Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Billing point verification method and system

A billing point, billing server technology, applied in accounting/billing services, electrical components, wireless communications, etc. The effect of solving the problem of billing counterfeiting

Active Publication Date: 2014-04-09
卓望数码技术(深圳)有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Counterfeit mobile phones induce users to download and install malicious fee deduction software by pre-installing malicious fee deduction software, and then the malicious fee deduction software controls the user's mobile phone to pretend to be the user to send billing text messages, and simulates the user to access the WAP billing URL, so that the user does not know. Business billing is generated under the circumstances of the situation, causing extremely bad impact;
[0009] Due to the clear cultural characteristics of the billing point, the SP fraudulently uses the normal business to perform billing and recharge for pornographic content and malicious games on the Internet, which damages the interests of users and affects the physical and mental health of users;
[0010] Since the billing point is based solely on the SMS, MMS, or access to the WAP billing URL initiated by the terminal side, it will lead to repeated chargebacks and cause user complaints;
[0011] In short, in the new situation of mobile Internet services, with the popularization of smart phones, using SMS billing codes, MMS billing codes, and WAP billing URLs as billing points can no longer meet the needs of billing security. A brand-new solution must be sought to ensure the interests of users and application providers and promote the sustainable development of the industry chain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Billing point verification method and system
  • Billing point verification method and system
  • Billing point verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further explained below in conjunction with the accompanying drawings and embodiments.

[0058] figure 1 It is a system block diagram of the first embodiment of the system 100 for verifying billing points of the present invention, as figure 1 As shown, the system 100 for verifying billing points of the present invention includes a mobile phone terminal 110 , a secure billing server 120 connected in communication with the mobile phone terminal 110 , and an authorization server 130 connected in communication with the secure billing server 120 . The mobile terminal 110 includes multiple application programs (not shown in the figure) and a proxy billing module 111 .

[0059] figure 2 It is the work flow diagram of the first embodiment of the system 100 for verifying charging points of the present invention, as figure 2 As shown, when an application runs to the charging point, it carries its application feature code APPUID to call the proxy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a billing point verification method and system. The system comprises a mobile phone terminal, a security billing server and an authorization server. The mobile phone terminal comprises an application and a proxy billing module. The method comprises the steps that S1, when the application runs to a billing point, the proxy billing module is called; S2, the proxy billing module generates a query data packet and sends the query data packet to the authorization server; S3, the authorization server returns a query result data packet; S4, the security billing server sends an unauthorized message packet to the application or generates an authorization document summary according to the query result data packet; S5, the security billing server acquires a timestamp; S6, the security billing server sets authorization document generation and effective time; S7, the security billing server generates an authorization document and sends the authorization document to the proxy billing module; and S8, the proxy billing module saves the authorization document. A user actively initiates service billing. The billing point of the application has the characteristics of faking prevention, repudiation prevention and the like.

Description

technical field [0001] The present invention relates to billing technology for mobile Internet applications, and more specifically, to a method and system for verifying billing points. Background technique [0002] At present, the billing mode of mobile data value-added services is mainly realized by SMS, MMS, and WAP. The core is to ensure the reliability and trustworthiness of the service billing point based on the trustworthiness of the mobile signaling network. With the continuous development of mobile communication bandwidth and the continuous popularization of smart phones, mobile Internet IP services have gradually become the mainstream direction of business. How to build a fast and credible billing guarantee to prevent fraud and repudiation. [0003] The billing of value-added services in the form of SMS, MMS, and WAP is mainly based on the following schemes: [0004] With the specific SMS service code combined with the content instruction as the billing identifier...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/24H04W12/06H04W12/069
Inventor 肖伟刘志诚吴勇袁胜蔡庆玲
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products