CN106936600B - Flow charging method and system and related equipment - Google Patents

Flow charging method and system and related equipment Download PDF

Info

Publication number
CN106936600B
CN106936600B CN201511016855.4A CN201511016855A CN106936600B CN 106936600 B CN106936600 B CN 106936600B CN 201511016855 A CN201511016855 A CN 201511016855A CN 106936600 B CN106936600 B CN 106936600B
Authority
CN
China
Prior art keywords
charging
identifier
service
token
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511016855.4A
Other languages
Chinese (zh)
Other versions
CN106936600A (en
Inventor
魏民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201511016855.4A priority Critical patent/CN106936600B/en
Publication of CN106936600A publication Critical patent/CN106936600A/en
Application granted granted Critical
Publication of CN106936600B publication Critical patent/CN106936600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1403Architecture for metering, charging or billing
    • H04L12/1407Policy-and-charging control [PCC] architecture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Abstract

The invention discloses a flow charging method and system and related equipment, and relates to the field of flow charging. The flow charging method comprises the following steps: the charging network element receives service access sent by a terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier; analyzing service access and starting a charging process; if the value-added charging process is started, the service access is forwarded to the application server, so that the application server can select a use strategy of the charging strategy according to the service access; receiving and analyzing a service response sent by an application server to acquire a use strategy identifier; and charging the application according to the charging strategy identifier and the use strategy identifier thereof. The method is characterized in that a terminal is adopted to send service access carrying a charging strategy, an application server selects a use strategy of the charging strategy according to the service access and sends the use strategy to a charging network element, so that a service provider is supported to dynamically formulate the use strategy of the charging strategy, and the requirements of flexible charging and operation on demand of the application are met.

