Security control method, operation management billing system, application store and mobile terminal

A mobile terminal, operation management technology, applied in security devices, accounting/billing services, electrical components, etc., can solve the problems of interruption, no security processing measures, and difficulty in ensuring the security of short messages, so as to avoid interruption and ensure security. Effect

Active Publication Date: 2016-08-24
HUAWEI SOFTWARE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this billing scheme has the following problems: without security measures, it is difficult to guarantee the security of short messages, and in addition, due to the need for user confirmation, it will cause a certain period of interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method, operation management billing system, application store and mobile terminal
  • Security control method, operation management billing system, application store and mobile terminal
  • Security control method, operation management billing system, application store and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to solve the problem that the charging security of in-app short messages cannot be guaranteed in the prior art, the embodiment of the present invention will include security verification information in the billing short messages, and the application store will generate security verification information according to the remaining information in the billing short messages , in order to distinguish, the security verification information contained in the billing SMS can be called the first security verification information, and the security verification information generated by the app store can be called the second security verification information. By comparing the first security verification information verification information and second security verification information to verify security.

[0034] figure 1 It is a schematic diagram of the mapping relationship and process of security check information generation in the embodiment of the present invention. see...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security control method, an operation management billing system, an application store and a mobile terminal. The method includes receiving a billing short message sent by a mobile terminal, wherein the billing short message includes short message billing service content, a random number, and first security check information, and the short message billing service content includes an application identification of a mobile terminal application ; According to the user identification of the mobile terminal and the application identification, obtain the security serial number and the application version identification corresponding to the user identification and the application identification, adopt a digest encryption algorithm, and encrypt the short message according to the set order Encrypt the billing service content, the security serial number, the application version identifier, and the random number to obtain second security check information; compare the first security check information with the second security check information At the same time, billing is performed on the mobile terminal application. The embodiment of the present invention can ensure the billing safety of the short message in the stand-alone application downloaded from the application store.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a security control method, an operation management billing system, an application store and a mobile terminal. Background technique [0002] Downloading mobile terminal applications by users from an application store (Application Store, APP Store) is one of the key services of the mobile Internet at present. The mobile terminal application downloaded from the application store is a stand-alone application, which is characterized in that this type of application can be directly run on the mobile terminal without connecting to a remote application server. Billing for such applications usually adopts an in-app billing method, for example, billing for levels and props of stand-alone games, billing for a certain chapter of a book, and so on. The in-app billing scheme usually adopts the following billing scheme: when reaching a billing point in the app (such as levels, props, chargin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/24H04W12/00H04W12/03H04W12/033H04W12/37
Inventor 闫伟
Owner HUAWEI SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products