Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Charging authentication method, mobile terminal and charging authentication server

An authentication server and mobile terminal technology, which is applied in the field of mobile terminals, billing authentication servers, and billing authentication methods, can solve problems such as damaging the interests of resource developers, being unable to control resource dissemination, and improving billing. The effect of authentication security, avoiding illegal transmission, and guaranteeing rights and interests

Active Publication Date: 2011-08-10
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are two common billing and authentication methods: one is to package the original application resources, and the user downloads the resources to the mobile terminal and must unpack them before they can be installed and used normally. When packaged, it can guarantee the security of application resources and ensure that only payment can be used. However, once the package is successfully unpacked, the dissemination of resources cannot be controlled, and unauthorized users can also use the resources; the second is through a dedicated client and Since the resource only interacts with a specific client, if the user replaces the original real client with a fake client, then the user will never have to pay as long as he can obtain the downloaded resource, which greatly damages the resource. The interests of developers, so it is not a very safe implementation mechanism
[0004] In summary, the existing billing authentication method obviously has inconvenience and defects in actual use, so it is necessary to improve it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Charging authentication method, mobile terminal and charging authentication server
  • Charging authentication method, mobile terminal and charging authentication server
  • Charging authentication method, mobile terminal and charging authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] Such as figure 1 As shown, the present invention provides a billing and authentication system 100, including a resource interface module 10, a billing management module 20, and a billing and authentication server 30, wherein:

[0037] The resource interface module 10, set in the resource, is used to automatically send the charging authentication request to the charging management module 20 when the user requests to operate the resource, and automatically send the obtained charging status code to the charging authentication The server 30 performs verification. After the verification is pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of communication, and provides a charging authentication method, a mobile terminal and a charging authentication server. The method comprises the following steps that: when a user request to operate a resource, the resource automatically transmits a charging authentication request to the mobile terminal; the mobile terminal automatically extracts user identity information and resource information and transmits the information to the charging authentication server; the charging authentication server judges whether the user has paid or not according to the user identity information and the resource information, if the user has paid, a charging status code is generated and fed back to the source by the mobile terminal, and if the user has not paid, authentication failure information is fed back; and the resource automatically transmits the charging status code to the charging authentication server for verification, the user is permitted to operate the resource after the verification is passed, otherwise, the user is forbidden to operate the resource. Therefore, through the method, the terminal and the server, the charging authentication safety of the resource can be improved, the illegal broadcasting of the resource is avoided, and the benefits of resource developers are ensured.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a charging authentication method, a mobile terminal and a charging authentication server. Background technique [0002] The software application store is currently a relatively popular application, which mainly provides resource retrieval, resource location and resource download services. Common resource types mainly include applications (ie software), pictures, music, themes, and videos, etc. In order to realize the control of their own resources, most manufacturers choose to provide specific resource services through applications, so as to ensure the security of the applications themselves. [0003] At present, there are two common billing and authentication methods: one is to package the original application resources, and the user downloads the resources to the mobile terminal and must unpack them before they can be installed and used normally. When packaged, it can gu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/24H04W12/06
Inventor 王继辉赵健龙张贤伟
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products