A method and system for implementing secure billing in peer-to-peer network

A security, charging point technology, applied in the field of network and communication, can solve the security defects of the billing system, no key system, heavy system burden, etc., to reduce the number of network message interactions, simplify key generation and management Steps, the effect of reducing the burden

Active Publication Date: 2011-12-21
丰县科技开发服务总站
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The calculation of its signature and verification will be a relatively large burden on both the resource user and the resource provider, especially when the resource user and the resource provider are mobile or embedded devices, it will cause a large system burden
If a symmetric encryption algorithm is used, the party that can verify the billing information can also forge the billing information, and the billing system will have security flaws
[0018] 2) The public-private key system requires a complete key distribution and management mechanism. There is no corresponding key system in the current telecommunication network, and it is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for implementing secure billing in peer-to-peer network
  • A method and system for implementing secure billing in peer-to-peer network
  • A method and system for implementing secure billing in peer-to-peer network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0107] Example 1

[0108] The implementation process of a secure charging method of the present invention is as follows: Figure 4 Shown. Specific steps are as follows:

[0109] 401) The resource user sends a request to the service control entity to request the use of a certain resource. This resource can be provided by other peer nodes. The request contains basic information such as the type, content, and service quality of the business.

[0110] 402) The business control entity selects resource provider A to provide services for this business. The business control entity allocates a business identifier for this business to identify this business. At the same time, the service control entity generates a service encryption feature code. The service encryption feature code can be randomly generated or generated by encryption of service-related information. After generating the service encryption feature code for this service, the service control entity generates the public part of t

Example Embodiment

[0125] Example 2

[0126] The implementation process of another charging method of the present invention is as follows: Figure 5 Shown. Specific steps are as follows:

[0127] 501) The resource user sends a request to the service control entity to request the use of a certain resource. This resource can be provided by other peer nodes. The request contains basic information such as the type, content, and service quality of the business.

[0128] 502) The business control entity selects resource provider A to provide services for this business. The business control entity allocates a business identifier for this business to identify this business. At the same time, the service control entity generates multiple common parts of charging information. The common parts of multiple billing information can be targeted at different service qualities or provide longer billing time. For example, when the maximum billing duration of a single set of billing point cards is 60 minutes, four bil

Example Embodiment

[0135] Example 3

[0136] The invention can support the situation that multiple resource users use the same resource. For example, resource provider A provides data relay functions for two resource users B and C. Specific steps are as follows:

[0137] 601) The resource user B initiates a request to the service control entity, requesting to connect to the resource user C through the relay service.

[0138] 602) The service control entity selects resource provider A to perform this relay service. The business control entity allocates a business identifier for this business to identify this business. At the same time, the service control entity generates a service encryption feature code and related charging point card and charging verification code for resource users B and C, respectively.

[0139] The service control entity sends a message to the resource provider A to request resource reservation. The request message contains the public part of service charging information, the char

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing safe charging. The method comprises the following steps: a resource user uses a resource of a resource provider through a service control entity; the resource user acquires a charging point card generated by service encrypted feature codes and charging information through one-way functions before using the resource, and the resource provider and the service control entity acquire charging verification codes generated by the service encrypted feature codes and the charging information through the one-way functions; the resource user sends the charging point card to the resource provider according to service progress in the using process of the resource, and the resource provider verifies the charging point card according to the charging verification codes. The invention also provides a system for realizing the safe charging. A safe charging mode provided by the invention is realized by adopting the one-way functions; and in addition, according to the safe charging mode provided by the invention, the small-unit charging of services can be completed by using the one-way functions with smaller calculated quantities.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 丰县科技开发服务总站
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products