[go: up one dir, main page]

US20030069855A1 - Control server for supporting the charging of services - Google Patents

Control server for supporting the charging of services Download PDF

Info

Publication number
US20030069855A1
US20030069855A1 US10/262,851 US26285102A US2003069855A1 US 20030069855 A1 US20030069855 A1 US 20030069855A1 US 26285102 A US26285102 A US 26285102A US 2003069855 A1 US2003069855 A1 US 2003069855A1
Authority
US
United States
Prior art keywords
service
control server
server
service user
requested
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/262,851
Inventor
Thomas Hormann
Nicholas Prinz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Lucent SAS
Original Assignee
Alcatel SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel SA filed Critical Alcatel SA
Assigned to ALCATEL reassignment ALCATEL ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HORMANN, THOMAS, PRINZ, NICHOLAS
Publication of US20030069855A1 publication Critical patent/US20030069855A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R21/00Arrangements or fittings on vehicles for protecting or preventing injuries to occupants or pedestrians in case of accidents or other traffic risks
    • B60R21/34Protecting non-occupants of a vehicle, e.g. pedestrians
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R21/00Arrangements or fittings on vehicles for protecting or preventing injuries to occupants or pedestrians in case of accidents or other traffic risks
    • B60R21/34Protecting non-occupants of a vehicle, e.g. pedestrians
    • B60R2021/343Protecting non-occupants of a vehicle, e.g. pedestrians using deformable body panel, bodywork or components

Definitions

  • FIG. 1 shows two communication networks KN 1 and KN 2 , three service users SU 1 to SU 3 , to which respective terminals TE 1 , TE 2 and TE 3 are assigned, two control servers CC 1 and CC 2 , two charging systems BS 1 and BS 2 , and four service servers SS 1 to SS 4 .
  • the control server CC 1 has one or more interconnected computers and a software platform running on these computers. Several application programs run on this software platform. During the execution of these application programs on the system platform of the control server CC 1 , formed by the hardware and software platform, the control server CC 1 is controlled in such a way that the control server CC 1 carries out the function of the control server CC 1 as described below.
  • the application programs and the system platform needed to run the application programs thus form a control unit CONTR, which is configured in such a way that it carries out the functions of the control server CC 1 as described below.
  • the control server CC 1 detects that the service furnished by the reply ANS 3 is chargeable.
  • a reply which results in a non-chargeable service contains no session code (see exemplifying embodiment in FIG. 3).
  • a service request message REQ 3 from the terminal TE 2 is forwarded to the service server SS 1 via the control server CC 1 .
  • No session cookie SCOOK is generated on pages of the service server SS 1 and the authorisation code PAC is transmitted without session cookie SCOOK to the terminal TE 2 .
  • the session code SC it is possible for the session code SC to be transmitted to the terminal.
  • the service request REQ 5 contains no session cookie SCOOK (some service user-specific data could therefore also not be communicated between terminal TE 2 and control server CC 1 ).

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Mechanical Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Superstructure Of Vehicle (AREA)
  • Body Structure For Vehicles (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Air Bags (AREA)
  • Refuge Islands, Traffic Blockers, Or Guard Fence (AREA)
  • Vibration Dampers (AREA)

Abstract

The invention concerns a Process and a control server for supporting the charging of services that are provided to a service user by a service server. A service request message from a terminal of the service user, requesting a service, is transmitted via a communication network to the service server. The service request message and one or more replies from the service server sent out on the service request message are routed via a control server. The control server carries out a procedure for the authentication of the service user and, using the result of the procedure, determines whether or not the charging of services requested by the service user is supported by the control server. The control server checks whether the reply from the service server contains an identification code, that classifies the requested service as chargeable. The control server prevents the provision of the requested service if the requested service is classified as chargeable and the control server has not determined that it supports the charging of services requested by the service user.

