Traffic-free security takeover method

A traffic-free and traffic-free identification technology, applied in the field of traffic-free security takeover, can solve problems such as threats to user information or property security, account information theft, data security threats, etc.

Active Publication Date: 2015-09-09
北京鸿享技术服务有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But as WiFi spreads, so does danger
Many criminals implant viruses into WiFi networks. When users access such WiFi networks, data security is seriously threatened.
Especially when accessing accou

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic-free security takeover method
  • Traffic-free security takeover method
  • Traffic-free security takeover method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0150] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that the present disclosure will be more thoroughly understood, and will fully convey the scope of the present disclosure to those skilled in the art.

[0151] The embodiments of the present invention provide a traffic-free security takeover method, a mobile terminal, a proxy server, a distribution server, and a system, so as to solve the technical problem of potential security risks when the mobile terminal of the prior art inputs account information in a WiFi network question.

[0152] The interaction method for a mobile terminal to access the network introduced in the em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traffic-free security takeover method. The traffic-free security takeover method comprises the following steps: when a mobile terminal detects that a network security risk exists, sending a data access request to a proxy server through the network of a mobile telecom carrier; receiving requested data which are acquired from a resource server by the proxy server based on the data access request through the network of the mobile telecom carrier, wherein a traffic-free mark is marked for data transmission in the network access process of the mobile terminal through the proxy server, and all or part of data traffics generated in the network access process of the mobile terminal through the proxy server are included in a designated service provider by the mobile telecom carrier based on the traffic-free mark.

Description

technical field [0001] The invention relates to the field of communication technologies, and in particular, to a method for safe takeover that can avoid traffic. Background technique [0002] With the continuous development of science and technology, there are more and more types of electronic products, and people also enjoy various conveniences brought by the development of science and technology. Now people can enjoy the comfortable life brought by the development of science and technology through various types of mobile terminals. For example, mobile terminals such as smartphones and tablet computers have become an important part of people's lives. Users can use mobile terminals such as smartphones and tablet computers to listen to music, play games, and make online payments. At the same time, the user can access the mobile terminal to a nearby WiFi (Wireless Fidelity, wireless fidelity) network for free Internet access without incurring expensive traffic charges. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08
CPCH04W12/08
Inventor 陈耀攀
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products