Accounting and authentication method, mobile terminal and accounting and authentication server

An authentication server and mobile terminal technology, applied in the field of mobile terminals, billing authentication servers, and billing authentication methods, can solve problems such as damage to the interests of resource developers, inability to control resource dissemination, inconvenience, etc., and achieve improved billing The effect of authentication security, avoiding illegal transmission, and avoiding leakage

Active Publication Date: 2016-04-06
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are two common billing and authentication methods: one is to package the original application resources, and the user downloads the resources to the mobile terminal and must unpack them before they can be installed and used normally. When packaged, it can guarantee the security of application resources and ensure that only payment can be used. However, once the package is successfully unpacked, the dissemination of resources cannot be controlled, and unauthorized users can also use the resources; the second is through a dedicated client and Since the resource only interacts with a specific client, if the user replaces the original real client with a fake client, then the user will never have to pay as long as he can obtain the downloaded resource, which greatly damages the resource. The interests of developers, so it is not a very safe implementation mechanism
[0004] In summary, the existing billing authentication method obviously has inconvenience and defects in actual use, so it is necessary to improve it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accounting and authentication method, mobile terminal and accounting and authentication server
  • Accounting and authentication method, mobile terminal and accounting and authentication server
  • Accounting and authentication method, mobile terminal and accounting and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] Such as figure 1 As shown, the present invention provides a billing and authentication system 100, including a resource interface module 10, a billing management module 20, and a billing and authentication server 30, wherein:

[0037] The resource interface module 10, set in the resource, is used to automatically send the charging authentication request to the charging management module 20 when the user requests to operate the resource, and automatically send the obtained charging status code to the charging authentication The server 30 performs verification. After the verification is passe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is applicable to the technical field of communication, and provides a charging authentication method, a mobile terminal and a charging authentication server. The method includes the following steps: when a user requests to operate a resource, the resource automatically sends a charging authentication method to the mobile terminal request; the mobile terminal automatically extracts the user identity information and resource information and sends it to the billing authentication server; the billing authentication server judges whether the user has paid according to the user identity information and resource information, and if so, generates a billing status code and passes the mobile terminal Feedback to the resource, otherwise the authentication failure information will be fed back; the resource will automatically send the billing status code to the billing and authentication server for verification, and the user is allowed to operate the resource after the verification is passed, otherwise the user is prohibited from operating the resource. Thereby, the present invention can improve the security of resource billing and authentication, avoid illegal dissemination of resources, and guarantee the rights and interests of resource developers.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a charging authentication method, a mobile terminal and a charging authentication server. Background technique [0002] The software application store is currently a relatively popular application, which mainly provides resource retrieval, resource location and resource download services. Common resource types mainly include applications (ie software), pictures, music, themes, and videos, etc. In order to realize the control of their own resources, most manufacturers choose to provide specific resource services through applications, so as to ensure the security of the applications themselves. [0003] At present, there are two common billing and authentication methods: one is to package the original application resources, and the user downloads the resources to the mobile terminal and must unpack them before they can be installed and used normally. When packaged, it can gu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10H04W4/24H04W12/06
Inventor 王继辉赵健龙张贤伟
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products