A safe takeover method that can avoid traffic

A traffic-free and traffic-free identification technology, which is applied in the field of traffic-free security takeover, can solve problems such as threats to user information or property security, data security threats, and account information theft.

Active Publication Date: 2019-05-21
北京鸿享技术服务有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But as WiFi spreads, so does danger
Many criminals implant viruses into WiFi networks. When users access such WiFi networks, data security is seriously threatened.
Especially when entering account information (for example: bank account information) in a WiFi network implanted with viruses, the account information may be stolen, which seriously threatens the user's information or property security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe takeover method that can avoid traffic
  • A safe takeover method that can avoid traffic
  • A safe takeover method that can avoid traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0149] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0150] The embodiment of the present invention provides a safe takeover method that can avoid traffic, a mobile terminal, a proxy server, a distribution server, and a system to solve the security risks that exist when a mobile terminal in the prior art enters account information in a WiFi network question.

[0151] The interactive method for the mobile terminal to access the network introduced by the embodiment of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a flow-free safe takeover method, comprising: when a mobile terminal detects that there is a network security risk, sending a data access request to a proxy server through the network of the mobile communication operator; receiving a data access request through the network of the mobile communication operator. The requested data obtained by the proxy server from the resource server based on the data access request; wherein, the data transmission in the process of the above-mentioned mobile terminal accessing the network through the proxy server is marked with a traffic-free mark, and the process of the mobile terminal accessing the network through the proxy server All or part of the data traffic generated in the mobile communication operator will be included in the designated service provider based on the traffic-free identification.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a traffic-free safe takeover method. Background technique [0002] With the continuous development of science and technology, there are more and more types of electronic products, and people enjoy various conveniences brought about by the development of science and technology. Now people can enjoy the comfortable life brought by the development of science and technology through various types of mobile terminals. For example, mobile terminals such as smartphones and tablet computers have become an important part of people's lives. Users can use mobile terminals such as smartphones and tablet computers to listen to music, play games, and make online payments. At the same time, the user can connect the mobile terminal to a nearby WiFi (Wireless Fidelity, Wireless Fidelity) network to surf the Internet for free without having to bear expensive traffic charges. [0003] Howev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04W12/08
CPCH04W12/08
Inventor 陈耀攀
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products