EVENT BASED CHARGING FOR MOBILE APPLICATIONS
Field of the Invention The present invention relates to techniques for charging for mobile applications, and particularly but not exclusively to the use of applications such as games from mobile terminals via a mobile telecommunications network.
Background to the Invention As mobile terminals become more advanced, there is a growing number of applications provided which run at least partly in the mobile terminals themselves. These applications, which may be referred to as mobile applications, can be either stand-alone or interactive. Interactive applications can be further divided into client- server interactive applications and client-client interactive applications. Network operators need to implement charging of applications used on mobile terminals which require at least some access of the mobile telecommunications network. The charging functionality currently implemented in current service platforms is not ideal. Existing charging is primarily based on volume of data traffic. As such, costs associated with usage of an application or service are unpredictable to the end- user. Existing charging structures do not provide satisfactory support for prepaid users. For prepaid users, the volume of data traffic may be such that insufficient credit exists in order to use a particular application. However this only may become apparent after the attempt to use or access an application has begun. Usage of a service associated with an application from a mobile terminal may be considered to be an 'event'. An alternative to charging based on data volume for network operators is to implement event based service pricing. This would allow access to a service to be a fixed price. This is desirable as it makes service pricing understandable and transparent to an end user, and better reflects the perceived value of the service to the end user.
Client-server applications are currently the main type of interactive application. Client-client applications may become more prevalent when session initiation protocol (SIP) becomes more generally available in mobile networks. Stand-alone applications are typically embedded in the terminal, or downloaded in a single session. They are not associated with the operator's charging infrastructure, and consequently the network operator has no means for innovative charging alternatives, for example charging based on usage or events, other than when a user makes a network access, for example, to download or upgrade a stand-alone application. Innovative charging (for example event based charging) for client-server applications can in theory be accomplished by integrating the server part of the application with the operator's charging infrastructure. However, the integration of new service platforms with the network operator's charging infrastructure is challenging, due to the necessary effort and investment involved. This is especially true for service platforms residing outside of the network operator premises. Different service platforms are based on different proprietary implementations, and no standard exists. This makes the integration of such platforms to the network operator's charging infrastructure difficult and costly. A dedicated interface may be required for each service platform. In addition, the mobile terminal identity, MSISDN, is usually not sent to the service platform external to the network operator, and as such this makes tracking of charging difficult. In view of the above drawbacks, operators principally continue to use basic charging models, which are based on data volumes. This has a negative effect on service usage, since the charges associated with a particular application are not readily apparent to a user. Further problems arise due to the need to provide direct charging interfaces between network operators and service providers in order to offer innovative charging solutions. It is an aim of the present invention to provide an improved technique for charging for mobile applications.
Summary of the Invention
In accordance with a general aspect of the invention there is provided a method of administering charging in a mobile communications system, comprising providing an interface between a network element and a charging function, wherein charging is administered in dependence on information received at the network element by exchanging charging information on said interface. The network element may be adapted such that all traffic between a user terminal and an application is directed through the network element. The network element may be a traffic analyser. The charging information may be an event identifier in a request transmitted by a user equipment. The charging information may be an event identifier in a response request transmitted by an application to a user equipment. The charging information is a charging URL. The charging information may be received from an application. The charging information may be a credit. The credit may be applied, in real-time, in the network element. In accordance with this general aspect of the invention there is provided a network element in a communication system adapted to analyse traffic between a user terminal and an application, the network element having an interface to a charging function, the interface for providing the charging function with charging information contained in said traffic.
The network element may comprise a traffic analyser. The network element may be adapted to extract an event identifier comprising charging information in a request transmitted by a user equipment. The network element may be adapted to extract an event identifier comprising charging information in a response request transmitted by an application to a user equipment. The charging information may be a charging URL.