Description

    BACKGROUND OF THE INVENTION
  • The invention is based on a priority application No. DE 101 49 160.3, which is hereby incorporated by reference. [0001]
  • The invention concerns a process and a control server for supporting the charging of services that are supplied to a service user by a service server. In such a type of process a service request message for requesting a service is transmitted from a terminal of the service user via a communication network to the service server. [0002]
  • There is the problem, particularly in the area of services offered in the Internet, as to how the user of a service can be charged for the use of the service. The invention is based on the process described below for charging services that are offered to a service user via the Internet. [0003]
  • The so-called NET900 service employs a special dial-in node in the Internet in order to charge the service user for the use of information, to which he/she has access via the Internet. A service user can access this service only by dialling in via this dial-in node, to which a special telephone number is allocated. A call to this dial-in node is charged at a higher rate by the charging system of the telephone network than that of a “normal” dial-in node. [0004]
  • The disadvantage of such a process is that it can only be employed for an Internet access by means of ISDN (Integrated Services Digital Network) or modem. [0005]
  • Further solutions consist in installing special software modules on the terminal of the service user and on the server of the service provider, which facilitate payment of services by means of “electronic money”. The software module in the terminal can be loaded with “electronic money”, which is then used for payment of services. [0006]
  • These solutions have the drawback that they require the use of special terminals and are only usable in the pre-paid area. [0007]
  • SUMMARY OF THE INVENTION
  • The object of the invention is now to facilitate a user-friendly charging of services and in so doing keep the technical outlay as small as possible. [0008]
  • Here a service can consist, for example, in the delivery of information, data or software, but also in the sale of “concrete” goods. [0009]
  • The invention has the advantage that no special hardware or software is required in the terminal area. It is thus particularly economical and user-friendly. [0010]
  • Furthermore, the entire charging process is transparent for the service user and service server. Existing charging systems can be integrated in a simple manner. The technical outlay for the introduction of the invention into existing systems is thus also very small. [0011]
  • Advantageous developments of the invention are revealed in the sub-claims.[0012]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention is explained below by means of several exemplifying embodiments and with the aid of the attached drawings. [0013]
  • FIG. 1 shows a block diagram of a system with several service users, several service servers and two control servers according to the invention. [0014]
  • FIG. 2 shows a functional representation of a control server according to the invention, as in FIG. 1. [0015]
  • FIG. 3 shows a first flowchart of the communication between a terminal and a service server. [0016]
  • FIG. 4 shows a second flowchart of the communication between a terminal and a service server. [0017]
  • FIG. 5 shows a third flowchart of the communication between a terminal and a service server. [0018]
  • FIG. 6 shows a fourth flowchart of the communication between a terminal and a service server.[0019]
  • FIG. 1 shows two communication networks KN[0020] 1 and KN2, three service users SU1 to SU3, to which respective terminals TE1, TE2 and TE3 are assigned, two control servers CC1 and CC2, two charging systems BS1 and BS2, and four service servers SS1 to SS4.
  • The communication networks KN[0021] 1 and KN2 involve the Internet, that is to say a communication network that uses the IP protocol (Internet protocol) as level 3 protocol. However, the communication networks KN1 and KN2 can also be formed by different types of communication networks.
  • The communication network KN[0022] 1 can be formed by a data network, for example, that itself is composed of different sub-networks. Such sub-networks can be assigned to different network operators, for example. These sub-networks can also be mobile radio networks in which communication is based, for example, on the DECT, GSM, UMTS or Bluetooth standards (DECT=Digital European Cordless Telecommunication, GSM=Global System for Mobile Communication, UMTS=Universal Mobile Telecommunications System). Such sub-networks can also be formed by telephone networks (data transmission by means of modem or ISDN). The communication network KN1 can also consist entirely of a telephone network.
  • The communication network KN[0023] 2 can be formed by a data network, for example, that is based on a LAN (Local Area Network) protocol. Here again it is theoretically possible for the communication network KN2 to be a telephone network.
  • Each of the service servers SS[0024] 1 to SS4 are formed by one or more interconnected computers and by the software running on these computers. In each case, the service servers SS1 to SS4 provide the service users SU1 to SU3 with one or more services. Here the services provided by the service servers SS1 to SS4 can be of a different nature: for example the delivery of information, data, programs, user-controlled filtering of information or the sale of goods and services.
  • The service users SU[0025] 1 to SU3 access the service servers SS1 to SS4 by means of the Internet. But it is also possible for the service users to access the service servers SS1 to SS4 by means of the WAP (Wireless Application Protocol) or by means of a telephone terminal. Depending on the type of access, the service servers SS1 to SS4 thus fulfil the function of a WEB server, WAP server or IN (Intelligent Network), SCP (Service Control Point) and are accordingly technically equipped.
  • The terminals TE[0026] 1 to TE3 are computers that are equipped with hardware and software components for communication via the communication network KN1. The terminals TE1 to TE3 therefore have a WEB browser via which they access the services provided by the service servers SS1 to SS4. It is also possible for the terminals TE1 to TE3 to be WAP terminals, UMTS terminals or just standard telephone terminals.