Description

Flow charging method and system and related equipment
Technical Field
The present invention relates to the field of traffic charging, and in particular, to a traffic charging method and system, and related devices.
Background
In The OTT (Over The Top, internet companies cross operators) era, flexible and diverse charging capabilities provided and opened by operators are The main technical means for supporting traffic and then operating. The current traffic charging method based on OTT is that OTT configures both the directional condition and the charging policy to the charging network element. When the flow passes through the charging network element, the charging network element collects and identifies the directional condition and matches the directional condition with the charging strategy.
However, since the orientation conditions change frequently, it is necessary to configure the charging network element frequently. Therefore, in the prior art, based on security and performance considerations, the number of charging policies that can be supported by a charging network element is limited, and frequent changes of the use policy of OTT are not allowed, so that the flexible charging requirement of OTT application cannot be met.
Disclosure of Invention
The technical problem to be solved by the embodiment of the invention is to adopt which way to meet the requirement of OTT flexible charging.
According to a first aspect of the embodiments of the present invention, a traffic charging method is provided, including: a charging network element receives service access sent by a terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier; the charging network element analyzes the service access and starts a charging process according to the content of the service access; if the value-added charging process is started, the charging network element forwards the service access to the application server so that the application server can select a use strategy of the charging strategy according to the information in the service access; the charging network element receives a service response which is sent by the application server and corresponds to the service access, wherein the service response comprises a use strategy identifier which corresponds to a use strategy of a charging strategy; the charging network element analyzes the service response and acquires a use strategy identifier; and the charging network element charges the application corresponding to the service provider identifier according to the charging policy identifier and the use policy identifier thereof.
In one embodiment, the analyzing, by the charging network element, the service access, and starting the charging process according to the content of the service access includes: the charging network element analyzes the service access and acquires a charging strategy identifier and a service provider identifier; the charging network element judges whether the service request is a value-added service request according to the service provider identifier, and if the service request is the value-added service request, the charging network element starts a value-added charging process; if the service request is not a value added service request, the charging network element starts a common charging process.
In one embodiment, the usage policy identification is a token, and includes a token identification, a service provider identification, and a charging policy identification, and further includes a token validity period and/or a traffic cap value.
In one embodiment, the token is an encrypted token; the charging network element analyzes the service response, acquires the use strategy identifier and carries out charging, wherein the charging comprises the following steps: the charging network element decrypts the encrypted token by adopting a preset secret key, if the charging network element successfully analyzes and authenticates the token, the charging network element continues to perform the value-added charging process, otherwise, the charging network element converts the started value-added charging process into a common charging process.
In one embodiment, when the token includes the token validity period, the charging network element parses the service response, obtains the usage policy identifier, and performs charging including: the charging network element analyzes the service response, the validity period of the token is obtained, and if the token is not expired, the charging network element continues to perform the value-added charging process; if the token is expired, the charging network element converts the started value-added charging flow into a common charging flow.
In one embodiment, when the token includes the capping value, the charging network element parses the service response, obtains the usage policy identifier, and performs charging including: the charging network element analyzes the service response to obtain a capping value, and for the flow which does not exceed the capping value, the charging network element continues to carry out a value-added charging process; and for the flow exceeding the capping value, the charging network element converts the started value-added charging flow into a common charging flow.
In one embodiment, the method further comprises: the terminal determines the charging policy identifier according to the orientation condition, wherein the orientation condition comprises the current time, the target content and/or the user identifier.
In one embodiment, the method further comprises: and the charging network element generates a ticket according to the charging result, wherein the ticket has the token identification.
In one embodiment, the method further comprises: and the operator management platform generates a corresponding token according to the use strategy request of the charging strategy and sends the token to the application server.
In one embodiment, the service access further comprises a user identifier and/or time, so that the application server selects the usage policy of the charging policy according to the information in the service access.
According to a second aspect of the embodiments of the present invention, a method for charging traffic is provided, including: the terminal determines a charging policy identifier according to the orientation condition, wherein the orientation condition comprises current time, target content and/or a user identifier; and the terminal sends service access to the charging network element, wherein the service access comprises a charging strategy identifier and a service provider identifier, so that the charging network element and the application server can select a use strategy of the charging strategy according to the service access and perform charging.
In one embodiment, the service access further comprises a user identifier and/or time, so that the application server selects the usage policy of the charging policy according to the information in the service access.
According to a third aspect of the embodiments of the present invention, there is provided a traffic charging method, including: the application server receives service access sent by the terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier; the application server selects a use strategy of the charging strategy according to the information in the service access; and the application server sends a service response corresponding to the service access to the charging network element, wherein the service response comprises a use strategy identifier corresponding to the use strategy of the charging strategy, so that the charging network element charges the application corresponding to the service provider identifier according to the charging strategy identifier and the use strategy identifier thereof.
