Secure Billing — Incontestable Charging

  • S. Piltz
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)


To be able to recognize fraud as well as faults in the charging process and thus to avoid incorrect bills, this paper presents a verifiable method of charge accounting by introducing charge tokens which mark beginning and end of chargeable service utilisations. Ingenious and applicable charging quantities and types, different methods of charge accounting as well as the handling of charge tokens are discussed. To avoid injustices on charges resulting from forced disconnections intermediate service tokens will bound the risk of having to bear costs in case of a not correctly signalized service end to a calculable limit. Furthermore, the different confidential relationships between service user and provider existing for each charging variant are described, the requirements on the charge tokens are defined and their conversion into protocol data units is demonstrated.


Secure billing incontestable charging security techniques non-repudiation digital signatures asymmetric cryptographic mechanisms timestamps confidential relationship 


  1. FJKP_95.
    Federrath, Hannes; Jerichow, Anja; Kesdogan, Dogan; Pfitzmann, Andreas: Tech-nischer Datenschutz in öffentlichen Mobilkommunikationsnetzen. Wissenschaftliche Zeitschrift der TU Dresden, 1995.Google Scholar
  2. ISO_7498.
    International Organisation for Standardization (ISO): Open Systems Interconnection: Basic Reference Model. International Standard ISO 7498, 1983.Google Scholar
  3. ISO_9796.
    International Organisation for Standardization (ISO): Information technology-Security techniques-Digital signature scheme giving message recovery. ISO/IEC 9796, 1991.Google Scholar
  4. ISO_9798.
    International Organisation for Standardization (ISO): Entity authentication mechanisms — Part3: Entity authentication using a public-key algorithm. Draft International Standard ISO DIS 9798–3,1992.Google Scholar
  5. ISO_10181.
    International Organisation for Standardization (ISO): Information technology-Open Systems Interconnection — Security frameworks in Open Systems — Part 4: Non-repudiation. ISO/IEC DIS 10181–4.2, 1995.Google Scholar
  6. ISO_13888–1.
    International Organisation for Standardization (ISO): Information technology- Security techniques-Non-repudiation — Part 1: General Model. 2nd ISO/ IEC CD 13888–1,1995.Google Scholar
  7. ISO_13888–3.
    International Organisation for Standardization (ISO): Information technology-Security techniques-Non-repudiation — Part 3: Using asymmetric techniques. ISO/ IEC CD 13888–3, 1995.Google Scholar
  8. ISO_14888.
    International Organisation for Standardization (ISO): Information technology-Security techniques - Digital signatures with appendix. ISO/IEC CD 14888.Google Scholar
  9. Ru1a_93.
    Ruland, Christoph: Informationssicherheit in Datennetzen. DataCom — Verlag,Bergheim, 1993.Google Scholar
  10. Pütz_95.
    Pütz, Stefan: Neue Lösungsansätze für Authentikation in künftigen Mobilfunk-systemen. 2. ITG -Fachtagung „Mobile Kommunikation ’95. ITG–Fachbericht 135, vde-Verlag GmbH, Berlin, Offenbach, 1995, S. 411–422, Hrsg.: Walke, B.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • S. Piltz
    • 1
  1. 1.Department for Electrical Engineering and InformaticsUniversity of SiegenSiegenGermany

Personalised recommendations