Method and system for realizing safe charging in peer-to-peer network
A security and charging point technology, applied in the field of network and communication, can solve the security defects of the billing system, no key system, heavy system burden, etc., to reduce the number of network message interactions, simplify key generation and management Steps, the effect of reducing the burden
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0108] The implementation process of a secure billing method of the present invention is as follows: Figure 4 shown. Specific steps are as follows:
[0109] 401) The resource user sends a request to the service control entity for using a certain resource. This resource can be provided by other peer nodes. The request contains basic information such as the type, content, and service quality of the business.
[0110] 402) The service control entity selects resource provider A to provide services for this service. The service control entity allocates a service identifier for this service to identify this service. At the same time, the service control entity generates a service encryption feature code. The service encryption feature code can be randomly generated, or can be generated by encrypting service-related information. After generating the business encryption feature code of this business, the business control entity generates the public part of billing information ac...
Embodiment 2
[0126] Another billing method implementation process of the present invention is as follows: Figure 5 shown. Specific steps are as follows:
[0127] 501) The resource user sends a request to the service control entity for using a certain resource. This resource can be provided by other peer nodes. The request contains basic information such as the type, content, and service quality of the business.
[0128] 502) The service control entity selects resource provider A to provide services for this service. The service control entity allocates a service identifier for this service to identify this service. At the same time, the service control entity generates multiple common parts of charging information. Multiple public parts of charging information may be aimed at different service qualities, or provide longer charging time. For example, when the maximum billing duration of a single set of billing point cards is 60 minutes, generating 4 public parts of billing informatio...
Embodiment 3
[0136] The present invention can support the situation that multiple resource users use the same resource. For example, resource provider A provides data relay function for two resource users B and C. Specific steps are as follows:
[0137] 601) The resource user B initiates a request to the service control entity, requesting to connect to the resource user C through the relay service.
[0138] 602) The service control entity selects resource provider A to perform the relay service. The service control entity allocates a service identifier for this service to identify this service. At the same time, the service control entity generates a service encryption feature code and related charging point card and charging verification code for resource users B and C respectively.
[0139] The service control entity sends a message to resource provider A to request resource reservation. The request message includes the public part of service charging information, the charging verifi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com