  • The control servers CC[0027] 1 and CC2 are used to support the charging of services supplied to the service users SU1 to SU3 by the service servers SS1 to SS4. In this case, on the one hand it is possible for the control servers CC1 and CC2 to be assigned in each case to one specific group of service users. The control server CC1 Processes, for example, all service requests of the subscribers of a specific network operator or Internet access operator. On the other hand, it is possible for the control servers CC1 and CC2 to be assigned in each case to one or more service servers. The control server CC2 Processes, for example, all service requests that are directed to services of a specific service operator.
  • Here service servers and control servers can also constitute logic function blocks that are implemented by applications programs running on the same hardware platform. [0028]
  • The charging systems BS[0029] 1 and BS2 constitute systems by which charges for the use of the telecommunication services are billed to the service users. In this case the charging systems BS1 and BS2 can reduce a sum of money previously paid in (pre-paid) by the respective charges incurred. There is an additional facility whereby the charges incurred in a specific time period are added and billed to the user at the end of the time period. The charging system BS1 can be, for example, the usual charging system of a first telephone network operator and the charging system BS2 that of a second telephone network operator. However, the charging systems BS1 and BS2 can in each case also be the payment system of a bank or credit institute.
  • To request a service, the terminal TE[0030] 1 of the service user SU1 sends a service request message to the service server SS1. This service request message can, for example, consist of an HTTP/IP (Hypertext Transport Protocol) message that is directed to the Internet address or the WEB address of the service server SS1. However, this service request message can also be a call request message of a telephone network, which is addressed to an IN service provided by the service server SS1.
  • The service request message is transmitted to the service server SS[0031] 1 via the communication networks KN1 and KN2, and via the control server CC1. For this, the routing line in the communication networks KN1 and KN2, or the addressing of the services provided by the service servers SS1 to SS4, is selected so that communication between the terminals TE1 to TE3 and the service server SS1 takes place via the control server CC1. The service request message and one or more replies of the service user SS1 sent out on the service request message are therefore routed via the control server CC1.
  • On receipt of the service request message from the terminal TE[0032] 1, the service server SS1 sends a reply to the terminal TE1. This reply can be used for the provision of the service. However, the exchange of several messages between the terminal TE1 and the service server SS1 can also take place before the service is provided by the service server SS1.
  • The control server CC[0033] 1 checks whether the reply from the service server SS1, or one of the replies from the service server SS1 contains an identification code that classifies the requested service as chargeable. This identification code can also consist of a symbol in the reply code or consist of a specific file name.
  • If this is the case, then the control server CC[0034] 1 carries out a procedure for authenticating the service user and determines from the result whether or not the charging of services being requested by the service user SU1 is supported by the control server. It is also possible for the service server to carry out this procedure independently of the reply from the service server. It is also possible for the service server to carry out this procedure only once in the case of successive requests from several services.
  • The procedure for authenticating the service user can also contain an authorisation procedure, pre-price information at the service user or an explicit sales confirmation by the service user. [0035]
  • The control server CC[0036] 1 thereupon prevents the provision of the requested service if the requested service is classified as chargeable and the control server has not determined that it supports the charging of services that are being requested by the service user. Here the control server CC1 can, for example, prevent the provision of the requested service by not forwarding replies from the service server SS1 to the terminal TE1 or not forwarding messages from the terminal TE1 to the service server SS1. The forwarding of an alternative content can replace the non-forwarding action. Furthermore, the control server can also send to the service server SS1 a special control message that prevents the provision of the service. This can also be done by means of a suitable manipulation of a message forwarded to the service server SS1.
  • The detailed mode of operation of the control server CC[0037] 1 is now explained with the aid of FIG. 2.
  • FIG. 2 shows the control server CC[0038] 1 that communicates with the terminals TE1 to TE3 and with the service servers SS1 to SS4, and with the charging system BS1.
  • The control server CC[0039] 1 has one or more interconnected computers and a software platform running on these computers. Several application programs run on this software platform. During the execution of these application programs on the system platform of the control server CC1, formed by the hardware and software platform, the control server CC1 is controlled in such a way that the control server CC1 carries out the function of the control server CC1 as described below. The application programs and the system platform needed to run the application programs thus form a control unit CONTR, which is configured in such a way that it carries out the functions of the control server CC1 as described below.
  • From a functional point of view, the control unit CONTR has three functions SH, AUT and LOG. [0040]
  • The AUT function carries out a procedure for authenticating service users. Using the result of the procedure, it determines whether or not the charging of services that are requested by a service user is supported by the control server. [0041]
  • During the procedure for the authentication of service users, the control server requests from the service user a user identification code, a password or an electronic signature, for example. Using these data, the function SH then checks which service user is requesting the service. [0042]
  • During the procedure for the authentication the service user, the control server CC[0043] 1 can also check the authorisation by a charging system. Only with positive authorisation does it determine that the charging of services that are requested by the service user is supported by the control server.
