Safety Service fee metering method

A technology for security services and billing methods, applied in the field of communication and information security, it can solve the problem that users cannot customize security services according to security requirements, and achieve the effect of deterministic accuracy and simple realization.

Inactive Publication Date: 2006-05-17
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, users cannot customize the required secu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety Service fee metering method
  • Safety Service fee metering method
  • Safety Service fee metering method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] The application and implementation of the secure service charging method will be described below in conjunction with the illustrations.

[0033] Security elements can be classified according to various attributes, but the following goals must be achieved: the division of security elements is non-overlapping, that is, there is no security element belonging to two categories; the classification of security elements is complete, that is, any Safe Meta always finds its own category. figure 1 It is based on the common billing methods of AAA servers—traffic, duration, and number of communications to divide the security element. Considering that the policy controller cannot authorize and control the specific objects accessed by the user (by the ASP authorization that provides the service and Control), so the "Access Control" security element is not counted. Similarly, "communication security" refers to the prevention of line eavesdropping during communication, and does not in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for charging on safety service includes setting price for safety elements, classifying safety elements according to charge mode supported by AAA server, calculating safety element cost in each classification according to safety element combination selected by user for obtaining cost of safety element global combination i.e. cost for this type of safety service.

Description

technical field [0001] The invention is applicable to the fields of communication and information security, and specifically relates to a method for charging security services. Background technique [0002] Due to the timeliness and sensitivity of business information, people's attention to communication security has risen to an unprecedented height. With the development of universal communication services, terminal users also put forward higher requirements for communication services. People not only require communication quality, but also require guaranteed communication security. The security requirements for communication are even more diverse: different applications have different security requirements; the same application has different security requirements in different scenarios. For example, a basic voice call only needs to be authenticated and charged for the user to meet the requirements. The mobile wallet service requires multi-party authentication of user ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/14H04L9/00
Inventor 张峰陈剑勇张晔
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products