The charging information may be received from an application. The charging information may be a credit. The credit may be applied, in real-time, in the network element. Such a method or network lement may be implemented in a mobile communications system, the application preferably being a mobile application provided on an application server, and the user terminal preferably being a user equipment compliant with a mobile communications standard, such as UMTS. According to one aspect of the present invention there is provided a method of charging for a mobile application, comprising identifying a trigger associated with a chargeable event, identifying a user requesting such event, and providing details of the chargeable event and the user to a charging function. The trigger may include an event identifier and a user identifier, said identifiers forming the details of the chargeable event. The event identifier may be a URL. The user identifier may be a MSISDN. The trigger may be a request from a user terminal to an application. The trigger may be a response from an application to a request from a user terminal. The application may be provided by an application server. The request or the response may be a HTTP Message. The application may be provided by an application client. The request or the response may be a SIP Message. The trigger may be contained in the header of a message. The response may include an authorisation of the request. The application may provide authentication.
According to another aspect of the present invention there is provided a network element for enabling charging of a mobile application, the network element including means adapted to identify a trigger associated with a chargeable event; means adapted to identify a user requesting such event; and means adapted to provide details of the chargeable event and the user to a charging function means. The means adapted to identify the trigger includes means may beadapted to identify an event identifier and a user identifier, said identifiers forming the details of the chargeable event. The event identifier may be a URL. The user identifier may be a MSISDN.
The means adapted to identify the trigger may be adapted to identify a request from a user terminal to an application. The means adapted to identify the trigger may be adapted identify a response from an application to a request from a user terminal. The application may be provided by an application server. The request or the response may be a HTTP Message. The application may be provided by an application client. The request or the response may be a SIP Message. The network element may be a traffic analyser. The network element may be further adapted to identify the trigger in a header of a message. The network element may be a GGSN. A mobile communications system may include the network element. According to a further aspect of the invention there is provided a method for charging for a mobile application, comprising generating a trigger identifying a chargeable event and a user associated with the request for such an event, and providing details of the chargeable event and the user to a charging function. The step of providing details to the charging function comprises transmitting the trigger to a mobile communications network. The trigger is generated responsive to use of the mobile application. The mobile application is a stand-alone application. The trigger is a request to an application server. The trigger is a request to a mobile terminal. The method may further comprise creating a message containing the trigger in a header thereof.
The invention preferably provides a program adapted to perform the method. A mobile application preferably includes the program. A computer program product may contain computer program code for performing the method.
In a still further aspect the present invention provides a mobile terminal adapted for charging of a mobile application, comprising means for generating a trigger identifying a chargeable event and a user associated with the request for such an event, and means for providing details of the chargeable event and the user to a charging function.
The means for providing details to the charging function may comprise means for transmitting said details to a mobile communications network incorporating a charging function. In a second aspect there is provided a method of administering charging for a mobile application, comprising establishing access to a mobile application for a user terminal via a network element, and receiving, at the network element charging information from the mobile application, The charging information may be provided in a message transmitted from the mobile application toward the user terminal. The network element may be adapted to receive all traffic between the mobile application and the user terminal. The step of receiving, at the network element, may comprise receiving traffic transmitted between the mobile application and the user terminal. The charging information may be credit information. The charging information may be provided to a charging function by the network element. The charging information may be provided to a credit control manager associated with the charging function. The charging information may be provided to a network operator.The charging information may be utilised in real-time. In the second aspect of the invention there is also provided a network element in a communication system adapted to analyse traffic between a user terminal and an application, the network element having an interface to a charging function, the interface for providing the charging function with charging information contained in said traffic, the network element being adapted to receive charging information from the mobile application.
The network element may be adapted to receive charging information in a message transmitted from the mobile application toward the user terminal.
The network element may be adapted to receive all traffic between the mobile application and the user terminal. The charging information may be credit information. The charging information may be provided to a charging function by the network element. In the second aspect of the invention, credit pulses are sent from a mobile applicationo a user terminal, and a traffic analyser intercepts them. The traffic analyser
intercepts all traffic between the user equipment and the application. As the application sends the credit information towards the user terminal, there is no requirement for the application to know who the user is. The credit information is routed directly to the network element that is also handling the charging, and the correct user account is credited automatically and in real-time.
Brief Description of the Drawings
The present invention is now described with regard to a particular example with reference to the accompanying drawings in which:
Fig. 1 illustrates an overview of a network architecture illustrating the principles of operation of a first embodiment of the invention; Fig. 2 illustrates the method steps in an example implementation of the present invention utilising a first embodiment;
Fig. 3 illustrates a charging table for implementation in accordance with a first embodiment of the invention; and
Fig. 4 illustrates an overview of a network architecture illustrating the principles of operation of a second embodiment of the invention.
Description of the Preferred Embodiments The present invention is described herein by way of reference to a particular example implementation. The invention is not, however, limited to such an implementation. Various modifications and adaptations to the described implementation would be apparent to one skilled in the art reading the following description. Referring to Fig. 1 , there is illustrated an example communication network architecture in which the present invention may be advantageously implemented.
Referring to Fig. 1 , there is illustrated an operator network 100 including a radio access network 106, a charging infrastructure 104, an operator portal 108, a traffic analyser 102, and a gateway 1 10. It would be understood by one skilled in the art that further functionality is required to implement a mobile communications network. However such functionality is apparent to one skilled in the art, and only sufficient detail of the operator network 100 is illustrated in Fig. 1 to understand the present invention. In particular, the gateway 1 10 may in practice be a GGSN (gateway GPRS support node). Also shown in Fig. 1 are two mobile terminals, or user equipment, 120, 122. In addition a plurality of applications servers 128, 130 and 132 are illustrated. The application servers 128, 130, 132 are external to the operator network 100. As is well-known in the art, the mobile terminals 120 and 122 communicate with the radio access network 106 via wireless links 124 and 126 respectively. In such a way, the mobile terminals 120 and 122 connect into the operator network 100 via the radio access network 106. As is further known in the art, communications may be established between the mobile terminals 120 and 122, via the operator network 100, to external application servers 128, 130 and 132. The establishment of communication links between the mobile terminals 120, 122 and the application servers 128, 130, 132 is well-known in the art, and is not further described herein. Referring further to Fig. 1 , it is shown that the radio access network is connected to the traffic analyser 102 via a communication link 114. In addition the traffic analyser 102 is connected to the charging infrastructure 104 via communication link 112, the operator portal 108 via communication link 1 16, and the gateway 1 10 via communication link 1 18. All traffic to and from the mobile terminals 120, 122 via the radio access network 106 passes through the traffic analyser 102, such that the traffic analyser can analyse the traffic in accordance with known techniques. The traffic analyser
102 interfaces with the charging infrastructure 104 in order to charge for the mobile terminals use of the operator network, in accordance with known techniques.
The traffic analyser 102 additionally may direct traffic to the operator portal 108 via communication link 1 16. For example, if an application accessed by the user terminals 120 or 122 is not an external application but an application provided by the network operator, then the traffic associated with any request is directed to the operator portal 108. Even if the application is an external application, in order for the network operator to have control over charging, the charging URL may be an operator portal. Such arrangements are known in the art. Similarly, any application data returned or downloaded to the mobile terminals 120, 122 is provided from the operator portal 108 to the radio access network 106 via the traffic analyser 102. The traffic analyser 102 in addition is connected to the gateway 110. As such the traffic associated with external applications may be directed to such external applications via the gateway 1 10. Similarly data from the application servers directed to the mobile terminals 120, 122 is directed through the gateway 1 10. In accordance with the present invention, the network operator in control of the operator network 100 can charge for certain events associated with a mobile application. Such event may be the start of an application, the use of a special feature within the application, the enabling of a chargeable option associated with the application, etc. For example, where the application is a game, the event may be selection of an option, for example a start game option, an option to select a new game level, an option to select a new weapon for a game, an option to select a new game scenario (e.g. a new race track) etc. The invention enables an application running in a mobile terminal to generate charging events, which are detected by the traffic analyser 102 in the mobile network. The connection of the traffic analyser 102 to the charging infrastructure 104 enables initiation of charging in dependence on an event. The charging may be prepaid or post-paid. The charging requires no interface of the charging infrastructure of the network to any external applications. When the user of a mobile application requests a service or access associated with an application, which is charged by the network operator, a charging event is generated. Preferably, the charging event is generated in dependence upon an identifier in the protocol header of a message which passes through the traffic
analyser 102. The charging event is preferably based on the header information, so that the payload of the message can be used for any necessary information to be transferred end-to-end, or alternatively left empty. Advantageously, there is no requirement for the traffic analyser to process the payload of a message. The traffic analyser 102 is able to detect the message, and the event identified in the header, based on the user protocol and the identifier in the protocol header. In a preferred embodiment, the charging infrastructure 104 is adapted to be provided with a functionality to map a particular protocol header identifier to a tariff or other charging data, which can determine the actual amount to be charged. In a further preferred embodiment, the event charging is triggered by a response message to the mobile terminal detected by the traffic analyser 102. The general principle of operation of the present invention can be illustrated with reference to a simple example illustrated by the flow chart of Figure 2 and with further reference to Figure 1. In Fig. 2, an example is given where two players, player A and player B, each associated with the mobile terminals 120 and 122 respectively, initiate a game session associated with the application server 128. Preferably player A initiates the game session, and invites player B to join in an interactive game session. In a first step 202, player A initiates the game session from the mobile terminal 120 to the application server 128 in accordance with known techniques. A communication session is established between the mobile terminal 120 and the application server 128 via the mobile network 100 using known techniques. As part of the initiation of the game session, the player A using terminal 120 is provided with the price of the game session from the application server 128, and player A accepts the price. The establishment of a session in this way is known in the art, and outside the scope of the present invention. For an interactive session, in a step 203 player A notifies a player B, associated with mobile terminal 122, of the identity of the session so that player B can join in an interactive game session with player A. Again, this notification is in accordance with known techniques.
In a step 204, the initiation of the game session in step 202 is repeated for player B using mobile terminal 122. In this session, the session associated with player A is identified. This, once again, is in accordance with known techniques and is not described in detail herein. After each of the players initiates the game session, and obtains and accepts the price associated with the game session, each player is presented with a "start game" screen on their respective mobile terminals 120 and 122. This is represented by step 206. In a step 208, each player selects the "start game" option on the screen of the mobile terminal 120 or 122. As a result, a "HTTP GET" message is sent from the mobile terminal 120 to the operator network 100. The "HTTP GET" message includes the terminal MSISDN, and a unique URL associated with the event, which corresponds to a charging price. The URL can thus be termed a charging URL. In this example the charging URL corresponds to a "start game" event This message is captured by the traffic analyser 102. As is discussed further hereinbelow, responsive to receipt of this message the traffic analyser does not, in a preferred embodiment, initiate any charging in accordance with the present invention. However, in alternative embodiments the charging initiation described hereinbelow may be initiated at this point. In a step 214 the "HTTP GET" message is sent from the traffic analyser to the application server 128 via the gateway 1 10. The application server, as part of the processing of such message, authenticates the request associated with the mobile terminal 120 or 122. After successful processing of the message, including authentication of the user, in a step 216 the application server 128 returns a "HTTP RESPONSE" message to the mobile terminal. As represented by step 218, this response message is captured by the traffic analyser 218. On capturing the message, the traffic analyser extracts the charging
URL contained in the header of the message, and the MSISDN of the mobile terminal also contained in the header of the message. The charging URL and the MSISDN
are then forwarded to the charging infrastructure 104. In a step 220 the event, i.e. the game-start event, is charged for the player associated with that MSISDN. It should be noted that although in the described embodiment the MSISDN is extracted from the header of the message and used to identify a user for charging, the invention is not limited to such an arrangement. In general, it is necessary to identify the user (e.g. client or subscriber) associated with the request, and provide this to the charging function. This may be achieved by extracting the MSISDN, by extracting the IP address from which the request originated, or in dependence on any other suitable information associated with the message which identifies the account to be charged. Referring to Fig. 3, in the preferred embodiment each URL is associated with a unique event or function, and a charge is associated with such an event or function. As such, the charging infrastructure 104 may be provided with a table as shown in Fig. 3, having a column 302 listing all the URL's, a column 304 (optional) listing the event or function associated with such URL, and a column 306 listing the charge associated with such URL. As shown in Fig. 3, for URL 308, the associated event or function 316 is "start game", and the associated charge is included in entry 312. A further URL 310 may be associated with the function "get new level", i.e. access a new level of the game, and be associated with a charge 314. The transmission of the "HTTP GET" messages and "HTTP RESPONSE" messages associated with each of the terminals, such as terminals 120 and 122, associated with the interactive game session may be simultaneous or in sequence, in dependence on the network implementation and the application implementation. As described above, the charging is preferably initiated based on detection by the traffic analyser 102 of a "HTTP RESPONSE" message to the mobile terminal. Such a charging initiation may be utilised where the mobile application cannot be trusted, and where the authentication of the mobile terminal by the application server is desirable. The implementation of authentication techniques is outside the scope of the present invention. The principle applied in the present invention is that a successful response can be detected, independent of the specific authentication technique utilised.
However, if the mobile application can be trusted, the traffic analyser 102 may be adapted to instruct initiation of charging to the charging infrastructure 104 after it has captured a "HTTP GET" message sent to the application server 128 from the mobile terminal 120. It is envisaged that in current applications the authentication of the session prior to initiation of charging is essential, and that therefore current implementation will trigger charging based on the response message from the application server. The payload of the message has a session identifier, which is in practice a password, which is used by the application server 128 to authenticate the application associated with the mobile terminal 120. As the traffic analyser 102 does not analyse the payload, this session identifier is not used by the traffic analyser. Thus, in the preferred embodiment, the "HTTP response" returned by the application server 128 responsive to a successful verification, and the appropriate successful status code in the header, is used by the traffic analyser 102 in order to determine whether charging should be initiated. The "HTTP RESPONSE" message sent by the application server 128 preferably includes a status code in the header, which in the preferred embodiment using HTTP is either a "200" status code indicating a successful request, or a "403" status code indicating "NOT OK". This status code is preferably used by the traffic analyser 102 to determine whether charging should be initiated. It is envisaged in the current applications that initiation of charging only on the sending of a message would not be appropriate, because the message could be sent by any party. As such authentication is important. However, in a trusted environment, initiation of charging on sending a message is possible. Thus the invention is not limited to a requirement for authentication, or for charging to be based only on a response message. As discussed hereinabove, it is also currently envisaged that each charging event will be associated with a unique URL, or charging URL. As such the charging infrastructure 104 merely needs to receive this URL, together with an identity of the user, so an event can be charged to the correct account. In further modifications of the invention, however, the information passed by the traffic analyser to the charging
infrastructure 104 may be more sophisticated. This is particularly likely to be the case where a large number of events are possible. Where large numbers of events become possible, and large numbers of applications are available, each having large number of events associated therewith, the provision of a unique URL for each charging event may no longer be practical. As such additional identifiers may need to be provided to the charging infrastructure 104 in order to enable charging. In the above described example, the application resides in an application server external to the operator network. The principles of the present invention apply equally to an application which is accessible via the operator portal 108 of the operator network. The use of a URL in order to initiate charging can be used in the same way as described hereinabove. All traffic between a mobile terminal and the operator portal similarly passes through the traffic analyser. The example described hereinabove with relation to Fig. 2 relates to a client- server application. It is envisaged that the principles of the present invention may similarly be used in relation to a client-client application. Client-client applications are likely to be based on establishment of SIP sessions between two players via a network including a traffic analyser such as the traffic analyser 102. Thus the traffic analyser 102 can be used in the same way as described hereinabove in relation to a client-server application in order to initiate event based charging. The implementation of a specific SIP session in order to enable client-client interactive applications is beyond the scope of the present invention. The principles of the present invention may also be used in relation to standalone applications, as opposed to interactive applications. For example, if a user of a mobile terminal 102 downloads a stand-alone application from an application server or via the operator portal, the same principle of event based charging as described above may be applied. Similarly even for a stand-alone application, it may be possible to pay extra in order to obtain additional game features, such as access to a further level, which may be obtained by accessing the application server or the operator portal, and the principles of event charging apply similarly. The invention has been described, with relation to Fig. 2, in relation to a HTTP protocol. The invention is not limited to any particular protocol, and as has also been
mentioned hereinabove may be used with an SIP protocol. The invention is particularly described herein with relation to a HTTP protocol, in view of the current implementation of network elements equivalent to the traffic analyser 102 being based on HTTP implementations. The traffic analyser 102 may be any network element which provides the functionality of identifying headers contained in the packets of a data session. More generally, the traffic analyser is required to be able to identify an event which is to be charged, and identify a client to which that event is to be charged, and provide associated identifiers to a charging mechanism. Network elements providing the functionality of the traffic analyser 102 are known in the art, and are also known to provide functionality such as intelligent content delivery, and intelligent traffic analysis. It should be noted that Figure 1 is illustrative of the functionality of the invention, and an actual implementation in a known network environment will be familiar to one skilled in the art. For example, although the traffic analyser 102 is illustrated as a distinct element, it could in practice be integrated in the gateway element 110. In a practical implementation, this gateway element may be a GGSN (gateway GPRS support node). It should also be noted that the traffic analyser may not be connected directly to the operator portal 108 in a practical implementation. This connection is likely to be via the gateway, especially where the traffic analyser is integrated in the gateway. Various possibilities exist for an event which may trigger an event based charge. As described above, it is envisaged that many possibilities exist within the realms of interactive gaming. An event may be associated with the start of a game, accessing a higher level of a game, accessing a new character associated with a game, accessing a new weapon associated with a game, accessing a new scenario associated with a game (e.g. a new race track). Numerous events will be apparent to one skilled in the art. In addition although it is described herein that charging is event based, a network operator may in addition have the option to further charge in accordance with data traffic volumes associated with a download which the event triggers.
Event based charging does not require an access to an application server or client application on another mobile terminal. A mobile terminal may be provided with a stand-alone application, but for which it is required to pay for any use thereof. Thus in response to use of the stand-alone application, an appropriate trigger is sent to the network to initiate charging. As discussed hereinabove, the trigger may be a request or an acknowledgement of a request in embodiments. The trigger is preferably associated with an identity of the user of the application. For stand-alone applications, the trigger may simply be a charging command comprising the charging URL, pre-programmed into the mobile application. Reference is made herein to the user of an application being charged. For post-paid customers, the user may be considered to be a subscriber or client. For pre-paid customers the user may simply be a user associated with a fixed credit. The user identity may be directly associated with a terminal identity, as such allowing the terminal identity to be used for charging purposes. The use of the event based charging described herein, without traffic volume based charging, provides users with predictability of charging. In particular, in relation to prepaid customers, certainty of charging is provided. A fixed fee is associated with an event, as opposed to an unpredictable fee associated with a volume of data traffic associated with an event. With reference to Figure 4, a further embodiment of the invention is described. In this embodiment, a further adaptation to the known charging mechanisms is applied. Referring to Figure 4, there is illustrated the example communication network architecture of Figure 1 in which the traffic analyser 102 is further adapted, as described further hereinbelow. This embodiment of the invention has particular advantage in the context of pre-paid charging, but the benefits and usage may be obtained similary in post-paid charging environments. Like reference numerals are used in Figure 4 to refer to elements which correspond to elements of Figure 1. In accordance with this embodiment of the invention, an application server, for example application server 128, provides the content for an application being
accessed by a user terminal, such as user terminal 120. As such, the application server 128 may also be termed a content server. The application server 128 is adapted, in accordance with this embodiment of the invention, to provide credit to a user accessing the content thereof. The application server transmits packets back toward the traffic analyser 102, which packets are adapted to represent credits for a user. The packets preferably identify a specified credit amount. The packets transmitted from the application server have the same destination addresses as the actual content sent from the server to the user. However a different port number is used so as to distinguish them as 'credit' packets. By the transmission of credit packets in this way, the application server is able to provide credits to a user, without having a specific interface to the operator's credit control system. In accordance with this embodiment, the traffic analyser is adapted to include a credit block 404. The credit block 404 intercepts the credit packets received from the application server. The credit block enables real-time crediting of the access to the application server, by providing credit information to a credit control block 406 of the traffic analyser 102. It should be noted that whilst the credit block 404 is shown as a distinct entity in Figure 4, in practice it may form part of the credit control block 406, the credit control block 406 being adapted to receive credit packets at an input thereof Responsive to receipt of real time credit information from the credit block 404, the credit control block 406 provides real time credit information to the charging block 402 responsible for charging for the user's use of the application. For example, where the user is a pre-paid user, information identifying the user's available credit may be downloaded to the charging block 402 via the crdit control block when the initial communication session is established. This quota for the user is then reduced in accordance with normal charging techniques. In accordance with the invention, this quota may also be increased according to credits received from the application.
The credit information is preferably also provided by the credit control block 406 to the charging infrastructure 104, which may comprise a credit control function. In an example where the user is a post-paid user, the credits are provided to the charging infrastructure to prevent billing of the associated amount to the user. It should be noted that the implementation of elements associated with charging in the traffic analyser 102 of Figure 4 is exemplary. Alternative implementations may be provided. For example, in one alternative, the functionality of the credit control block 406 may be provided in the charging infrastructure 104, as credit control functionality is typically part of the functionality of such infrastructure. In the implementation shown in Figure 4, the main difference between the credit control block 406 and the credit control function of the charging infrastructure 104 is that the block 406 is typically not aware of the monetary value of any credit, and therefore can typically be only used for a corresponding service that is being charged. The traffic analyser 102 may also send signals regarding credits to the charging infrastructure 104 if configured to do so, in the same way as the charging related information may be sent. This may happen every time a charging pulse is received, or on regular intervals, or when a preconfigured threshold is crossed. The credit information may also be combined with the charging information, so when ever the charging counters are reported, the credit counters are also reported. In a further modification of this embodiment, the information that credits have been issued by the application may be transmitted to the user equipment, to enable the user to see the provision of credits. The actual credit packets may be transmitted to the user equipment, to enable an application running on the user equipment to utilise the credits. For security reasons, it may be advantageous to include some level of encryption in the credit packets, or pulses, to ensure that the information which results in a credit comes from a validated source, and is intended for a particular user. Preferably, the credit packets transmitted by the application server toward the traffic analyser should include: a destination IP address, being the IP address of the user equipment; a destination port, being a port reserved for credit pulses (or
alternatively a source port); the source IP address and port, which are used to identify the service and service provider; the amount of credit; and security fields. This embodiment of the invention provides a number of advantages. The operator does not need any centralised credit control system, as the service provider sends the credit messages. Form the service provider's perspective, the communication always appears to be between the user and the content server, and there is no need for a special real-time crediting interface between the service provider and the network operator. The embodiment has only short time delays for crediting, and can therefore be used in real-time applications. There is no need to do mapping of IP addresses to user identities, services and locations of the serving traffic analyser in the credit control system, because IP routing makes sure the information is always sent to the correct network element. This embodiment of the invention provides a basis for innovative charging. In particular, an applications provider may provide for game credits, as traditionally provided in arcade games. For example, when a user associated with a user equipment is playing a game provided by an applications server, the traffic analyser provides for charging of access to that service, for example based on time based charging or event based charging (e.g. access to a higher game level). A user may 'earn', in accordance with game rules, extended playtime. In such event, the game (application) server may transmit a credit packet or pulse to the user equipment IP address. The traffic analyser intercepts such packets, and adds quota to the user for the game service, as described above. The credit may allow the user to continue playing the game for an extended period or fixed period for free, e.g. the user earns an amount of game time. The credit may allow the user to obtain a free event, e.g. access a next level or obtain a new weapon. The traffic analyser reports any received credits to the credit control system or charging infrastructure, so that the service provider can be charged for the extended playtime, if necessary, based on a service agreement between the network operator and the service provider.
The principles of the invention may be advantageously utilised within the Diameter protocol, currently proposed for use in mobile applications and for charging mobile applications. During a game, the application server 128 may transmit an event request message to the user equipment, which message is intercepted by the traffic analyser 102. The credit control functionality 406 thus may extract teh credit information from the message, The message may tehn still be forwarded to the user equipment. Any use of the credit information at the user equipment would be dependent upon the implementation of the game. The present invention has been described herein by way of example with reference to various preferred embodiments. The invention is not limited to any specific embodiment. The scope of the invention is defined by the appended claims.