  • The authentication and authorisation of the service user can be implemented by the control unit CONTR alone or with the support of the charging system BS[0044] 1.
  • Data for authenticating the service user can be stored locally in the control server CC[0045] 1. Furthermore, data that specify an authorisation of the charging system BS1 for certain charges or for a certain charge level can be stored locally in the control server CC1 for the service user. A general authorisation for all charges incurred by a specific service user is also possible. These data specify a type of “pre-paid” account, for example, which is reduced by each payment process, or form a type of credit frame for charges incurred by the service user. Using these data, the AUT function checks the authentication of the service user and determines whether there is an authorisation for the respective charges in the context of the local, existing information. If the local frame is used up, then recourse is made to the charging system BS1. Especially in the case of small charges, this procedure has the advantage that the charging outlay is very small and the charging costs are reasonable in comparison with the incurred charges.
  • A further possibility is that a server of this charging system is accessed for checking the authorisation of the charging by the charging system BS[0046] 1. Using the transmitted data, this server determines whether it approves a charging procedure in every individual case.
  • The function SH processes the messages received by the control server CC[0047] 1, which come from the terminals TE1 to TE3 and from the service servers SS1 to SS4. For each request for a service by one of the terminals TE1 to TE3, which is routed via the control server CC1, a process is started by the function SH, that controls the Processing of the respective service session by the control server CC1. Three processes CH1 to CH3 are shown in FIG. 2 by way of example.
  • The process CH[0048] 1 is started on receipt of a service request message and forwards the service request message to that service server to which it is directed. It checks whether the reply or one of the replies of the service server to the service request message contains an identification code, which classifies the requested service as chargeable.
  • The process CH[0049] 1 further decides if and when the AUT function is carried out for this service session: the determination as to whether or not the charging of services being requested by the service user is supported by the control server CC1, can in this case be made at each request for a service. However, it is also possible for this determination to be valid for the request for two or more services.
  • With positive authorisation by another control server, for example by the control server CC[0050] 2, the process CH1 can dispense with the execution of the AUT function and determine that the charging of services requested by the service user is also supported by the control server CC1.
  • The process CH[0051] 1 further prevents the provision of the service requested by the service user if the requested service is classified as chargeable, and the AUT function has not determined that the control server CC1 supports the charging of services that are requested by this service user.
  • The LOG function stores data that provide information about the chargeable services requested by the individual service users. Such data concern, in particular, the level of these charges. The stored data are transmitted to the charging system BS[0052] 1 at specific intervals or directly for billing.
  • The detailed mode of operation of the control unit CONTR is also shown by the process sequences represented by way of example in FIGS. [0053] 3 to 6.
  • FIG. 3 illustrates the mode of operation of the control unit CONTR for the case where a non-chargeable service is requested by the terminal TE[0054] 1.
  • A service request message REQ[0055] 1, which contains the request for a specific HTML page, for example, is transmitted by the terminal TE1 to the control server CC1. The latter forwards the service request message REQ1 unchanged to the service server SS1. The service server SS1 transmits a reply ANS1, which contains the requested HTML page, for example, to the control server CC1. The control server CC1 checks the reply ANS1 and determines that this is not classified as chargeable. It therefore forwards the reply ANS1 unchanged to the terminal TE1.
  • FIG. 4 shows the mode of operation of the control unit CONTR for the case where a chargeable service is requested by the terminal TE[0056] 1.
  • A service request message REQ[0057] 2, which contains for example the request for a specific HTML page, is transmitted by the terminal TE1 to the control server CC1, which forwards the service request message REQ2 unchanged to the service server SS1. The service server SS1 transmits a reply ANS2(PT) to the control server CC1. The reply ANS2(PT) contains an identification code PT that classifies the requested service as chargeable. Furthermore, the identification code PT contains additional data that specify the level of charges, or refer to a specific charging system.
  • The control server CC[0058] 1 checks the reply ANS2(PT) and determines that this is classified as chargeable.
  • Since the reply ANS[0059] 2(PT) contains the identification code PT, which classifies the requested service as chargeable, the control server CC1 carries out a procedure for the authentication of service users. For this it sends an HTML page LOGP to the terminal TE1. This page requests the service user SU1 to enter data for his authentication and to confirm that he wishes to accept this chargeable service.
  • If the control server CC[0060] 1 hereupon receives a user name UN, a password PW and a confirmation PA, then it checks the authenticity of the service user SU1 and the authorisation for the charging. If the result of the authentication and authorisation is positive, then it determines that the charging of services requested by the service user SU1 is supported by the control server CC1 and sends a message AD to the service server SS1. On receipt of the message AD, the service server determines an authorisation code PAC and a session cookie SCOOK and transmits both to the control server CC1, which transmits these to the terminal TE1. Here the session cookie SCOOK contains a data record with service user-specific data.
  • Advantageously, both the session cookie SCOOK and the authorisation code PAC are provided with a specific expiry time. The session cookie SCOOK is given a parameter, for example, that instigates the erasure of the session cookie SCOOK from the memory of the terminal TE[0061] 1. The authorisation code PAC is stored in the control server CC1 along with the time instant at which it had been generated. The authorisation code then becomes invalid after about 1 minute.
  • The session cookie SCOOK can contain the following service user-specific data, for example: language of the service user, currency in which the service user wishes to pay, country in which the service user is located, service user's operator, service user's charging scheme, time instant at which the session cookie becomes invalid, identification code of the session, or IP address of the service. [0062]
  • These service user-specific data can of course also be communicated between service server SS[0063] 1 and terminal TE1 in another way.
  • It is also possible for the authorisation code PAC and the session cookie SCOOK to be determined directly by the control server SS[0064] 1 and transmitted to the terminal TE1.
  • The session cookie SCOOK is stored by the terminal TE[0065] 1. The terminal TE1 is then induced to transmit a new service request message REQ5 to the control server CC1. In this case the service request message REQ5 contains the authorisation code PAC and the session cookie SCOOK.
  • The control server detects the session cookie SCOOK in the service request message REQ[0066] 5, determines an assigned session code SC and forwards the service request message REQ5 with the session code SC instead of the session cookie SCOOK to the service server SS1. The service server SS1 now sends a reply ANS3 via the control server CC1 to the terminal TE1. The reply ANS3 contains the requested chargeable WEB page CONT, the authorisation code PAC and the session code SC.
  • It is advantageous to determine the session code SC along with the authorisation code PAC and transport them to the terminal TE[0067] 1 in the session cookie SCOOK. However, the session code SC can also be transmitted to the terminal TE1 in another reply.
  • The control server CC[0068] 1 now checks the reply ANS3 to see if the session code SC and the authorisation code PAC are correct.
  • Using the session code SC, the control server CC[0069] 1 detects that the service furnished by the reply ANS3 is chargeable. A reply which results in a non-chargeable service contains no session code (see exemplifying embodiment in FIG. 3).
  • Using the check of the session code SC and the authorisation code PAC, the control server CC[0070] 1 detects whether the control server CC1 has determined that it supports the charging of services of the service user SU1. If the authorisation code and the session code is correct, then this is the case. This check can be made, for example, by means of a database in which the valid authorisation code and the assigned session codes are stored.
  • If the control server CC[0071] 1 detects that the service is classified as chargeable, and the control server has determined that it supports the charging of services of the service user SU1, then it forwards the reply ANS3 to the terminal TE1. In this case it removes the session code SC and the authorisation code PAC from the reply ANS3. If this is not the case, then it prevents the provision of the requested service by not forwarding the reply ANS3 of the service server SS1 to the terminal TE1.
  • FIG. 5 shows an alternative exemplifying embodiment to the exemplifying embodiment of FIG. 4 for the case where the terminal TE[0072] 1 accepts no cookies.
  • The exemplifying embodiment of FIG. 5 corresponds to the that of FIG. 4, except for the following differences. [0073]
  • A service request message REQ[0074] 3 from the terminal TE2 is forwarded to the service server SS1 via the control server CC1. No session cookie SCOOK is generated on pages of the service server SS1 and the authorisation code PAC is transmitted without session cookie SCOOK to the terminal TE2. However, it is possible for the session code SC to be transmitted to the terminal. The service request REQ5 contains no session cookie SCOOK (some service user-specific data could therefore also not be communicated between terminal TE2 and control server CC1).
  • FIG. 6 explains the mode of operation of the control unit CONTR for the case where a chargeable service is requested by the terminal TE[0075] 1 and an authorisation code PAC has already been determined in an earlier service request and transmitted to the terminal TE1. This is the case, for example, if, in connection with the exemplifying embodiment in FIG. 4, a service of the service server SS1 is requested again by the terminal TE1.
  • A service request message REQ[0076] 4, which, for example, contains the request of a specific HTML page, is transmitted by the terminal TE1 to the control server CC1, which forwards the service request message REQ2 unchanged to the service server SS1. Here the service request message REQ4 contains the session code SC that has been transmitted to the terminal during an earlier request for a chargeable service. The service server SS1 transmits a reply ANS2(PT) to the control server CC1. The reply ANS2(PT) contains the identification code PT that classifies the requested service as chargeable. The reply ANS2(PT) also contains the session code SC.
  • The control server CC[0077] 1 checks the reply ANS2(PT) and determines that this is classified as chargeable. It further determines that the reply ANS2(PT) contains a valid session code SC.
  • Since the reply ANS[0078] 2(PT) contains the identification code PT, which classifies the requested service as chargeable, and the reply contains a valid session code SC, the control server CC1 does not carry out any procedure for the authentication of service users. Rather, it sends an HTML page CONFP to the terminal TE1. This page requests the service user SU1 to confirm that it wishes to accept this chargeable service. The transmission of the CONFP page could of course also be dispensed with.
  • The procedure for the authentication of service users is therefore not carried out if the reply from a service server to a service request message contains a valid session code. [0079]
  • If the service user SU[0080] 1 agrees with the request from the chargeable service, then the request message REQ5 with the authorisation code PAC and the session code SC is sent to the control server CC1. In this case the sending of this message and the management of the session code SC and the authorisation code PAC can be supported by the session cookie SCOOK, which is of course stored in the terminal TE1.
  • The request message REQ[0081] 5 is forwarded by the control server CC1 to the service server SS1, which then sends a reply ANS3 to the control server CC1. The reply ANS3 is handled by the control server CC1 like the reply ANS3 in FIG. 4.