In one embodiment, the usage policy identification is a token, and includes a token identification, a service provider identification, and a charging policy identification, and further includes a token validity period and/or a traffic cap value.
In one embodiment, the application server receives a token generated by a usage policy request according to a charging policy sent by an operator management platform, and stores the token.
According to a fourth aspect of the embodiments of the present invention, there is provided a traffic charging apparatus, including: the service access receiving module is used for receiving service access sent by the terminal, and the service access comprises a charging strategy identifier and a service provider identifier; the service access analysis module is used for analyzing service access; the service access forwarding module is used for forwarding the service access to the application server when the started charging flow is a value-added charging flow so that the application server can select a use strategy of the charging strategy according to the information in the service access; the service response receiving module is used for receiving a service response which is sent by the application server and corresponds to the service access, and the service response comprises a use strategy identifier which corresponds to a use strategy of the charging strategy; the service response analysis module is used for analyzing the service response and acquiring the use strategy identifier; and the charging module is used for starting a charging process according to the content accessed by the service and also used for charging the application corresponding to the service provider identifier according to the charging policy identifier and the use policy identifier thereof.
In one embodiment, the service access analysis module comprises an identification acquisition unit and a value added service judgment unit; the identification obtaining unit is used for obtaining a charging strategy identification and a service provider identification; the value added service judging unit is used for judging whether the service request is a value added service request or not according to the service provider identifier; when the service request is a value-added service request, the charging module is used for starting a value-added charging process; and when the service request is not a value-added service request, the charging module is used for starting a common charging process.
In one embodiment, the usage policy identification is a token, and includes a token identification, a service provider identification, and a charging policy identification, and further includes a token validity period and/or a traffic cap value.
In one embodiment, the token is an encrypted token; the service response analysis module is used for decrypting the encrypted token by adopting a preset secret key; if the service response analysis module successfully analyzes and authenticates the token, the charging module is used for continuing the value-added charging process; otherwise, the charging module is used for converting the started value-added charging process into a common charging process.
In one embodiment, the service response analysis module is used for analyzing the service response to obtain the token validity period or the capping value; if the token is not expired or the flow rate does not exceed the capping value, the charging module is used for continuing the value-added charging process; if the token is expired or the flow rate exceeds the top-cover value, the charging module is used for converting the started value-added charging flow into a common charging flow.
In one embodiment, the system further comprises a ticket generating module, configured to generate a ticket according to the charging result, where the ticket has the token identifier.
According to a fifth aspect of the embodiments of the present invention, there is provided a terminal for charging traffic, including: the charging policy determining module is used for determining a charging policy identifier according to the orientation condition, wherein the orientation condition comprises the current time, the target content and/or the user identifier; and the service access sending module is used for sending service access to the flow charging equipment, wherein the service access comprises a charging strategy identifier and a service provider identifier, so that the flow charging equipment and the application server can select a use strategy of the charging strategy according to the service access and carry out charging.
In one embodiment, the service access further comprises a user identifier and/or time, so that the application server selects the usage policy of the charging policy according to the information in the service access.
According to a sixth aspect of the embodiments of the present invention, there is provided an application server for traffic charging, including: the service access acquisition module is used for receiving service access sent by the terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier; the service policy selection module is used for selecting a service policy of the charging policy according to the information in the service access; and the service response sending module is used for sending a service response corresponding to the service access to the flow charging equipment, wherein the service response comprises a use strategy identifier corresponding to the use strategy of the charging strategy, so that the flow charging equipment can charge the application corresponding to the service provider identifier according to the charging strategy identifier and the use strategy identifier thereof.
In one embodiment, the usage policy identifier is a token, and includes a token identifier, a service provider identifier, and a charging policy identifier, and further includes a token validity period and/or a traffic cap value; the application server also comprises a token storage module used for receiving a token generated according to the use strategy request of the charging strategy and sent by the operator management platform and storing the token;
according to a seventh aspect of the embodiments of the present invention, there is provided a traffic charging system, including: any one of the foregoing flow charging devices, any one of the foregoing terminals, and any one of the foregoing application servers.
The method is characterized in that a terminal is adopted to send service access carrying a charging strategy, an application server selects a use strategy of the charging strategy according to the service access and sends the use strategy to a charging network element, so that an OTT service provider is supported to dynamically formulate the use strategy of the charging strategy, and the requirements of flexible charging and operation on demand of the application are met.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating an embodiment of a traffic charging method according to the present invention.
Fig. 2 is a schematic structural diagram of an embodiment of the traffic charging system of the present invention.
Fig. 3 is a schematic structural diagram of an embodiment of the traffic charging apparatus of the present invention.
Fig. 4 is a schematic structural diagram of an embodiment of a terminal for charging traffic according to the present invention.
Fig. 5 is a schematic structural diagram of an embodiment of an application server for traffic charging according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A flow charging method according to an embodiment of the present invention is described below with reference to fig. 1.
