Abstract
To be able to recognize fraud as well as faults in the charging process and thus to avoid incorrect bills, this paper presents a verifiable method of charge accounting by introducing charge tokens which mark beginning and end of chargeable service utilisations. Ingenious and applicable charging quantities and types, different methods of charge accounting as well as the handling of charge tokens are discussed. To avoid injustices on charges resulting from forced disconnections intermediate service tokens will bound the risk of having to bear costs in case of a not correctly signalized service end to a calculable limit. Furthermore, the different confidential relationships between service user and provider existing for each charging variant are described, the requirements on the charge tokens are defined and their conversion into protocol data units is demonstrated.
Chapter PDF
Similar content being viewed by others
Keywords
References
Federrath, Hannes; Jerichow, Anja; Kesdogan, Dogan; Pfitzmann, Andreas: Tech-nischer Datenschutz in öffentlichen Mobilkommunikationsnetzen. Wissenschaftliche Zeitschrift der TU Dresden, 1995.
International Organisation for Standardization (ISO): Open Systems Interconnection: Basic Reference Model. International Standard ISO 7498, 1983.
International Organisation for Standardization (ISO): Information technology-Security techniques-Digital signature scheme giving message recovery. ISO/IEC 9796, 1991.
International Organisation for Standardization (ISO): Entity authentication mechanisms — Part3: Entity authentication using a public-key algorithm. Draft International Standard ISO DIS 9798–3,1992.
International Organisation for Standardization (ISO): Information technology-Open Systems Interconnection — Security frameworks in Open Systems — Part 4: Non-repudiation. ISO/IEC DIS 10181–4.2, 1995.
International Organisation for Standardization (ISO): Information technology- Security techniques-Non-repudiation — Part 1: General Model. 2nd ISO/ IEC CD 13888–1,1995.
International Organisation for Standardization (ISO): Information technology-Security techniques-Non-repudiation — Part 3: Using asymmetric techniques. ISO/ IEC CD 13888–3, 1995.
International Organisation for Standardization (ISO): Information technology-Security techniques - Digital signatures with appendix. ISO/IEC CD 14888.
Ruland, Christoph: Informationssicherheit in Datennetzen. DataCom — Verlag,Bergheim, 1993.
Pütz, Stefan: Neue Lösungsansätze für Authentikation in künftigen Mobilfunk-systemen. 2. ITG -Fachtagung „Mobile Kommunikation ’95. ITG–Fachbericht 135, vde-Verlag GmbH, Berlin, Offenbach, 1995, S. 411–422, Hrsg.: Walke, B.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Piltz, S. (1996). Secure Billing — Incontestable Charging. In: Horster, P. (eds) Communications and Multimedia Security II. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35083-7_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-35083-7_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2931-2
Online ISBN: 978-0-387-35083-7
eBook Packages: Springer Book Archive