Claims (16)

1. A method for supporting the charging of services that are provided to a service user by a service server, wherein a service request message for requesting a service is transmitted by a terminal of the service user via a communication network to the service server, wherein the service request message and one or more replies of the service server sent out on the service request message are routed via a control server, the control server carries out a procedure for the authentication of the service user and, using the result of the procedure, determines whether or not the charging of services requested by the service user is supported by the control server, the control server checks whether the reply of the service server contains an identification code that classifies the requested service as chargeable, and the control server prevents the provision of the requested service if the requested service is classified as chargeable and the control server has not determined that it supports the charging of services that are requested by the service user.
2. A method according to claim 1, wherein during the procedure for the authentication of the service user, the control server also checks the authorisation by a charging system, and only in the case of positive authorisation, determines that the charging of services requested by the service user is supported by the control server.
3. A method according to claim 2, wherein during the checking of the authorisation by a charging system, the control server accesses a server of the of the charging system.
4. A method according to claim 1, wherein in the event of positive authorisation by another control server, the control server determines that the charging of services requested by the service user is supported by the control server.
5. A method according to claim 1, wherein the determination as to whether or not the charging of services requested by the service user is supported by the control server, is made at each request for a service.
6. A method according to claim 1, wherein the determination as to whether or not the charging of services requested by the service user is supported by the control server, is valid for the request for two or more services.
7. A method according to claim 1, wherein the service request message and one or more of the replies of the service user sent out on the service request message are routed via a control server assigned to the service operator of the requested service.
8. Control server for supporting the charging of services that are provided to a service user by a service server, wherein the control server is provided with a control unit that is configured in such a way that it carries out a procedure for the authentication of service users and, using the result of the procedure, determines whether or not the charging of services requested by a service user is supported by the control server, that the control unit is further configured in such a way that it checks whether the reply of a service server to a service request message of a service user contains an identification code that classifies the requested service as chargeable, and the control unit is further configured in such a way that it prevents the provision of a service requested by a service user, if the requested service is classified as chargeable and said control unit has not determined that the control server supports the charging of services requested by this service user.
9. Control server according to claim 1, wherein the control unit is further configured in such a way that it prevents the provision of a service requested by a service user if the service user is not entitled to its use, or the service user does not authorise the payment required for use.
10. Control server according to claim 1, wherein the control unit is further configured in such a way that it forwards a service request message received by a terminal of a service user to a service server.
11. Control server according to claim 1, wherein the control unit is further configured in such a way that it carries out the procedure for the authentication of service users if the reply from a service server to a service request message of a service user contains an identification code, that classifies the requested service as chargeable.
12. Control server according to claim 1, wherein the control unit is further configured in such a way that it determines an authorisation code for a service user if it determines that the charging of services requested by the service user is supported by the control server, and that it transmits the authorisation code to the terminal of the service user.
13. Control server according to claim 1, wherein the control unit is further configured in such a way that it requests the service server to determine an authorisation code for a service user, if it determines that the charging of services requested by the service user is supported by the control server.
14. Control server according to claim 1, wherein the control unit is further configured in such a way that it determines a session code for a service user, if it determines that the charging of services requested by the service user is supported by the control server, and that it transmits the session code to the terminal of the service user, and that the control unit is further configured in such a way that it does not carry out the procedure for the authentication of service users if the reply from a service server to a service request message contains the session code.
15. Control server according to claim 1, wherein the control unit is further configured in such a way that it determines for a service user a data record with service user-specific data, in particular a cookie, and transmits it to the terminal of the service user.
16. Control server according to claim 1, wherein the control unit is further configured in such a way that it prevents the provision of a service requested by a service user, so that it does not forward a reply from the service server to a service request message to the terminal of the service user.
US10/262,851 2001-10-04 2002-10-03 Control server for supporting the charging of services Abandoned US20030069855A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE101491160.3 2001-10-04
DE10149116A DE10149116C1 (en) 2001-10-05 2001-10-05 Large bodywork element, in particular engine or front hood of a motor vehicle

Publications (1)

Publication Number Publication Date
US20030069855A1 true US20030069855A1 (en) 2003-04-10

Family

ID=7701471

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/262,851 Abandoned US20030069855A1 (en) 2001-10-04 2002-10-03 Control server for supporting the charging of services
US10/265,191 Expired - Lifetime US7104350B2 (en) 2001-10-05 2002-10-07 Large vehicle hood or trunk lid bodyshell element
US11/123,098 Abandoned US20050194821A1 (en) 2001-10-05 2005-05-06 Large vehicle hood or trunk lid bodyshell element

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/265,191 Expired - Lifetime US7104350B2 (en) 2001-10-05 2002-10-07 Large vehicle hood or trunk lid bodyshell element
US11/123,098 Abandoned US20050194821A1 (en) 2001-10-05 2005-05-06 Large vehicle hood or trunk lid bodyshell element

Country Status (4)

Country Link
US (3) US20030069855A1 (en)
EP (1) EP1300323B1 (en)
JP (1) JP3960894B2 (en)
DE (2) DE10149116C1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101592155B1 (en) 2008-03-14 2016-02-04 인터디지탈 패튼 홀딩스, 인크 Method and apparatus to deliver public warning messages

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602004012070T2 (en) * 2004-05-12 2009-03-26 Compagnie Plastic Omnium Holder for a stopper for a vehicle front hood
EP1842744B1 (en) * 2006-04-04 2011-10-26 Volvo Car Corporation A grille and bonnet assembly for a vehicle
US7815249B2 (en) * 2006-08-28 2010-10-19 Alcoa Inc. Lightweight hybrid material truck hood
WO2008109811A2 (en) * 2007-03-07 2008-09-12 Alcoa Inc. Pedestrian safe automotive hood having reinforcing foam
FR2920738B1 (en) 2007-09-06 2010-02-12 Peugeot Citroen Automobiles Sa HOOD FOR MOTOR VEHICLE.
EP2045146B1 (en) * 2007-10-03 2010-04-07 Ford Global Technologies, LLC Pedestrian Safety Bonnet Latch Structure for a Motor Vehicle
DE102008031012A1 (en) * 2008-06-30 2009-12-31 GM Global Technology Operations, Inc., Detroit Structural component for bonnet chassis structure of bonnet of e.g. motor vehicle, has function metal sheet and connection metal sheet, which are connected together by plastic structure, where metal sheet exhibits reinforcement element
US8534410B2 (en) * 2009-03-31 2013-09-17 Mazda Motor Corporation Pedestrian protection device for vehicle
DE202009017786U1 (en) * 2009-09-17 2010-06-17 GM Global Technology Operations, Inc., Detroit Body for a motor vehicle
DE102010019934A1 (en) * 2010-05-08 2011-11-10 Volkswagen Ag Body flap i.e. bonnet, for vehicle i.e. motor car, has absorbent foam dimensioned such that stiffener seam of inner shell is not filled or partly filled with foam during curing or binding of foam
DE102013113230A1 (en) * 2013-11-29 2015-06-03 Thyssenkrupp Steel Europe Ag A method for producing an outer lining part for a movable body part and a corresponding outer lining part
EP3936251B1 (en) * 2019-03-06 2023-10-04 Nippon Steel Corporation Car body structure

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2558332A1 (en) * 1975-12-23 1977-07-07 Porsche Ag Wall for motor vehicle construction - has plate or grid fixed to wall to provide stiffening
DE7822020U1 (en) * 1978-07-22 1978-11-30 Bayerische Motoren Werke Ag, 8000 Muenchen Foldable hood for a motor vehicle
JPS6010934Y2 (en) * 1979-02-27 1985-04-12 マツダ株式会社 Hinge bracket mounting structure
DE2934060A1 (en) * 1979-08-23 1981-03-26 Daimler-Benz Aktiengesellschaft, 70567 Stuttgart MOTOR VEHICLE, ESPECIALLY PERSONAL VEHICLES, WITH FLEXIBLE BODY FRONTS
DE2934430C2 (en) * 1979-08-25 1982-11-18 Audi Nsu Auto Union Ag, 7107 Neckarsulm Sandwich panel, in particular a flap for a motor vehicle body
DE3546050A1 (en) * 1985-12-24 1987-07-02 Ford Werke Ag PLASTIC COMPONENT, IN PARTICULAR SHOCK-ABSORBING BODY EXTERIOR FOR MOTOR VEHICLES
JPH0813623B2 (en) * 1990-06-18 1996-02-14 豊田合成株式会社 Seal structure on the front edge of the hood
CA2136134C (en) * 1994-04-25 1999-07-27 James E. Borchelt Light weight steel auto body construction
JP3494254B2 (en) * 1995-05-19 2004-02-09 本田技研工業株式会社 Hood edge structure
DE19615744C1 (en) * 1996-04-20 1997-06-05 Daimler Benz Ag Vehicle with several body parts each with outer skin movable on impact
JPH11198861A (en) * 1998-01-13 1999-07-27 Nissan Motor Co Ltd Vehicle hood side edge structure
FR2777240B1 (en) * 1998-04-09 2000-06-09 France Design REAR TRUNK FOR DISCOVERABLE VEHICLE WITH FOLDABLE ROOF, COMPRISING A REAR TRUNK AND A REAR BEACH
JP3957874B2 (en) 1998-05-13 2007-08-15 本田技研工業株式会社 Car bonnet
JP3531789B2 (en) * 1998-05-13 2004-05-31 本田技研工業株式会社 Car hood
DE19837083A1 (en) * 1998-08-17 2000-02-24 Volkswagen Ag Body component for the body of a motor vehicle
DE19851472A1 (en) * 1998-11-09 2000-05-11 Volkswagen Ag Body hood, in particular the front hood of a motor vehicle
DE19902311A1 (en) * 1999-01-21 2000-07-27 Volkswagen Ag Motor vehicle front hood designed as pedestrian protection
DE19929048B4 (en) * 1999-06-25 2006-10-05 Audi Ag Impact-soft front flap
EP1093980B1 (en) * 1999-10-21 2002-04-03 Ford Global Technologies, Inc., A subsidiary of Ford Motor Company Bonnet for motor vehicles with pedestrian protection
EP1286863B1 (en) * 2000-05-16 2004-10-20 Decoma E.S.E. Inc. Pedestrian protection assembly
US6386623B1 (en) * 2000-06-19 2002-05-14 Delphi Technologies, Inc. Automotive hood of inflatable character
US6375251B1 (en) * 2000-12-20 2002-04-23 Hamid Taghaddos Energy-absorbing structure for an automobile
JP4762438B2 (en) * 2001-05-18 2011-08-31 富士重工業株式会社 Front body structure of the vehicle
DE10126195C1 (en) * 2001-05-30 2002-11-14 Daimler Chrysler Ag Automobile front hood has reinforcing zone at side edge of outer skin supported from chassis via attached stop
DE10133894A1 (en) * 2001-07-12 2003-01-30 Arvinmeritor Gmbh Module for mounting on a vehicle body, in particular roof module, and method for producing and method for fastening a module