Fig. 1 is a flowchart of an embodiment of a traffic charging method according to the present invention. As shown in fig. 1, the method of this embodiment includes:
step S102, the terminal selects a charging strategy and determines a charging identifier corresponding to the charging strategy.
The terminal may determine the charging policy identifier according to a targeting condition, where the targeting condition includes one or more of a current time, a target content, and a user identifier. The operator or OTT service provider can divide the time period of a day into busy time, idle time and other time periods, so that different charging strategies can be adopted in different time periods according to the current time. The target content corresponds to a plurality of sub-sections of the OTT application, and because the content provided by each section may have differences, a corresponding charging policy may be adopted according to the target content. The user identification can correspond to different user levels or user privileges, so that differentiated charging is carried out corresponding to different charging strategies.
Step S104, the terminal sends service access to the charging network element, and the service access comprises a charging strategy identifier and a service provider identifier.
And step S106, the charging network element analyzes the service access and starts a charging process according to the content of the service access.
Step S108, if the value-added charging process is started, the charging network element forwards the service access to the application server.
Step S110, the application server selects the use strategy of the charging strategy according to the information in the service access.
The service access can also comprise user identification and/or time, so that the application server selects the use policy of the charging policy according to the information in the service access. In addition to the terminal adjusting the charging policy according to the user information and the time information, the application server may also select a specific usage policy corresponding to the charging policy according to the information. For example, if the user initiating the service access is a new user, and if the OTT service provider gives a free preference to the new user registered within a certain period, the usage policy of the charging policy may include a preference identifier, so that the charging network element does not charge the access after receiving the service response sent by the application server, thereby further improving the flexibility of charging.
Step S112, the application server sends a service response corresponding to the service access to the charging network element, where the service response includes a usage policy identifier corresponding to the usage policy of the charging policy.
Step S114, the charging network element analyzes the service response and obtains the use strategy identification.
Step S116, the charging network element charges the application corresponding to the service provider identifier according to the charging policy identifier and the usage policy identifier thereof.
The method is characterized in that a terminal is adopted to send service access carrying a charging strategy, an application server selects a use strategy of the charging strategy according to the service access and sends the use strategy to a charging network element, so that an OTT service provider is supported to dynamically formulate the use strategy of the charging strategy, and the requirements of flexible charging and operation on demand of the application are met.
After the charging is finished, the charging network element can also generate a ticket according to the charging result, and the ticket has the token identifier. The ticket with the token identifier can facilitate account checking between the OTT service provider and the operator.
In practical use, traffic generated by OTT applications and traffic generated by non-OTT applications may traverse the same path in the network, i.e. the non-OTT applications may also traverse the charging network element, and the specific charging methods for the two applications may be different. In order to distinguish the flow generated by the two types of applications, the following method can be specifically adopted: the charging network element analyzes the service access and acquires a charging strategy identifier and a service provider identifier; the charging network element judges whether the service request is a value-added service request according to the service provider identifier, and if the service request is the value-added service request, the charging network element starts a value-added charging process; if the service request is not a value added service request, the charging network element starts a common charging process. Therefore, the charging network element can distinguish the traffic generated by the OTT application from the traffic generated by the non-OTT application and adopt a corresponding method for charging.
In the foregoing embodiments, the usage policy identifier may specifically be a token, and the token may include a token identifier, a service provider identifier, and a charging policy identifier, and may further include at least one of a token validity period and a traffic capping value. Thus, the charging network element may perform charging according to the respective content in the token.
By using a token, a security check can be performed. Specifically, the token may be an encrypted token, and the charging network element side stores a key for decrypting the token in advance. After receiving the service response, the charging network element may decrypt the encrypted token with the key, and parse and authenticate the decrypted token, where the authenticated content may include one or more of a token identifier, a service provider identifier, and a charging policy identifier included in the token. If the authentication is successful, it indicates that the token represents the correct usage policy, and the OTT service provider is willing to pay for this access, the charging network element may continue the value-added charging procedure. If the authentication is unsuccessful, it indicates that the key stored by the charging network element does not correspond to the latest usage policy, or the token sent by the application server is a fake token, which has a security risk, and the charging network element will convert the started value-added charging flow into a common charging flow. By adopting the method, the safety of the method is ensured, and the loss can be avoided for OTT service providers.
The token validity period and the traffic capping value may also be used to adjust the specific usage of the charging policy. And after receiving the service response, the charging network element acquires the valid period or the capping value of the token. If the token is not expired or the flow rate does not exceed the capping value, the charging network element continues to perform the value-added charging process; if the token is expired or the flow rate exceeds the capping value, the charging network element converts the started value-added charging flow into a common charging flow. By adopting the method, the application server has more flexible adjustment space so as to control the final charging result.
