration module for receiving configuration rules for traffic usage restrictions for the first class of space in the second class of space;
the restriction module is specifically configured to perform traffic usage restriction on the first class space according to the configuration rule and the traffic.
17. A traffic usage control device comprising a processor, a memory and an executable program stored on the memory and executable by the processor, wherein the steps of the traffic usage control method according to any one of claims 1 to 8 are performed when the executable program is executed by the processor.
18. A storage medium on which an executable program is stored, wherein the executable program, when executed by a processor, performs the steps of the traffic usage control method according to any one of claims 1 to 8.
CN202010007042.3A 2020-01-03 2020-01-03 Flow use control method, device and storage medium Active CN111225112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010007042.3A CN111225112B (en) 2020-01-03 2020-01-03 Flow use control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010007042.3A CN111225112B (en) 2020-01-03 2020-01-03 Flow use control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111225112A true CN111225112A (en) 2020-06-02
CN111225112B CN111225112B (en) 2021-02-19

Family

ID=70829307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010007042.3A Active CN111225112B (en) 2020-01-03 2020-01-03 Flow use control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111225112B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100106977A1 (en) * 2008-10-24 2010-04-29 Jan Patrik Persson Method and Apparatus for Secure Software Platform Access
CN101873640A (en) * 2010-05-27 2010-10-27 华为终端有限公司 Flow processing method, device and mobile terminal
US20140157437A1 (en) * 2010-10-25 2014-06-05 Openpeak Inc. Creating Distinct User Spaces Through User Identifiers
CN104301187A (en) * 2014-11-10 2015-01-21 广东欧珀移动通信有限公司 Network traffic monitoring method for mobile terminals
CN105228190A (en) * 2015-10-29 2016-01-06 东莞酷派软件技术有限公司 A kind of many spaces terminal flux monitoring method and system
CN106385386A (en) * 2016-08-31 2017-02-08 成都飞鱼星科技股份有限公司 Application servo-actuated intelligent floe control method
CN106803860A (en) * 2017-01-23 2017-06-06 努比亚技术有限公司 The storage processing method and device of a kind of terminal applies
CN106899999A (en) * 2015-12-17 2017-06-27 小米科技有限责任公司 The network flow monitoring method and device of a kind of mobile terminal
CN108230001A (en) * 2016-12-21 2018-06-29 华为技术有限公司 The method, apparatus and system of extending user
US20180219784A1 (en) * 2017-01-27 2018-08-02 Verizon Patent And Licensing Inc. Traffic control platform
CN110610080A (en) * 2019-09-19 2019-12-24 武汉诚迈科技有限公司 Application isolation implementation method, mobile terminal, computer equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100106977A1 (en) * 2008-10-24 2010-04-29 Jan Patrik Persson Method and Apparatus for Secure Software Platform Access
CN101873640A (en) * 2010-05-27 2010-10-27 华为终端有限公司 Flow processing method, device and mobile terminal
US20140157437A1 (en) * 2010-10-25 2014-06-05 Openpeak Inc. Creating Distinct User Spaces Through User Identifiers
CN104301187A (en) * 2014-11-10 2015-01-21 广东欧珀移动通信有限公司 Network traffic monitoring method for mobile terminals
CN105228190A (en) * 2015-10-29 2016-01-06 东莞酷派软件技术有限公司 A kind of many spaces terminal flux monitoring method and system
CN106899999A (en) * 2015-12-17 2017-06-27 小米科技有限责任公司 The network flow monitoring method and device of a kind of mobile terminal
CN106385386A (en) * 2016-08-31 2017-02-08 成都飞鱼星科技股份有限公司 Application servo-actuated intelligent floe control method
CN108230001A (en) * 2016-12-21 2018-06-29 华为技术有限公司 The method, apparatus and system of extending user
CN106803860A (en) * 2017-01-23 2017-06-06 努比亚技术有限公司 The storage processing method and device of a kind of terminal applies
US20180219784A1 (en) * 2017-01-27 2018-08-02 Verizon Patent And Licensing Inc. Traffic control platform
CN110610080A (en) * 2019-09-19 2019-12-24 武汉诚迈科技有限公司 Application isolation implementation method, mobile terminal, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111225112B (en) 2021-02-19

Similar Documents

Publication Publication Date Title
EP3188066B1 (en) A method and an apparatus for managing an application
JP6101866B2 (en) Child mode processing method, apparatus, program, and recording medium
CN105357734B (en) The method and device of control access WIFI hot spot
RU2632160C2 (en) Method, device and terminal for displaying application messages
CN113785295A (en) Configuring context-based restrictions for computing devices
CN110995929B (en) Terminal control method, device, terminal and storage medium
CN106096964B (en) Payment method and device
US20150339016A1 (en) Tab creation method, device, and terminal
CN107480785B (en) Convolutional neural network training method and device
CN110945899B (en) Frequency band state indicating method and device and frequency band state determining method and device
WO2018049610A1 (en) Permission control method and device
CN112632418A (en) Password sharing method and device, electronic equipment and storage medium
CN111556352B (en) Multimedia resource sharing method and device, electronic equipment and storage medium
CN106471513B (en) Authority control method and device
CN110913276B (en) Data processing method, device, server, terminal and storage medium
CN112752328B (en) Network control method, device and storage medium
WO2018049611A1 (en) Permission control method and device
CN111225112B (en) Flow use control method, device and storage medium
US9832342B2 (en) Method and device for transmitting image
CN110830833A (en) Bullet screen information display method and device
CN114442789A (en) Dark screen control method, device, equipment and storage medium
CN114124866A (en) Session processing method, device, electronic equipment and storage medium
CN107018236A (en) The control method and device of terminal device
CN108418878B (en) Notification message pushing method and device, readable storage medium and electronic equipment
CN109196917B (en) Access control limiting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant