WO2001078317A1 - Procede et systeme de chargement de donnees - Google Patents
Procede et systeme de chargement de donnees Download PDFInfo
- Publication number
- WO2001078317A1 WO2001078317A1 PCT/JP2000/002188 JP0002188W WO0178317A1 WO 2001078317 A1 WO2001078317 A1 WO 2001078317A1 JP 0002188 W JP0002188 W JP 0002188W WO 0178317 A1 WO0178317 A1 WO 0178317A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- information
- billing
- user
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/22—Bandwidth or usage-sensitve billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/32—Involving wireless systems
Definitions
- the present invention relates to overnight charging technology, and more particularly, to overnight charging associated with data communication using an information network by an information communication terminal such as a mobile phone or a personal computer and access to information resources on the information network. It relates to technology that is effective when applied to processing. Background art
- a packet For example, in data communication over an information network such as the Internet, data is transmitted and received between computers in a data format called a packet.
- a passing packet amount charging type that charges the packet quantity (data amount)
- a connection time charging type that charges the usage time.
- content used from a mobile terminal such as a computer, a mobile phone, or PHS (Personal Handy Phone System PDA).
- Communication charges are not classified according to the purpose of use (hereinafter referred to as the purpose of use) such as e-mail and VoI P (Voice Over IP).
- the present invention provides a data billing method for billing according to the amount of data on an information network transmitted and received by a user using an information communication terminal, wherein the amount of data is classified for each purpose of use of the data. By summing up the data, billing is performed for each purpose of use.
- the present invention relates to a data billing system for billing according to the amount of data on an information network exchanged by a user using an information communication terminal,
- Network segments connected to the information network are connected to the information network
- Data communication path control means for fixing a data transfer path for a specific user so as to pass through a network segment
- First data collection means for collecting first information about data passing through the network segment, including the amount of the data
- Second data collection means for collecting second information capable of specifying the purpose of use of data passing through the network segment by each user
- Charging information generating means for generating charging information on data for each purpose of use based on the first and second information
- a network segment is prepared in an information network, and the following various functions are installed in the network segment.
- the functions installed in the network segment include the function of collecting packets passing through the network segment (hereinafter referred to as the packet collection function), and the identification of users from mobile terminals and computers.
- Authentication function hereinafter referred to as authentication function
- a menu function for navigating the mobile terminal or computer user after authentication, and forcing all data communication after authentication to pass through this network segment.
- There is a function to specify the purpose of use hereinafter referred to as a data communication path fixing function
- a function to generate charging information hereinafter referred to as a charging information generation function).
- the user is required to communicate with the network segment so that data communication from the mobile terminal and the computer is performed via the network segment of the present invention. Notify the purpose of using the authentication function of the client. In other words, a user who wants a service in the public / private area of the data communication fee will always be informed that authentication by the authentication function of this network segment is required.
- the menu function displays a menu according to the frequency of use of a user who has succeeded in authentication and prompts the user to use the menu.
- this is not an essential function of the present invention.
- the data communication path fixing function ensures that the data communication performed by the user goes through this network segment.
- the purpose of use used by the user is recorded (hereinafter referred to as communication record).
- all the data passing through this network segment is constantly recorded by the packet collection function (hereinafter, this is referred to as packet recording).
- the billing information for realizing the pay-per-use billing for each purpose of use is generated from the communication record and the packet record according to the data billing technique of the present invention.
- the total of the communication charges incurred for each service of the destination is calculated, and the information charges for each service for the purpose of use can be added to each.
- the charge unit and unit price of both communication charges and information charges can be freely set at any time.
- the information obtained by the packet collection function and the data communication path fixing function enables the information provider to be provided with information on users who have accessed the information resources provided by the information provider.
- PUSH-type marketing such as presenting specific information and services to specific users, becomes possible.
- it can provide information providers with information on usage status that is effective for marketing management, such as which usage destinations have much usage.
- FIG. 1 is a conceptual diagram showing an example of an overall configuration of a data charging system for implementing a data charging method according to an embodiment of the present invention.
- FIG. 2 is a conceptual diagram showing an example of a configuration of a overnight charging system for implementing a data charging method according to an embodiment of the present invention.
- FIG. 3 is a conceptual diagram showing an example of the operation of a data charging method and a data charging system according to an embodiment of the present invention.
- FIG. 4 is a conceptual diagram showing an example of the operation of a data charging method and a data charging system according to an embodiment of the present invention.
- FIG. 5 is a conceptual diagram showing an example of the operation of a data charging method and a data charging system according to an embodiment of the present invention.
- FIG. 6 is a flowchart showing an example of the operation of the data billing method and the overnight billing system according to one embodiment of the present invention.
- FIG. 7 is a flowchart showing an example of the operation of the data billing method and the overnight billing system according to one embodiment of the present invention.
- FIG. 8 is an explanatory diagram showing an example of a menu screen used in the data charging method and the data charging system according to one embodiment of the present invention.