Since the OTT service provider may frequently adjust the usage policy of the charging policy, a corresponding new token needs to be generated according to the new usage policy. The OTT service provider can provide a use strategy request of the charging strategy to the operator management platform, and the operator management platform generates a corresponding token according to the request and sends the token to the application server. In the process, the charging network element does not need to be additionally configured and changed, so that the OTT service provider can flexibly adjust the charging strategy. In addition, during application, an operator can require an OTT service provider to provide an application password, security verification is carried out according to the password, and after the password passes verification, the operator generates a token for the OTT service provider, so that the security of the application process is ensured.
A flow charging system according to an embodiment of the present invention is described below with reference to fig. 2.
Fig. 2 is a structural diagram of an embodiment of the traffic charging system of the present invention. As shown in fig. 2, the system of this embodiment includes a traffic accounting device 22, a terminal 24, and an application server 26. The following describes each device in the system.
A flow rate charging apparatus according to an embodiment of the present invention is described below with reference to fig. 3.
Fig. 3 is a structural diagram of an embodiment of the flow rate charging apparatus of the present invention. As shown in fig. 3, the traffic charging apparatus 22 of this embodiment includes: a service access receiving module 322, configured to receive a service access sent by a terminal, where the service access includes a charging policy identifier and a service provider identifier; a service access parsing module 324 for parsing the service access; the service access forwarding module 326 is configured to, when the started charging flow is a value-added charging flow, forward the service access to the application server 26 by using the service access forwarding module 326, so that the application server 26 selects a usage policy of the charging policy according to information in the service access; a service response receiving module 328, configured to receive a service response sent by the application server 26 and corresponding to the service access, where the service response includes a usage policy identifier corresponding to a usage policy of the charging policy; the service response analyzing module 330 is configured to analyze the service response and obtain a usage policy identifier; the charging module 332 is configured to start a charging process according to the content of the service access, and further configured to charge an application corresponding to the service provider identifier according to the charging policy identifier and the usage policy identifier thereof.
The service access analysis module 324 may include an identifier obtaining unit and a value added service determining unit; the identification obtaining unit is used for obtaining a charging strategy identification and a service provider identification; the value added service judging unit is used for judging whether the service request is a value added service request or not according to the service provider identifier; when the service request is a value added service request, the charging module 332 is configured to start a value added charging process; when the service request is not a value added service request, the charging module 332 is configured to start a normal charging process.
The usage policy identifier may be a token, and includes a token identifier, a service provider identifier, and a charging policy identifier, and further includes a token validity period and/or a traffic capping value.
Wherein the token may be an encrypted token; the service response parsing module 330 may be configured to decrypt the encrypted token with a preset key; if the service response analysis module 330 successfully analyzes and authenticates the token, the charging module 332 may be configured to continue the value-added charging process; otherwise, the charging module 332 may be configured to convert the started value-added charging process into a normal charging process.
The service response analyzing module 330 may also be configured to analyze the service response to obtain a token validity period or a capping value; if the token is not expired, or the traffic does not exceed the capping value, the charging module 332 may be configured to continue the value-added charging procedure; if the token has expired or the traffic has exceeded the cap value, the billing module 332 may be configured to convert the initiated value-added billing procedure to a normal billing procedure.
In addition, the device can also comprise a ticket generating module for generating a ticket according to the charging result, wherein the ticket has the token identifier.
A terminal for traffic charging according to an embodiment of the present invention is described below with reference to fig. 4.
Fig. 4 is a structural diagram of an embodiment of a terminal for traffic charging according to the present invention. As shown in fig. 4, the terminal 24 for traffic charging of the embodiment includes: a charging policy determining module 442, configured to determine a charging policy identifier according to a targeting condition, where the targeting condition includes a current time, a target content, and/or a user identifier; and a service access sending module 444, configured to send a service access to the traffic charging apparatus 22, where the service access includes a charging policy identifier and a service provider identifier, so that the traffic charging apparatus 22 and the application server 26 select a usage policy of the charging policy according to the service access and perform charging.
In one embodiment, the service access also includes a user identification and/or a time for the application server 26 to select a usage policy for the billing policy based on information in the service access.
An application server for traffic charging according to an embodiment of the present invention is described below with reference to fig. 5.
Fig. 5 is a block diagram of an embodiment of an application server for traffic charging according to the present invention. As shown in fig. 5, the application server 26 of this embodiment includes: a service access obtaining module 562, configured to receive a service access sent by the terminal 24, where the service access includes a charging policy identifier and a service provider identifier; a usage policy selection module 564, configured to select a usage policy of the charging policy according to the information in the service access; a service response sending module 566, configured to send a service response corresponding to the service access to the traffic charging device 22, where the service response includes a usage policy identifier corresponding to the usage policy of the charging policy, so that the traffic charging device 22 charges an application corresponding to the service provider identifier according to the charging policy identifier and the usage policy identifier thereof.
The usage policy identifier may be a token, and includes a token identifier, a service provider identifier, a charging policy identifier, a token validity period, and/or a traffic capping value; the application server 26 may further include a token storage module for receiving a token generated according to the usage policy request of the billing policy sent by the operator management platform and storing the token.
Furthermore, the method according to the invention may also be implemented as a computer program product comprising a computer readable medium having stored thereon a computer program for performing the above-mentioned functions defined in the method of the invention. Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (26)

1. A traffic charging method is characterized by comprising the following steps:
a charging network element receives a service access sent by a terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier;
the charging network element analyzes the service access and starts a charging process according to the content of the service access;
if the value-added charging process is started, the charging network element forwards the service access to an application server so that the application server can select a use strategy of a charging strategy according to the information in the service access;
a charging network element receives a service response which is sent by the application server and corresponds to the service access, wherein the service response comprises a use strategy identifier which corresponds to a use strategy of the charging strategy, and the use strategy identifier is a token and comprises a token identifier, a service provider identifier and a charging strategy identifier;
the charging network element analyzes the service response to obtain the use strategy identification;
and the charging network element charges the application corresponding to the service provider identifier according to the charging strategy identifier and the use strategy identifier thereof.
2. The method of claim 1, wherein the analyzing the service access by the charging network element and starting a charging process according to the content of the service access comprises:
the charging network element analyzes the service access to obtain the charging strategy identification and the service provider identification;
the charging network element judges whether the service request is a value-added service request according to the service provider identifier, and if the service request is the value-added service request, the charging network element starts a value-added charging process; and if the service request is not a value-added service request, the charging network element starts a common charging process.
3. The method of claim 1, wherein the token in the usage policy identification further comprises a token validity period and/or a traffic capping value.
4. The method of claim 3, wherein the token is an encrypted token;
the charging network element analyzes the service response, acquires the use strategy identifier, and performs charging including:
the charging network element decrypts the encrypted token by adopting a preset secret key, and if the charging network element successfully analyzes and authenticates the token, the charging network element continues to perform a value-added charging process; otherwise, the charging network element converts the started value-added charging flow into a common charging flow.
5. The method of claim 3, wherein when the token includes a token validity period, the charging network element parses the service response, obtains the usage policy identifier, and performs charging includes:
the charging network element analyzes the service response, obtains the validity period of the token, and if the token is not expired, the charging network element continues to perform the value-added charging process; if the token is expired, the charging network element converts the started value-added charging flow into a common charging flow.
6. The method of claim 3, wherein when the token includes a capping value, the charging network element parses the service response, obtains the usage policy identifier, and performs charging includes:
the charging network element analyzes the service response to obtain a capping value, and for the flow which does not exceed the capping value, the charging network element continues to carry out a value-added charging process; and for the flow exceeding the capping value, the charging network element converts the started value-added charging flow into a common charging flow.
7. The method of claim 1, further comprising:
the terminal determines the charging policy identifier according to the orientation condition, wherein the orientation condition comprises the current time, the target content and/or the user identifier.
8. The method of claim 3, further comprising:
and the charging network element generates a ticket according to the charging result, wherein the ticket has a token identifier.
9. The method of claim 3, further comprising:
and the operator management platform generates a corresponding token according to the use policy request of the charging policy and sends the token to the application server.
10. The method according to claim 1, wherein the service access further comprises a user identifier and/or a time, so that the application server selects a usage policy of the charging policy according to the information in the service access.
11. A traffic charging method is characterized by comprising the following steps:
the terminal determines a charging policy identifier according to an orientation condition, wherein the orientation condition comprises current time, target content and/or a user identifier;
and the terminal sends service access to the charging network element, wherein the service access comprises a charging strategy identifier and a service provider identifier, so that the charging network element and the application server can select a use strategy of a charging strategy according to the service access and carry out charging, and the use strategy identifier corresponding to the use strategy is a token and comprises the token identifier, the service provider identifier and the charging strategy identifier.
12. The method according to claim 11, wherein the service access further comprises a user identifier and/or a time, so that the application server selects a usage policy of the charging policy according to the information in the service access.
13. A traffic charging method is characterized by comprising the following steps:
an application server receives a service access sent by a terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier;
the application server selects a use strategy of a charging strategy according to the information in the service access;
and the application server sends a service response corresponding to the service access to a charging network element, wherein the service response comprises a use strategy identifier corresponding to the use strategy of the charging strategy, so that the charging network element charges the application corresponding to the service provider identifier according to the charging strategy identifier and the use strategy identifier thereof, and the use strategy identifier is a token and comprises a token identifier, a service provider identifier and a charging strategy identifier.
14. The method of claim 13, wherein the token in the usage policy identification further comprises a token validity period and/or a traffic capping value.
