Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing trigger of intermediate charge

An intermediate charging and implementation method technology, applied in the field of communication, can solve the problem that there is no trigger intermediate charging, cannot meet the diversified requirements of triggering intermediate charging, and cannot effectively and flexibly realize the triggering and reporting of intermediate charging, etc. problem, to achieve the effect of control flexibility

Active Publication Date: 2010-06-02
SUZHOU HAOLI CULTURE MEDIA TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for users who are not time-sensitive and highly traffic-sensitive, the existing single duration billing strategy cannot effectively and flexibly realize the triggering and reporting of intermediate billing
In short, the existing technology cannot meet the diversified requirements of triggering intermediate billing, and there is no implementation scheme of triggering intermediate billing that meets the diverse requirements at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing trigger of intermediate charge
  • Method and system for implementing trigger of intermediate charge
  • Method and system for implementing trigger of intermediate charge

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 3

[0099] The third embodiment is: the current billing strategy is specifically based on the billing mode based on data flow, and the current billing strategy is specifically based on the billing strategy based on the time interval plus traffic interval, and different data streams are based on their respective time intervals plus traffic intervals To trigger intermediate charging, this method embodiment includes the following steps:

[0100] Step 501, the terminal enters the WiMAX network, the terminal initiates an initial access request, and initially accesses the WiMAX network.

[0101] Step 502: After the initial access authentication is successful, the home AAA server notifies the AAA client of successful authentication through a Radius-type access acceptance message, and sends relevant authorization parameters to the AAA client through an access acceptance message end.

[0102] Here, the relevant authorization parameters are mainly: the billing mode is based on the data str...

Embodiment 4

[0110] Embodiment 4 is: the current billing strategy is specifically a billing mode based on data flow, and the current billing strategy is specifically a billing strategy based on traffic interval / duration interval / duration interval plus traffic interval, and different data streams are based on their respective The traffic interval / duration interval / duration interval plus the traffic interval triggers intermediate billing. This embodiment of the method includes the following steps:

[0111] Step 601, the terminal enters the WiMAX network, the terminal initiates an initial access request, and initially accesses the WiMAX network.

[0112] Step 602: After the initial access authentication is successful, the home AAA server notifies the AAA client of successful authentication through a Radius-type access acceptance message, and sends relevant authorization parameters to the AAA client through an access acceptance message end.

[0113] Here, the relevant authorization parameters...

Embodiment 5

[0121] Embodiment 5 is: the current billing policy is specifically the billing mode based on the IP session, and when the current billing policy is specifically the billing policy based on the traffic interval, intermediate billing is triggered based on the traffic interval. This embodiment of the method includes the following steps :

[0122] Step 701, the terminal enters the WiMAX network, the terminal initiates an initial access request, and initially accesses the WiMAX network.

[0123] Step 702: After the initial access authentication succeeds, the home AAA server notifies the AAA client of successful authentication through a Radius-type access acceptance message, and sends relevant authorization parameters to the AAA client through an access acceptance message end.

[0124] Here, the relevant authorization parameters mainly include: the charging mode is based on IP session, and the fields of charging policy based on traffic interval.

[0125] Step 703 , the accounting ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for implementing trigger of intermediate charge. The method comprises the following steps: acquiring charging strategy and charging mode from a charging client; and implementing trigger and report of the intermediate charge according to the acquired charging strategy and charging mode. The invention further discloses a system for implementing trigger of intermediate charge. The system comprises an acquiring unit for acquiring the charging strategy and the charging mode, and a trigger and report implementing unit for implementing the trigger and report of the intermediate charge according to the acquired charging strategy and charging mode. The method and the system can implement the trigger and report of the intermediate charge based on the charging strategies made by service flow, duration or a combination of the service flow and the duration, thereby meeting diversified requirements on triggering intermediate charge.

Description

technical field [0001] The present invention relates to the billing technology in the field of communication, and in particular to a method of billing traffic, time duration, traffic plus time length, etc. A method and system for realizing intermediate charging triggered by a charging policy formed by such a combination. Background technique [0002] In the prior art, a WiMAX system generally consists of three parts: a terminal, an access service network (ASN, Access Service Network) and a connection service network (CSN, Connect Service Network). Among them, the ASN mainly performs the following functions: completing the Layer 2 (L2) connection of the WiMAX terminal, transmitting the Authentication / Authorization / Accounting (AAA, Authentication / Authorization / Accounting) message to the home CSN (H-CSN), providing network access Provider (NSP, Network Service Provider) network selection and discovery; provide relay, radio resource management, and tunnel maintenance between AS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/14H04W4/24H04M15/00H04M17/00
Inventor 刘熠雯孙倩
Owner SUZHOU HAOLI CULTURE MEDIA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products