- FIG. 9 is a block diagram showing an example of the operation of the data charging method and the data charging system according to one embodiment of the present invention.
- FIG. 10 is a block diagram showing an example of the operation of the data charging method and the data charging system according to one embodiment of the present invention.
- FIG. 11 is a block diagram showing an example of a configuration of a data charging method and a data charging system according to another embodiment of the present invention.
- FIG. 12 is a flowchart showing an example of the operation of a data charging method and a data charging system according to another embodiment of the present invention.
- FIG. 1 is a data billing system for implementing a data overnight billing method according to an embodiment of the present invention.
- FIG. 2 is a conceptual diagram showing an example of the overall configuration of the system, and
- FIG. 2 is a conceptual diagram showing an example of the configuration of a data charging system that implements a data payment method according to the present embodiment.
- FIGS. 3, 4 and 5 are conceptual diagrams showing an example of the operation of the data charging method and the data charging system according to the present embodiment
- FIGS. 6 and 7 are diagrams showing a data charging method according to the present embodiment
- FIG. 8 is a flowchart showing an example of the operation of the data charging system.
- FIG. 8 is an explanatory diagram showing an example of a menu used in the data charging method and the overnight charging system according to the present embodiment.
- FIG. 5 is a block diagram showing an example of the operation of the data charging method and the data charging system according to the first embodiment.
- a WWW constructed with HTT P (Hyper Text Transfer Protocol 1) on an Internet using a TCP / IP communication protocol is used.
- HTT P Hyper Text Transfer Protocol 1
- TCP / IP communication protocol IP
- a URL Uniif rm Resource Locator
- each user is referred to by the URL in this embodiment.
- the case of identifying the purpose of use is explained as an example.
- a network segment that is always used by a user is installed in order to enable a charging process as described below.
- This is realized as a network segment that can be connected or communicated with the Internet and various network providers.
- data that is not subject to data billing in the present embodiment is designed not to pass through this network at all. The above conditions can be satisfied by installing only a hardware that realizes each function of the present embodiment and the minimum necessary network devices in the network segment.
- the user operates via an information communication terminal 100 such as a portable terminal 101 or a personal computer 102 (hereinafter simply referred to as a computer 102).
- 201 and via this network segment 201, the internal content server 202 within the network segment 201, the external content server 301 within the Internet 300, and the intranet It is configured to access information resources such as the content server 410 in 400.
- the data charging system 200 of the present embodiment includes an authentication function 200a, a menu function 200b, a data communication path fixing function 200c, a packet collection function 200d, and a charge information generation function 200e. , And etc.
- Each function such as is composed of a computer system and computer software, as well as network equipment, but the number of units and the operating system of the computer are arbitrary.
- FIG. 2 shows a more detailed configuration example of the network segment 201 included in the data charging system 200 of the present embodiment.
- a computer (not shown) that realizes the functions of the authentication function 200a to the charging information generation function 200e is an Ethernet hub 2
- LAN Local Area Ne two rk
- a user management database 203 is connected to the authentication function 200 a and the menu function 200 b.
- User Management Data Base 203 has user information 203 a, user code 203 b, password 203 c, login ID 203 d, terminal
- a communication record database 204 is connected to the data communication path fixing function 200c, and communication records collected by the data communication path fixing function 200c are stored. That is, the communication record database 204 stores the date and time 204 a, the source IP address 204 b, the source TCP port number 204 c, the terminal ID 204 d, and the URL. 204 e, public / private distinction flag 204 f, etc.
- the packet collection function 200 d includes a packet counter 205 and a packet collection database 206.
- the packet collection database 206 has a destination IP address 206 a, a source IP address 206 b, a destination TCP port number 206 c, a source TCP port number 206 d, a sequence number 206 e, and an identification number.
- Information such as 206 f, offset flag 206 g, date and time 206 h, and data size 206 i is stored.
- the packet collection function 200d collects and records all the packets passing through the network segment 201 of the present embodiment and all the packets generated in the network segment 201. What is recorded is all the information contained in the packet (IP packet in the Ethernet frame). Important items are the destination IP address 206 a, the source IP address 206 b, the destination TCP port number 206 c, the source TCP port number 206 d, the sequence number 206 e, and the identification number 206 f. , Offset flag 206 g, date / time 206 h, data size 206 i, etc., all of which are information contained in standardized IP packets in Ethernet frames. A packet record that records all the information included in the packet is generated and stored in the packet collection database 206.
- the source IP address 206 b, source TCP port number 206 d, destination IP address 206 a, and destination TCP port number 206 c are the data communication path fixed function. It is used to identify the user by comparing it with the communication record stored in the communication record database 204 generated in 200c. Sequence number 206 e, identification number 206 f, offset flag 206 g, date time 206 h, data size 206 i is a packet generated when one purpose of use (URL) is used. Used to determine the total and the total size of the data.