15. The method of claim 14, wherein the application server receives a token generated according to the usage policy request of the charging policy and sent by the operator management platform, and stores the token.
16. A traffic charging apparatus, comprising:
the service access receiving module is used for receiving service access sent by a terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier;
the service access analysis module is used for analyzing the service access;
the service access forwarding module is used for forwarding the service access to the application server when the started charging flow is a value-added charging flow, so that the application server can select a use strategy of a charging strategy according to the information in the service access;
a service response receiving module, configured to receive a service response corresponding to the service access sent by the application server, where the service response includes a usage policy identifier corresponding to a usage policy of the charging policy, where the usage policy identifier is a token and includes a token identifier, a service provider identifier, and a charging policy identifier;
the service response analyzing module is used for analyzing the service response and acquiring the use strategy identifier;
and the charging module is used for starting a charging process according to the content accessed by the service and also used for charging the application corresponding to the service provider identifier according to the charging policy identifier and the use policy identifier thereof.
17. The device according to claim 16, wherein the service access resolution module comprises an identifier obtaining unit and a value added service judging unit;
the identifier obtaining unit is configured to obtain the charging policy identifier and the service provider identifier;
the value added service judging unit is used for judging whether the service request is a value added service request according to the service provider identifier;
when the service request is a value added service request, the charging module is used for starting a value added charging process; and when the service request is not a value added service request, the charging module is used for starting a common charging process.
18. The apparatus of claim 16, wherein the token in the usage policy identification further comprises a token validity period and/or a traffic capping value.
19. The apparatus of claim 18, wherein the token is an encrypted token;
the service response analysis module is used for decrypting the encrypted token by adopting a preset secret key;
if the service response analysis module successfully analyzes and authenticates the token, the charging module is used for continuing the value-added charging process; otherwise, the charging module is used for converting the started value-added charging process into a common charging process.
20. The device of claim 18, wherein the business response parsing module is configured to parse the business response to obtain a token validity period or a capping value;
if the token is not expired or the flow rate does not exceed the capping value, the charging module is used for continuing the value-added charging process; and if the token is expired or the flow rate exceeds the top capping value, the charging module is used for converting the started value-added charging flow into a common charging flow.
21. The device of claim 16, further comprising a ticket generating module, configured to generate a ticket according to a charging result, where the ticket has a token identifier.
22. A terminal for charging for traffic, comprising:
the charging policy determining module is used for determining a charging policy identifier according to a directional condition, wherein the directional condition comprises current time, target content and/or a user identifier;
and the service access sending module is used for sending service access to the flow charging equipment, wherein the service access comprises a charging strategy identifier and a service provider identifier, so that the flow charging equipment and the application server can select a use strategy of a charging strategy according to the service access and carry out charging, and the use strategy identifier corresponding to the use strategy is a token and comprises the token identifier, the service provider identifier and the charging strategy identifier.
23. The terminal according to claim 22, characterized in that the service access further comprises a user identifier and/or a time, so that the application server selects a usage policy of the charging policy according to the information in the service access.
24. An application server for charging for traffic, comprising:
the service access acquisition module is used for receiving service access sent by a terminal, wherein the service access comprises a charging strategy identifier and a service provider identifier;
the service policy selection module is used for selecting a service policy of the charging policy according to the information in the service access;
and the service response sending module is used for sending a service response corresponding to the service access to the traffic charging equipment, wherein the service response comprises a use policy identifier corresponding to the use policy of the charging policy, so that the traffic charging equipment charges the application corresponding to the service provider identifier according to the charging policy identifier and the use policy identifier thereof, and the use policy identifier is a token and comprises a token identifier, a service provider identifier and a charging policy identifier.
25. The application server of claim 24, wherein the token in the usage policy identification further comprises a token validity period and/or a traffic capping value;
the application server also comprises a token storage module used for receiving the token generated according to the use strategy request of the charging strategy and sent by the operator management platform and storing the token.
26. A traffic charging system, comprising:
the traffic charging apparatus of any one of claims 16-21,
the terminal according to claim 22 or 23,
and, an application server as claimed in claim 24 or 25.
CN201511016855.4A 2015-12-29 2015-12-29 Flow charging method and system and related equipment Active CN106936600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511016855.4A CN106936600B (en) 2015-12-29 2015-12-29 Flow charging method and system and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511016855.4A CN106936600B (en) 2015-12-29 2015-12-29 Flow charging method and system and related equipment

