Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security audit of communication data realized through authentication codes

A communication data and security auditing technology, applied in the field of mobile communication and the Internet, can solve problems such as beneficial prompts to prevent harassment or fraud, inability to harass or harm, and weakening of communication tool capabilities, so as to solve vicious fraud and realize effective supervision Effect

Inactive Publication Date: 2015-11-04
CHONGQING ZHITAO INFORMATION TECH CENT
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This does not prohibit the problem of harassment or harm to the receiving user contained in the short message. The bigger problem is that there is no useful reminder for the user and anti-harassment or fraud prevention measures, so that some operators do not need to bear their own responsibility. It is not in line with the actual needs of users and the law to assume responsibility, but to partner with unethical short message service operators to release information that causes harm to some users.
[0004] It is set that the communication data sent by the operator's base station has been effectively reviewed by the operator. In fact, this is also the statutory business of the operator as an operator. Otherwise, the operator should bear the compensation for the losses caused to users; Otherwise, high-intensity prohibition and interception will be adopted, which will inevitably lead to the failure of operators to achieve relevant commercial purposes based on this channel, and the communication tool capabilities desired by users will also be greatly weakened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security audit of communication data realized through authentication codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following description of specific embodiments of the present invention in conjunction with the accompanying drawings is merely an introduction to one of the technical implementation modes. It should be understood that the embodiments described here are only used to illustrate and explain the present invention, not to limit the present invention.

[0024] Realizing the security audit of communication data through the authentication code of the present invention includes the following technical implementation process:

[0025] S1. Write an authentication code into the communication data transmitted through the mobile base station 103 of the operator or through the WIFI hotspot 104 through security authentication.

[0026] S2. The mobile terminal 101 of the user obtains the communication data, and reads the authentication code through the reading service module 1021 of the security control 102 .

[0027] S3. The matching and comparison service module 1022 of the secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the security audit of communication data realized through authentication codes, through a service provider central switch system and / or a mobile district base station and / or WIFI hot spots, authentication codes are written in communication data. When the communication data is read in a user terminal, the communication data is determined to be safe information if effective authentication codes are written in communication data. Otherwise, prompt will be automatically given to a user. According to the invention, problems of the user are solved from the angle of the user. In a mode of repeatedly educating the user and with consideration of application advantages of other technical schemes, telecommunication fraud problems are effectively and thoroughly solved.

Description

technical field [0001] The present invention relates to mobile communication and Internet-related technologies. An authentication code is written in the transmitted communication data through the operator's central exchange system and / or through the base station of the mobile cell. If there is an authentication code, it is security information, and if there is no authentication code, the user will be automatically reminded. The present invention fundamentally solves the difficult problem of vicious fraud of false base stations, and realizes effective supervision of communication data. Background technique [0002] Telecommunications fraud, especially the malicious fraud caused by fake base stations or stolen WIFI hotspots, has become a social cancer that is hated by the majority of users. How to eradicate this malignant tumor and how to solve this social problem technically are issues that must be urgently resolved in the network communication industry. [0003] The publis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/12H04W12/122
CPCH04L63/08H04W12/06H04W12/12
Inventor 任明和
Owner CHONGQING ZHITAO INFORMATION TECH CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products