- URL purpose of use
- the user of the information communication terminal 100 such as the portable terminal 101 or the computer 102 is specified by the authentication function 200a.
- issue login ID 203 d and password 203 c in advance and notify users. In addition, users will need Notify the URL of No. 200a.
- the user When connecting to the network segment 201, the user always authenticates with the login ID and password using the authentication function 200a.
- Information on the login ID 203d and the passcode 203c is stored in the user management database 203. If the unique terminal ID 203 e incorporated in the information communication terminal 100 such as the portable terminal 101 or the computer 102 can be obtained, it is used for authentication at the same time. In that case, the information of the terminal ID 203 e is also stored in the user management database 203.
- the success or failure of the authentication is notified to the menu function 200b. If successful, control transfers to menu function 20 Ob. If the authentication fails, the user is urged to perform the authentication again within the limited number of times. However, if the number of failed times is exceeded, the user is stopped.
- the ID information of the user who has been authenticated here is also used for public / private classification processing when creating a communication bill by the charging information generation function 200 e as necessary.
- a login ID and a password input field are displayed on the information communication terminal 100 such as the portable terminal 101 or the computer 102, and the user is required to input the login ID and the passcode. If the authentication is successful, the control moves to menu function 200b. If authentication fails, a message to that effect, its cause, and the input fields for the login ID and pass password are displayed again. If the number of failed attempts exceeds the limit, the login ID is locked (unusable) and the authentication of the user itself is disabled.
- a menu 500 (for example, FIG. 8) corresponding to the user is displayed to restrict the operation of the information communication terminal 100 such as the computer 102 and the mobile terminal 101, Fix the purpose of use that can be used. Which menu is to be displayed for each user is registered in advance in the menu information 203 h of the user management database 203. If the authentication fails, it communicates with the authentication function 200a to confirm that the number of failures is within the limit, and causes the authentication to be performed again. If the number of times exceeds the limit, the user is informed of that and the use is stopped.
- user information is obtained from the authentication function 200a, and a menu 500 suitable for the organization to which the user belongs is transmitted to the mobile terminal 101 or computer 102 or the like. It is displayed on the communication terminal 100.
- the URL specified by the selected menu item is physically referenced by referring to the menu information 203h stored in the user management database 203. It is determined whether it is inside or outside this network segment 201.
- the data communication Even if the information resource specified by the specified URL is outside the network segment 201, the data communication always goes through the network segment 201 by the data communication path fixing function 200c. .
- a menu item that allows the user to directly specify the URL is also provided, and even if the user specifies the URL from the menu item, the data communication is designed to always go through this network segment 201. I do.
- the menu selection by the user is recorded by classifying whether the menu item is related to the business or not according to the public / private division information set in the menu information 203h in advance.
- the data communication path fixing function 2000c By using the data communication path fixing function 2000c, the data communication path is fixed so that all user communication passes through the network segment 201.
- the data communication path fixing function 200c When the information resource specified by the URL is in the network segment 201, such as when accessing the internal content server 202, data communication is always performed without using the data communication path fixing function 200c. Go through this network segment 201. Also in this case only, the data communication path fixing function 200c generates a communication record that records which URL is used by the user.
- a communication record of URL indicating an information resource outside the network segment 201 is generated by a remote URL proxy acquisition function 200c-1 which will be described later.
- the user's terminal ID 204 d, date and time 204 a, URL 204 e, user's source IP address 204 b, user's source TCP port number 204 c, public / private flag 2 04 f etc. are recorded. Collection of this communication record is performed in a protocol hierarchy such as HTPP on TCPPIP.
- All the packet information at the Ethernet level via the network segment 201 implemented by the data communication path fixing function 200c is described above.
- the data is stored in the packet collection database 206 as a packet record by the packet collection function 200d, and can be compared with the information in the communication record database 204, so that the usage fee of the communication fee for each URL can be charged. .
- the network segment 20 from the information communication terminal 100 such as the portable terminal 101 and the computer 102 is used.
- (1) Data communication for acquiring an outside URL (information resource) requires the network segment 201 to communicate directly between the server that distributes the URL contents and the mobile terminal 101 or the convenience store 102. It is not possible to save all packet records without going through, and it is not possible to generate billing data.
- the information held by the content server 401 in the content intranet 400 of the external content server 301 on the in-net network 300 outside the network segment 201 of this embodiment is a URL.
- the remote URL proxy acquisition function 200c-1 acquires the information resource specified by the URL outside the network segment 201, and sends it to the requesting mobile phone. Send to terminal 101 or computer 102.
- the remote URL proxy acquisition function 200c-1 forms a part of the data communication path fixing function 200c.
- the URL of the server for the data communication path fixing function 200c is "http: //me ⁇ .xx.co.jp/”.
- the server displays menu 500 to the user who succeeds in authentication. If the user wants to refer to "http: //www.yyy.com/zzz.html", the link to 111 is set to "111 1: // 1116" in menu 500 of the present embodiment. 1 11. xx.co.jp/agent.cgi?www.yyy.com/zzz.html ".
- the "agent, cgi" part of this URL is the part used in the remote URL proxy acquisition function 2000c-1.
- the string "agent. Cgi" is arbitrary. If UR L is specified in such a format, remote URL proxy acquisition function 2 00 c—1 force 5 UR specified by a character string starting after "?" All of the contents specified by L are acquired, and the contents are transferred to the user's portable terminal 101 or computer 102.
- the content contains links to other URLs (information resources), it is not possible to permanently fix the data communication path to the network segment 201, so the user's mobile terminal 1 Before the content is transferred to the computer or computer 102, the content is passed to the address conversion function 200c-2, which will be described later, and the address is changed to "http: //menu.xx.co.jp/agent. cgi? www.yyy.co/zzz.html ", and then transfer it to the user's mobile terminal 101 or computer 102.
- This remote URL proxy acquisition function 200c-1 also generates a communication record in the communication record database 204.
- the data communication route can be fixed so as to pass through the network segment 201.
- the remote URL proxy acquisition function 200 c-1 converts the address of the content such as the URL acquired in real time to the above format. Provided as part of 200 c.
- Data communication fixed function 200c, remote URL proxy acquisition function 200c-1 and address conversion function 200c-2 are provided to more users and operated efficiently.
- a cache function 200 f that temporarily stores (caches) the address-converted contents is provided. If another user or the same user uses the contents again, the cache function is used. The content temporarily stored in the function 200f is transferred to the user's portable terminal 101 or computer 102.
- the cached content is set to be used when the remote URL proxy acquisition function 200c-1 acquires content.
- the remote URL proxy acquisition function 200c-1 checks the presence or absence of the desired content in the cache function 200f, and checks the content stored in the cache function 200f.
- the content in the cache function 200 f is transferred to the user's portable terminal 101 or computer 102 if there is no content.
- the usage record of the content temporarily stored in the cache function 200 f is also stored in the communication record database 204 by the remote URL proxy acquisition function 200 c-1. .
- Cached content must be updated regularly to match the original content. Cached content is deleted after a certain period of time.
- the cache function 200 f has such various functions.
- dynamic content for example, a user accessing the content display screen
- the cache function 20Of analyzes whether or not the content is dynamic, and if it is determined that the content is dynamic, the cache function is executed. Function Deletes the content obtained in 200 f immediately after transferring it to the user.
- the user of the information communication terminal 100 such as the portable terminal 101 or the computer 102 must be able to perform data communication via the network segment 201 after authentication after authentication. It is possible to grasp the data communication status according to the purpose of use such as URL.
- the charging information generation function 200 e illustrated in FIG. 10 is used to store the packet records stored in the packet collection database 206 and the communication records stored in the communication record database 204. Match and generate billing information.
- the source IP address 204 b is a common part of the record items of the packet record stored in the packet collection database 206 and the record items of the communication record database 204. (206b), the source TCP port number 204c (206d) is used as a key to combine the two records to generate a billing record.
- One billing record contains information about who (terminal ID 204d), when (date and time 204a), which URL (URL 204e) and which URL (URL 204e) to view. Includes the total number of generated packets' data (sum of data size 206 i related to the relevant URL 204e), public / private classification information (public / private distinction flag 204f), and the like.
- the public / private division information is provided by the user or the company to which the user belongs (company name 203 g) at the time of contract for the public / private division invoicing service using the overnight charging system 200 of this embodiment.
- Contract information such as designation as to which of the public and private data communication charges that do not go through 00 is billed is presented to the operator of the data charging system of the present embodiment.
- URL information for separately charging the information amount is set in the user management database 203 as, for example, a part of the user information 203a.
- the charging information generation function 200 e generates the charging information of the user based on the charging record. Specifically, the accounting records are totaled for each user, and once the public and private usages are totaled. Regarding communication charges that do not pass through the data charging system 200 of the present embodiment, it is impossible to classify the communication charges. Perform based on.
- the communication charges that do not pass through the data charging system 200 are the information before charging and the detailed information of the data communication charges from the mobile phone and PHS operators (call detail record (CDR information 600)).
- CDR information 600 call detail record
- ⁇ 0 1 Information 6 0 0 is phone number 6 01, call type / call type 6 0 2, call date 6 0 3, call detail category / call type 6 0 4, number of bytes 6 0 5, packet It consists of information such as number 606, total call charges 607, and so on.
- the data amount (the number of bytes) corresponding to the specific telephone number 6001 (terminal ID 204d) described in the CDR information 600 is G
- the above-mentioned billing record is one terminal.
- the sum of the data size 206 i associated with the terminal ID 204 d aggregated by ID 204 d (corresponding to the phone number 601) is C
- the sum of the data sizes 206 i is C p
- the sum of the public data size 206 i of the terminal ID 204 d is C j
- C ( C p + C j) and G
- G—C G—C.
- Cp and Cj which are the aggregated results of public and private classification via the data billing system 200.
- the sum of the minutes and the proportional distribution based on the contract matter of ⁇ is generated for each user (terminal ID 204 d) and described in each of the public statement column 701 and the private statement column 720. I do.
- individual URL (purpose of use) specific information may be added to each of the public specification column 701 and the private specification column 702.
- the billing may be made proportionally according to the ratio of Cp and Cj.
- a function of setting an arbitrary unit price for a specific URL (purpose of use) a function of not charging a specific URL (purpose of use)
- the URL (purpose of use) as one billing unit, the function of setting the unit price for that unit, the function of billing the amount of information, and the use of each URL, the communication fee and information amount of the URL (purpose of use) Is added to the information before charging.
- the above-described charging information generation function 200e provides an information network such as the Internet 300. It is possible to perform pay-as-you-go billing for each purpose of use in data communication using. In addition, it is possible to realize both public and private communication charges and information volume at the same time.
- the billing information generation function 200 e the total number of packets of each of the mobile terminals 101 such as a mobile phone and a PHS is provided by the provider as data based on CDR information 600 and the like. It is assumed that the billing information is generated by the data billing system 200 according to the present embodiment.
- communication data passing through the network segment 201 is always transmitted at the packet level of the packet counter 205 and the packet counter 205 at the level of the Ethernet packet. It is monitored and recorded by the packet collection function 200d consisting of the data collection database 206.
- the user can use the URL previously notified to the user of the information communication terminal 100 by e-mail or the like at an arbitrary opportunity, and the user can access the data billing system 200 via the Internet 300.
- the login ID and passcode input screen is displayed (step 12), and after entering the login ID and password (Step 13), the user ID is checked by referring to the entry of the login ID 203d and the password 203c of the user management database 203, and the user is authenticated by collating with the password ID.
- Step 14 In the case of an authentication failure, a predetermined number of permissible Retry input of the user ID and passcode (steps 17 and 16). If the number of retries exceeds the allowable number, an error message is displayed (step 18) and the corresponding error is displayed. Lock the login ID account (step 24) and disconnect the line (step 25)
- a menu 500 screen as shown in FIG. 8 is displayed, and the user selects each item (step 19).
- the user's selection item in the menu 500 accesses the information resource (internal content server 202) in the network segment 201 (step 20).
- the content of the internal content server 202 is transferred to the user of the And records the communication record in the communication record database 204 each time the content (URL) of the internal content server 202 is used (step 21).
- the various processes in FIG. 9 by the data communication path fixing function 200c are unnecessary and are not executed.
- step 26a the presence or absence of the target content in the cache function 200f is checked (step 26a). If hit, the cache function The contents in the 20Of are sent to the user for viewing (step 26b), and the communication record is recorded in the communication record database 204 (step 26c :).
- the remote URL proxy acquisition function 200c-1 is activated (step 26d), and the URL error that manages the number of failures in URL proxy acquisition is activated. While the value of one count is equal to or less than the predetermined allowable value (step 26e), the proxy acquisition of the URL described in FIG. 9 is tried (step 26f), and the success or failure of the acquisition is determined (step 26e).
- the address conversion function 200c-2 is activated to perform address conversion on the content (step 26h), and then the cache function 200f is converted to the cache function 200f. The content is written (step 26i), and the user browses the content via the cache function 200f (step 26b).
- step 26g If proxy acquisition fails in step 26g, the URL error counter is added (step 26m), and step 26d and subsequent steps are repeated.
- step 26e if the URL error counter exceeds the allowable value, after displaying an error message indicating that acquisition of the content specified by the URL has failed (step 26j). Disconnect the line (step 26k).
- the public / private distinction of access is determined based on the public / private distinction of each URL (step 22), and the public / private distinction is determined.
- Set the flag 204f (step 23, step 28), return to the display processing of the menu 500 in step 19, and repeat the processing from step 19 until the logout.
- the acquisition of communication records is made more efficient, the number of packet counting processes and the counting processing time are reduced, and the billing function maintains a high degree of freedom. It has the advantage of being able to.
- the computer 102 is used in the passing packet quantity billing type overnight communication using an information network such as the Internet 300. It is possible to realize a pay-as-you-go billing for information networks and information resources used from information communication terminals 100 such as mobile terminals 101 and mobile terminals. Also, in data communication using the information network such as the Internet 300 by the information communication terminal 100, various and accurate billing can be performed for each purpose of use. It is possible to achieve both the improvement of the convenience for users and companies by using 0, and the appropriateness of the charge burden by clarifying the public / private division of the charge for using the information communication terminal 100 and data communication.
- FIG. 11 is a block diagram showing an example of the configuration of a data charging method and a data charging system according to another embodiment of the present invention
- FIG. 12 is a flowchart showing an example of the operation thereof. .
- authentication If authentication is successful, send and receive e-mail with computer 102 and mobile terminal 101 Display a menu to restrict communication. If the authentication fails, it communicates with the authentication function 200a to confirm that the number of failures is within the limit number of times, and causes the authentication to be performed again. If the number of times exceeds the limit, the user is informed of that and the use is stopped.
- the e-mail address is classified and recorded whether it is related to the business or not.
- the user's e-mail communication can be performed using the remote e-mail proxy transfer function 200 c-3 and the address conversion function 200c-4 of the data communication path fixing function 200c described later.
- the data communication route is fixed so as to pass through the network segment 201 of the form.
- the data communication function 200 c If the e-mail address is within the network segment 201 of this embodiment, data communication is always performed without using the data communication path fixing function 200c. 0 Via 1 In this case only, the data communication function 200 c generates a communication record that records both the e-mail address to which the user sent the e-mail and the e-mail address from which the e-mail was received. And store it in the communication record database.
- a communication record of a mail address outside the network segment 201 of the present embodiment is generated by a remote mail address proxy transfer function 200c-3, which will be described later.
- the communication record records the user's ID, date and time, destination mail address, user's IP address, and user's TCP port number.
- All the packet information via the network segment 201 of the present embodiment realized by this function is stored in the packet collection database 206 as a packet record by the packet collection function 200d. In this way, it is possible to pay for the communication fee for each mail.
- the remote mail address proxy transfer function 200c-3 is used for the network segment 200 of the present embodiment. Once the e-mail address in 1 is obtained, it is transmitted or received by the portable terminal 101 or the computer 102.
- This remote mail proxy transfer function 2000c-3 is implemented as a part of the data communication path fixing function 2000c.
- an operation example of the actual remote mail proxy transfer function 200c-3 is shown below.
- the address of the server of the data communication path fixing function 200c is "aaaaa.bbb.co.jp”
- the address of the user is "ccc @ aa a.bbb.co.jp”. If the user wants to send an e-mail to "zzz@xxx.yyy.co.jp", rewrite the e-mail address as follows and enter "zzz # xxx.yyy.co.jp? Ccc @ aa a bb b. c o. jp ".
- the "?” Part of this mail address is the remote mail proxy transfer function 200c-3.
- the strings "?" And “#” are arbitrary.
- the remote mail proxy transfer function 2000c-3 transfers the mail to the mail address specified by the character string before "?". "#” Is a substitute for "@”.
- This remote mail proxy transfer function 2000c-3 also generates a communication record based on the communication record data.
- the data communication path can be fixed using the remote mail proxy transfer function 2000c-3, but in order to make this function work constantly, the remote mail proxy transfer function 2000c-3
- the address conversion function 200c-4 which converts email addresses that are normally used by users with real time, is required.
- the post-pending part “? Ccc @ aa a. Bb b. Co. Jp” is automatically inserted in the remote mail proxy transfer function 200 c-3 system, and the transfer destination Is changed to "#".
- the address conversion function 200c-4 analyzes the incoming mail in real time, converts it to the mail address normally used by the user, and then forwards the mail.
- the e-mail address is "ccc @ 1 11.22.co.jp"
- the e-mail address is analyzed in real time and "ccc @ aa a.bbb. co.jp "to” ccc@lll.222.co.jp "and forward the message.
- the address conversion function 200c-4 is part of the remote mail proxy transfer function 200c-3.
- FIG. 12 is a flowchart showing an example of the entire operation of the mail transfer process according to the second embodiment as described above.
- the remote mail proxy transfer function 200 c-3 manages a predetermined transfer error while controlling the error.
- the mail transfer process was executed (Step 31, Step 32, Step 33, Step 34, Step 40, Step 39), and in the case of transferability, the address conversion by the address conversion function 200c-4 was performed.
- step 36 determines the presence / absence of broadcast transmission (step 36), and if there is broadcast transmission, use cache management function 200 c-5 (step 37), otherwise
- the mail delivery is executed directly, and the access record for each mail use is executed at the data collection at the protocol layer such as the e-mail protocol above the TCP / IP layer, and the communication Recorded data is stored in the overnight base (step 38).
- the data collected in the communication record database in this way is compared with the packet collection function 200d, which collects data at the Ethernet level, and billed by e-mail address, that is, by purpose of use.
- the operation is performed in the same manner as in the first embodiment.
- the same effects as those of the first embodiment can be obtained, and a billing process that can be classified into public and private, including the mail service, can be realized.
- the data charging technology of the present invention can be applied not only to data communication but also to voice coded data communication methods (Voiceover IP method, voice over frame relay method, etc.) using the same method. it can. This makes it applicable to communication systems that transmit and receive voice and data simultaneously. Therefore, it is also possible to perform public / private classification for voice calls in the voice coded data communication system.
- Industrial applicability is also possible to perform public / private classification for voice calls in the voice coded data communication system.
- a pay-as-you-go billing for each purpose of use of an information network and information resources used from an information communication terminal such as a computer or a portable terminal is realized. Can be obtained.
- a user by using a public-private information communication terminal is used. This has the effect of improving the convenience of users and companies, and optimizing the charge burden by clarifying public and private areas for information communication terminal and data communication charges.
- the overnight charging method of the present invention it is possible to realize accurate marketing in a data communication service by grasping information such as the usage status of a user of the information communication terminal for each purpose of use. The effect is obtained.
- the information network used from the information communication terminal such as a computer and a portable terminal, performs the usage-based billing according to the use purpose of the network information resource.
- the effect is that it can be realized.
- the use of public and private information communication terminals improves the convenience of users and companies, and the use of information communication terminals and data communication is clarified in the public and private categories, and the charge burden is appropriate. Can be achieved at the same time.
- the overnight charging system of the present invention it is possible to provide various services by setting various unit prices according to the purpose of use and the type of data.
- the overnight charging system of the present invention it is possible to grasp the information such as the usage status for each purpose of use by the user of the information communication terminal, and to realize accurate marketing in the overnight communication service. Can be obtained.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2000236696A AU2000236696B2 (en) | 2000-04-05 | 2000-04-05 | Data charging method and data charging system |
JP2001522813A JP3327918B2 (ja) | 2000-04-05 | 2000-04-05 | データ課金方法およびデータ課金システム |
PCT/JP2000/002188 WO2001078317A1 (fr) | 2000-04-05 | 2000-04-05 | Procede et systeme de chargement de donnees |
AU3669600A AU3669600A (en) | 2000-04-05 | 2000-04-05 | Data charging method and data charging system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2000/002188 WO2001078317A1 (fr) | 2000-04-05 | 2000-04-05 | Procede et systeme de chargement de donnees |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001078317A1 true WO2001078317A1 (fr) | 2001-10-18 |
Family
ID=11735895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2000/002188 WO2001078317A1 (fr) | 2000-04-05 | 2000-04-05 | Procede et systeme de chargement de donnees |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP3327918B2 (fr) |
AU (2) | AU2000236696B2 (fr) |
WO (1) | WO2001078317A1 (fr) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004038748A (ja) * | 2002-07-05 | 2004-02-05 | Nti:Kk | 情報提供システム及び情報集配装置 |
WO2004036890A1 (fr) * | 2002-09-20 | 2004-04-29 | Nokia Corporation | Procede de facturation de donnees atteignant un element de reseau d'un reseau de communications pendant une session de donnees |
KR100718711B1 (ko) * | 2005-03-16 | 2007-05-16 | 노키아 코포레이션 | 데이터의 과금을 위한 방법 및 장치 그리고 과금 정책을 네트워크 요소에 공급하는 방법 및 장치 |
US7394805B2 (en) | 2002-11-29 | 2008-07-01 | Nec Infrontia Corporation | System and method for connecting portable information equipment and extension telephone |
JP2008211804A (ja) * | 2001-12-10 | 2008-09-11 | Telemac Corp | ワイヤレスデバイスのデータ格付け方法及びシステム |
US7496186B2 (en) | 2002-12-02 | 2009-02-24 | Nec Infrontia Corporation | Outside-LAN connectable IP key telephone system, terminal unit thereof, main unit thereof, and outside-LAN connecting method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2003211793A1 (en) * | 2003-02-27 | 2004-09-17 | Fujitsu Limited | Communication charge sorting method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06104922A (ja) * | 1991-01-08 | 1994-04-15 | Nec Corp | コネクションレスパケットに対する課金装置 |
EP0849689A2 (fr) * | 1996-12-18 | 1998-06-24 | Sony Corporation | Procédé et dispositif de traitement d'informations pour rendre l'acquisition des informations appropriées se trouvant sur un réseau plus facile |
JPH1166182A (ja) * | 1997-08-26 | 1999-03-09 | N T T Data:Kk | 情報料の課金処理方法及び課金代行システム |