Publications (2)

Publication Number Publication Date
CN106936600A CN106936600A (en) 2017-07-07
CN106936600B true CN106936600B (en) 2020-04-10

Family

ID=59441481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511016855.4A Active CN106936600B (en) 2015-12-29 2015-12-29 Flow charging method and system and related equipment

Country Status (1)

Country Link
CN (1) CN106936600B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493176B (en) * 2017-09-25 2019-08-27 中国联合网络通信集团有限公司 A kind of charging method and system
CN107483217B (en) * 2017-09-25 2019-11-08 中国联合网络通信集团有限公司 A kind of online charging method and system
CN108632480A (en) * 2018-04-19 2018-10-09 北京阿尔山金融科技有限公司 Charging method based on block chain and device
CN109587642B (en) * 2018-12-14 2020-12-22 中国联合网络通信集团有限公司 Charging method and device
EP4122159A4 (en) * 2020-03-17 2023-05-10 Telefonaktiebolaget LM Ericsson (publ) Methods and systems for charging using management information
CN113517988B (en) * 2021-04-13 2024-01-26 北京思特奇信息技术股份有限公司 Method and system for scheduling charging flow based on dynamic scene

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101668098A (en) * 2009-09-01 2010-03-10 中兴通讯股份有限公司 Value-added service charging method and charging system
CN101754163A (en) * 2008-12-08 2010-06-23 中国移动通信集团吉林有限公司 Value-added service charging method, system and device
CN102098649A (en) * 2010-12-09 2011-06-15 成都市华为赛门铁克科技有限公司 Method, device and system for processing value added service based on policy and charging control system
CN102143467A (en) * 2010-08-25 2011-08-03 华为技术有限公司 Method, device and system for implementing charging
CN104463639A (en) * 2014-12-27 2015-03-25 华为软件技术有限公司 Business implementation method and business operation platform

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140160990A1 (en) * 2012-09-20 2014-06-12 Telecommunication Systems, Inc. Mechanisms for Quality of Service to Over the Top Applications for Use in Commercial Wireless Networks
US9088904B2 (en) * 2013-04-10 2015-07-21 Verizon Patent And Licensing Inc. Bundled charging for over-the-top and hosted services in IP wireless networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754163A (en) * 2008-12-08 2010-06-23 中国移动通信集团吉林有限公司 Value-added service charging method, system and device
CN101668098A (en) * 2009-09-01 2010-03-10 中兴通讯股份有限公司 Value-added service charging method and charging system
CN102143467A (en) * 2010-08-25 2011-08-03 华为技术有限公司 Method, device and system for implementing charging
CN102098649A (en) * 2010-12-09 2011-06-15 成都市华为赛门铁克科技有限公司 Method, device and system for processing value added service based on policy and charging control system
CN104463639A (en) * 2014-12-27 2015-03-25 华为软件技术有限公司 Business implementation method and business operation platform

Also Published As

Publication number Publication date
CN106936600A (en) 2017-07-07

Similar Documents

Publication Publication Date Title
CN106936600B (en) Flow charging method and system and related equipment
JP6612358B2 (en) Method, network access device, application server, and non-volatile computer readable storage medium for causing a network access device to access a wireless network access point
EP2854433B1 (en) Method, system and related device for realizing virtual sim card
US8078870B2 (en) HTTP-based authentication
CN107690771B (en) Method, device and system for certificate management
US9098678B2 (en) Streaming video authentication
CN101647254B (en) Method and system for the provision of services for terminal devices
US8347403B2 (en) Single point authentication for web service policy definition
US9361465B2 (en) Privacy-enhanced car data distribution
US20130283040A1 (en) Method, system and device for binding and operating a secure digital memory card
EP2207301A1 (en) An authentication method for request message and the apparatus thereof
CN102685086A (en) File access method and system
CN108512845B (en) Interface calling verification method and device
CN111246477B (en) Access method, terminal, micro base station and access system
EP2320622B1 (en) Report form normalization processing method, apparatus and system
CN101557590A (en) Safety verifying method, system and device for connection of mobile terminal into network
CN107852603A (en) The method and apparatus of terminal authentication
EP1737201A1 (en) A method for the safe protecting of the user card
CN103428176A (en) Mobile user accessing mobile Internet application method and system and application server
CN110418345B (en) Identity authentication method and device and computer equipment
CN109379344B (en) Authentication method and authentication server for access request
CN106487776B (en) Method, network entity and system for protecting machine type communication equipment
CN113079506A (en) Network security authentication method, device and equipment
CN117915316A (en) Authentication method, authentication device, electronic equipment and storage medium
CN114629672A (en) Method, system and storage medium for improving security of voice call based on token authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant