CounterPath Store

Buy - CounterPath Bria

for Windows, Mac and iOS/Android Devices

Interested in buying Bria for Windows?

Buy Now

Blockchain Series Part 2: The CounterPath Solution

By Michael Doyle

Following up on part one of this series, we're moving on to discuss blockchain and cryptocurrencies in more detail. Here at CounterPath, we're still in the preliminary stages of blockchain research, but here is a brief overview of how it will work. 

Micro Billing Transactions

As described above, new service billing options will allow end users to be invoiced in a micro transaction, directly related to service usage and split up in ways that, crucially, suit the customer’s requirements. For example, I may not want to pay for an entire year’s subscription to “all-you-can-eat” screen-sharing and conferencing at price X, when I can pay infrequently based on time and duration of use, and numbers of participants, along with whether I choose HD or standard content. This is already applied in other industry segments – if you choose to rent an Amazon or Comcast video, you are often offered HD or standard versions, each with a different price.


Blockchains are decentralized and distributed digital ledgers, specifically designed to allow transactions of any nature, to be recorded in a way that is immutable. This provides the audit trail we need to see what CounterPath services have been requested, and to enable the correct fees to be applied to the VAR or end user. As there is a chain of secured transactions, part of which may be the upsold and non-CounterPath products that the VAR offers as part of their extended service, this gives the customer, the VAR, and CounterPath everything they need to be assured of the validity of the transaction and the identity of the customer. So we can be confident that only those that have paid, receive the service due. Of course, this is bi-directional, ensuring those that have paid receive what they expect. Fraud and service misuse, already present in many other service environments, is significantly mitigated if not removed entirely.

Smart Contracts

The use of smart contracts within this environment also allows discounted or multi-tier services to be offered based on a broad range of options, subsequently triggered by the smart contract script. For example, initially infrequent followed by bulk use of screen share, collaboration or other such services may be automatically discounted as part of a smart contract arrangement. This discount can be applied directly and without further engagement, as use of the service fluctuates around preset triggered thresholds.


Authentication and Authorization with Peer-to-Peer Distribution

The blockchain approach also enables identity authentication and authorisation as a one-off process. Thereafter, that initial secured transaction assures that the person or company requesting the service is really who they say they are and no further authentication is required. This has significant impact when we consider the increased mobility of our users. As they traverse networks, countries and regions their services and profile moves with them, transparently but securely.

One other aspect of blockchain propagation also leads to an elegant solution for authorization as an alternative to trusted third-party servers. Blockchain uses a peer-to-peer approach for distribution and synchronization of the blockchain transactions. When coupled with service slicing and loaning or sharing of those services amongst other users, this can be a complicated problem to solve if users do not want to use a trusted server hosted in some remote location and shared or timestamped tokens, such as OAuth 2.0 (via OpenID Connect or UMA).

For example, if I subscribe to a screen share solution, and wish to allow a colleague to use the subscription, I would typically have to provide them my login credentials. This is normally not allowed by the terms of service and in general is not an advisable solution. A CounterPath blockchain alternative would be to provide a micro-loan transaction between the two people, independent of a third party server, which authorized the use of the screen share solution for a period of time, or limited number of uses. The blockchain would then be used to authorise, authenticate and distribute that “permission note”. This would take the form of actual payment for use of the service subscription owned by the first party, or an alternative virtual currency transaction that has minimal or no intrinsic value for providing access, but carries the provisioning and permission details for the service. As both parties are using their private keys, this would not be reusable by anyone else, and a smart contract could be used to limit the duration or frequency of use for the permission. Blockchain transaction processing requires some payment during the verification of the transaction (the mining) and associated handling fees, so there would need to be some payment attached for it to be part of the existing blockchains.


An example of the sharing process in today’s services might be subscriptions such as the Readly magazine app, or Microsoft Office 365, whose users are actively encouraged to share the service, which can mitigate the cost. However, both these solutions require users to identify and authenticate directly with Readly servers or Microsoft platforms. It is not designed for micro or temporary usage, and is unsuitable if you do not wish all your details stored at these companies servers.

Blockchain offers an alternative to this through its native peer-to-peer design.

Stay tuned for the final instalment of this blockchain series, where we wrap up our thoughts on crypto! 

In the meantime, be sure to visit our website to learn more about CounterPath:

Learn More

Michael Doyle

About Michael Doyle

In his role as Vice President, Technology, Michael Doyle focuses on helping to shape our product and solutions roadmap for broader applicability and evangelizing the total CounterPath solution to customers and partners. Michael has worked in the technology industry for over 20 years and brings a wealth of experience and talent across a broad range of disciplines. Michael holds a Bachelor's of Science degree in Computer Science from University College London. In 2006, he was named one of the Top 100 voices of IP Communications.

Subscribe to our blog

Posts by Tag

See all