WO2000013370A1 (fr) * | 1998-08-27 | 2000-03-09 | Ntt Mobile Communications Network Inc. | Procede de taxation sur un reseau de communication d'informations |
-
2000
- 2000-04-05 WO PCT/JP2000/002188 patent/WO2001078317A1/fr active IP Right Grant
- 2000-04-05 AU AU2000236696A patent/AU2000236696B2/en not_active Ceased
- 2000-04-05 JP JP2001522813A patent/JP3327918B2/ja not_active Expired - Fee Related
- 2000-04-05 AU AU3669600A patent/AU3669600A/xx active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06104922A (ja) * | 1991-01-08 | 1994-04-15 | Nec Corp | コネクションレスパケットに対する課金装置 |
EP0849689A2 (fr) * | 1996-12-18 | 1998-06-24 | Sony Corporation | Procédé et dispositif de traitement d'informations pour rendre l'acquisition des informations appropriées se trouvant sur un réseau plus facile |
JPH1166182A (ja) * | 1997-08-26 | 1999-03-09 | N T T Data:Kk | 情報料の課金処理方法及び課金代行システム |
WO2000013370A1 (fr) * | 1998-08-27 | 2000-03-09 | Ntt Mobile Communications Network Inc. | Procede de taxation sur un reseau de communication d'informations |
Non-Patent Citations (2)
Title |
---|
"NTT DoCoMo technical", SHADAN HOUJIN DENKI TSUSHIN KYOUKAI, vol. 7, no. 2, 1 July 1999 (1999-07-01), JAPAN, pages 24 - 25, XP002907784 * |
NEWS RELEASE, no. 4, 27 April 2000 (2000-04-27), NIPPON TSUSHIN K.K., XP002907785, [retrieved on 20000517] * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008211804A (ja) * | 2001-12-10 | 2008-09-11 | Telemac Corp | ワイヤレスデバイスのデータ格付け方法及びシステム |
JP2004038748A (ja) * | 2002-07-05 | 2004-02-05 | Nti:Kk | 情報提供システム及び情報集配装置 |
WO2004036890A1 (fr) * | 2002-09-20 | 2004-04-29 | Nokia Corporation | Procede de facturation de donnees atteignant un element de reseau d'un reseau de communications pendant une session de donnees |
US8345676B2 (en) | 2002-09-20 | 2013-01-01 | Nokia Corporation | Method for charging of data reaching a network element of a communication network during a data session |
US7394805B2 (en) | 2002-11-29 | 2008-07-01 | Nec Infrontia Corporation | System and method for connecting portable information equipment and extension telephone |
US7496186B2 (en) | 2002-12-02 | 2009-02-24 | Nec Infrontia Corporation | Outside-LAN connectable IP key telephone system, terminal unit thereof, main unit thereof, and outside-LAN connecting method |
KR100718711B1 (ko) * | 2005-03-16 | 2007-05-16 | 노키아 코포레이션 | 데이터의 과금을 위한 방법 및 장치 그리고 과금 정책을 네트워크 요소에 공급하는 방법 및 장치 |
Also Published As
Publication number | Publication date |
---|---|
AU3669600A (en) | 2001-10-23 |
JP3327918B2 (ja) | 2002-09-24 |
AU2000236696B2 (en) | 2005-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3142821B2 (ja) | 情報通信ネットワークの課金方法 | |
JP3142820B2 (ja) | プッシュ型情報配信方法およびその中継装置 | |
US7924854B2 (en) | System and method for billing end users in a peer-to-peer transaction in a network environment | |
US7328000B2 (en) | Transaction-based service billing in a telecommunication system | |
US9923728B2 (en) | System and method for associating an end user for billing in a network environment | |
US9209983B2 (en) | Generating a single advice of charge request for multiple sessions in a network environment | |
US9571371B2 (en) | Network connection communication system | |
US9202237B2 (en) | Generating a single billing record for multiple sessions in a network environment | |
KR100420668B1 (ko) | 무선 인터넷 사용에 대한 차등 과금 적용 방법 및 시스템 | |
WO2001078317A1 (fr) | Procede et systeme de chargement de donnees | |
JP2002202926A (ja) | インターネット上のWebコンテンツのデータ量を削減して中継転送するコンテンツ中継サービス装置 | |
JP3622718B2 (ja) | 電子メール管理方法及び電子メール管理のための装置 | |
JP3987518B2 (ja) | 情報通信システムおよび方法 | |
EP1235382B1 (fr) | Procédé et appareil de communication | |
JP2001312403A (ja) | アプリケーション・サービスを提供する方法及びシステム | |
KR100831563B1 (ko) | 유료 컨텐츠 사용자의 계정 매핑을 이용한 과금대행 장치및 그방법 | |
JP2001186125A (ja) | 情報通信ネットワークの課金方法 | |
KR100904386B1 (ko) | 허브 중계를 이용한 정보 변경 서비스 제공 방법 및 시스템 | |
JP2001266013A (ja) | 料金明細通知システム | |
JP2001101129A (ja) | 料金算定システム、及び料金算定方法、並びに料金算定プログラムを記憶した記憶媒体 | |
KR20030096533A (ko) | 무선 통신망 전송 데이터의 계량장치 및 그 방법 | |
JP2001175577A (ja) | プッシュ型情報配信方法およびその中継装置 | |
JP2003162668A (ja) | ドメイン名による組織情報提供システムとその装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 522813 Kind code of ref document: A Format of ref document f/p: F |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CN JP KR SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000236696 Country of ref document: AU |
|
122 | Ep: pct application non-entry in european phase | ||
WWG | Wipo information: grant in national office |
Ref document number: 2000236696 Country of ref document: AU |