Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flow control method

A flow control and flow technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of unattainable charges, inconvenient settings, operators' cracking and changes, etc., to achieve high encryption strength and ensure economical effect of benefit

Inactive Publication Date: 2010-08-18
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are generally two methods for setting the traffic threshold value of the business. One is to set the threshold value of traffic control with a program. In this method, each threshold value corresponds to a program. When modifying the threshold value, the location service needs to be republished. program, and for formal software companies to re-release the program to go through a very strict process, it is very inconvenient to use this method to set up; the other is to set the flow control threshold in the program configuration file, However, the flow control parameters are written in text files or ordinary encrypted files, which are very easy to be cracked and changed by the operator, and the purpose of charging according to the traffic flow of the business cannot be achieved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow control method
  • Flow control method
  • Flow control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The implementation of the technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings:

[0031] FIG. 1 is a schematic flow chart of flow control by a method according to an embodiment of the present invention, that is, an overall flow chart of flow control by applying an asymmetric encryption algorithm. As shown in the figure, the whole scheme consists of 3 major steps:

[0032] Step 101: The traffic provider such as the device manufacturer generates a key and a traffic control configuration file, and the output of this process is the public key and the encrypted traffic control configuration file released to the outside world;

[0033] Step 102: The traffic user, such as the operator, reads in the public key issued by the traffic provider and the encrypted traffic control configuration file, decrypts it, and reads, modifies and / or sets the traffic control parameters in the traffic control configura...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a flow control method including that a flow control program contols service flow according to a matched file for flow control characterizing in also including: 1, a flow service providing party uses non-encrypt algorithm to encrypt the file and issues a cryptographic key and ciphered matched file, 2, a flow service using party reads in the cryptographic key and the file and de-ciphers the file, 3, it controls the flow used by the using party according to the de-ciphered file.

Description

technical field [0001] The invention relates to a method for realizing flow control by using an asymmetric encryption algorithm, in particular to a method for realizing a positioning service interface of a PHS (Personal Handy Phone System, also known as a wireless local telephone system in China). Background technique [0002] As the PHS wireless local telephone market grows day by day, China Telecom and China Netcom have begun to consider providing value-added business services for wireless local telephone networks. With the development of mobile communication technology and market, location service business has gradually become the focus of new business. When an equipment manufacturer provides positioning service products to a positioning service operator, it is necessary to control the service flow entering the system, and charge the service operator according to the service flow threshold. [0003] At present, there are generally two methods for setting the traffic thre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 黄颖华孙云韬黎云华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products