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101592155B1 (en) 2008-03-14 2016-02-04 인터디지탈 패튼 홀딩스, 인크 Method and apparatus to deliver public warning messages
KR101591963B1 (en) 2008-03-14 2016-02-15 인터디지탈 패튼 홀딩스, 인크 Method and apparatus to deliver public warning messages
US9648480B2 (en) 2008-03-14 2017-05-09 Interdigital Patent Holdings, Inc. Method and apparatus to deliver public warning messages

Also Published As

Publication number Publication date
US20050194821A1 (en) 2005-09-08
EP1300323A3 (en) 2004-01-28
JP2003160065A (en) 2003-06-03
US7104350B2 (en) 2006-09-12
JP3960894B2 (en) 2007-08-15
EP1300323A2 (en) 2003-04-09
DE10149116C1 (en) 2003-04-17
DE50202307D1 (en) 2005-03-31
EP1300323B1 (en) 2005-02-23
US20030098192A1 (en) 2003-05-29

Similar Documents

Publication Publication Date Title
US6829593B1 (en) Method and system to provide objects, especially documents, multimedia objects, software applications and/or processes to users of a telecommunications network
US7627315B2 (en) Telecommunications method and suitable system for establishing a connection with a mobile device
US7269251B1 (en) Method and system for billing subscribers in a telecommunication network
US20020116338A1 (en) Prepaid access to internet protocol (IP) networks
EP1777972A1 (en) A method and arrangement for enabling payments over a mobile telecommunication network
US20040077332A1 (en) Management of pre-paid billing system for wireless communication
EP1320214A1 (en) Unified account management for data network access
EP1264464A2 (en) A network-based billing method and system
WO1997040615A2 (en) Method for billing for transactions over the internet
CZ300940B6 (en) Method of using and accounting internet services by making use of radio telephony Method for using and charging Internet services via cellular telephone
EP1038249A1 (en) Real time subscriber billing at a subscriber location in an unstructured communication network
US6934372B1 (en) System and method for accessing the internet on a per-time-unit basis
WO2004036773A2 (en) System and method for sending sms and text messages
US7130612B1 (en) System and method for providing wireless services within a wireless local area network
CN1245574A (en) Method and system for performing electronic money transactions
US20030069855A1 (en) Control server for supporting the charging of services
AU2003237177A1 (en) Payment system and method
JP2004164598A (en) Methods for maintaining prepaid account information and for supporting transactions in an e-commerce system
US20030037013A1 (en) Web site access service providing system
EP1386470A2 (en) Architecture for providing services in the internet
RU2336654C1 (en) Method of providing voiceless services to mobile cell communication users and system for method implementation
WO2000044130A1 (en) A method, system and arrangement for providing services on the internet
FI109386B (en) Procedure for charging for charged Internet content or service
CN104094585B (en) In a communication network charging is carried out to calling
EP2107780A1 (en) Method and server for facilitating transfer of services between users

Legal Events

Date Code Title Description
AS Assignment

Owner name: ALCATEL, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HORMANN, THOMAS;PRINZ, NICHOLAS;REEL/FRAME:013549/0919

Effective date: 20021118

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION