Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing safe charging in peer-to-peer network

A security and charging point technology, applied in the field of network and communication, can solve the security defects of the billing system, no key system, heavy system burden, etc., to reduce the number of network message interactions, simplify key generation and management Steps, the effect of reducing the burden

Active Publication Date: 2014-04-09
丰县科技开发服务总站
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The calculation of its signature and verification will be a relatively large burden on both the resource user and the resource provider, especially when the resource user and the resource provider are mobile or embedded devices, it will cause a large system burden
If a symmetric encryption algorithm is used, the party that can verify the billing information can also forge the billing information, and the billing system will have security flaws
[0018] 2) The public-private key system requires a complete key distribution and management mechanism. There is no corresponding key system in the current telecommunication network, and it is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing safe charging in peer-to-peer network
  • Method and system for realizing safe charging in peer-to-peer network
  • Method and system for realizing safe charging in peer-to-peer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0108] The implementation process of a secure billing method of the present invention is as follows: Figure 4 shown. Specific steps are as follows:

[0109] 401) The resource user sends a request to the service control entity for using a certain resource. This resource can be provided by other peer nodes. The request contains basic information such as the type, content, and service quality of the business.

[0110] 402) The service control entity selects resource provider A to provide services for this service. The service control entity allocates a service identifier for this service to identify this service. At the same time, the service control entity generates a service encryption feature code. The service encryption feature code can be randomly generated, or can be generated by encrypting service-related information. After generating the business encryption feature code of this business, the business control entity generates the public part of billing information ac...

Embodiment 2

[0126] Another billing method implementation process of the present invention is as follows: Figure 5 shown. Specific steps are as follows:

[0127] 501) The resource user sends a request to the service control entity for using a certain resource. This resource can be provided by other peer nodes. The request contains basic information such as the type, content, and service quality of the business.

[0128] 502) The service control entity selects resource provider A to provide services for this service. The service control entity allocates a service identifier for this service to identify this service. At the same time, the service control entity generates multiple common parts of charging information. Multiple public parts of charging information may be aimed at different service qualities, or provide longer charging time. For example, when the maximum billing duration of a single set of billing point cards is 60 minutes, generating 4 public parts of billing informatio...

Embodiment 3

[0136] The present invention can support the situation that multiple resource users use the same resource. For example, resource provider A provides data relay function for two resource users B and C. Specific steps are as follows:

[0137] 601) The resource user B initiates a request to the service control entity, requesting to connect to the resource user C through the relay service.

[0138] 602) The service control entity selects resource provider A to perform the relay service. The service control entity allocates a service identifier for this service to identify this service. At the same time, the service control entity generates a service encryption feature code and related charging point card and charging verification code for resource users B and C respectively.

[0139] The service control entity sends a message to resource provider A to request resource reservation. The request message includes the public part of service charging information, the charging verifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for performing security charging, which includes the following steps: a resource user uses the resources of a resource provider via a service control entity, wherein before using the resource, the resource user obtains a charging point card which is generated from a service encryption characteristic code and charging information by using a one-way function, and the resource provider and the service control entity obtain a charging verification code which is generated from the service encryption characteristic code and the charging information by using the one-way function; during the resource using process, the resource user sends the charging point card to the resource provider on the basis of the service progress, and the resource provider verifies the charging point card on the basis of the charging verification code. The invention also provides a system for performing security charging. The security charging mode provided by the invention is realized by using the one-way function, so that the small size charging for service can be completed by using the one-way function with less computational complexity.

Description

technical field [0001] The invention relates to the field of network and communication, in particular to a method and system for how to securely charge resource usage in a peer-to-peer network. Background technique [0002] With the development of Internet technology and computer hardware technology, network application technology based on peer-to-peer (Peer-to-peer, P2P) has been rapidly popularized in recent years. Different from the traditional server / client model, the nodes in the peer-to-peer network can play the roles of server and client at the same time to share resources. The resources that peer nodes can share include, but are not limited to: information resources, network bandwidth and transmission resources, information processing resources, information storage resources, and human participation resources. Nodes in the peer-to-peer network often serve as resource providers (Server) and users (Client) at the same time. [0003] Since the peer-to-peer network nod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L12/14H04L29/08G06Q20/14G06Q20/22G06Q20/38G06Q20/40
CPCG06Q20/14G06Q20/40975H04L63/12G06Q20/38H04L12/14G06Q20/223
Inventor 王炜孟昱李漓春胡永生
Owner 丰县科技开发服务总站
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products