Supercharge Your Innovation With Domain-Expert AI Agents!

User identification card and its remote destruction method, system and equipment

A user identification and remote technology, applied in the field of communication, can solve problems such as legal user property loss

Active Publication Date: 2020-03-17
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The criminals first use the forged ID card to reissue the user identification card bound to the bank card at the network of the communication operator, "abandon" the owner's mobile phone, then reset the online banking transaction password, and then use the intercepted text messages, etc. The dynamic verification code information transfers the funds in the user's bank card, resulting in heavy losses to the legal user's property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification card and its remote destruction method, system and equipment
  • User identification card and its remote destruction method, system and equipment
  • User identification card and its remote destruction method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] refer to figure 1 As shown, it is a schematic diagram of an application environment of a preferred embodiment of the method for remotely destroying a user identification card in the present invention.

[0096] The method for remotely destroying a user identification card can be executed by a communication device 1 and a user identification card 5 . In a preferred embodiment of the present invention, the communication device 1 may be a mobile phone, which is installed with the user identification card 5 .

[0097] The subscriber identification card 5 includes, but is not limited to, a customer identification module (Subscriber Identification Module, SIM) card, Micro SIM, Nano SIM, user identification module (User Identify Module, UIM) card, Micro UIM, Nano UIM card, etc.

[0098] In other preferred embodiments of the present invention, the communication device 1 may also be a dual-card mobile phone, and therefore, may also include a user identification card 6 .

[0099...

Embodiment 2

[0106] refer to figure 2 As shown, it is an implementation flowchart of a preferred embodiment of the detection of the user identification card in the method for remotely destroying the user identification card of the present invention. In a preferred embodiment of the present invention, the method for detecting a user identification card is executed by the communication device 1 .

[0107] According to different requirements, the execution sequence in the flow chart shown in this figure can be changed, and some can be omitted.

[0108] S01. The communication device 1 periodically initiates interaction with the operator network 7 corresponding to the user identity card 5 .

[0109] The interaction manner may include, but is not limited to, actively initiating a Tracking Area Update (Tracking Area Update, TAU), a Routing Area Update (Route Area Update, RAU), a Location Area Update (Location Area Update, LAU) and the like.

[0110] The period may include, for example, every 3...

Embodiment 3

[0119] refer to image 3 As shown, it is an implementation flow chart of a preferred embodiment of the remote transmission of the destruction instruction of the user identification card in the method for remotely destroying the user identification card of the present invention. In a preferred embodiment of the present invention, the method for remotely sending the user identity card destruction instruction is executed by the communication device 1 .

[0120] According to different requirements, the execution sequence in the flow chart shown in this figure can be changed, and some can be omitted.

[0121] S10, the communication device 1 judges whether a user ID card destruction command of the user is received.

[0122] In a preferred embodiment of the present invention, the communication device may provide a function option to send the user identity card destruction command. For example, the command to destroy the user identification card can be integrated in the “Settings” m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for remotely destroying a user identification card, comprising: periodically initiating interaction with an operator network corresponding to the user identification card, and outputting the user ID when the number of failures to initiate the network interaction reaches a preset number of times A reminder that the identity card may be illegally reissued; and when receiving the user’s user identity card destruction order, send the destruction instruction to the terminal installed with the user identity card that may be illegally reissued, so as to destroy the possible Illegally reissued user identification cards. The invention also provides a user identification card and its remote destruction system and equipment. The invention can achieve the purpose of destroying illegally reissued user identification cards by sending remote instructions, and prevent legal users from being damaged before reissued user identification cards.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a user identification card and its remote destruction method, system and equipment. Background technique [0002] Mobile payment, also known as mobile payment, is a service method that allows users to use their mobile communication devices (usually mobile phones) to pay for the goods or services they consume. Units or individuals directly or indirectly send payment instructions to banking and financial institutions through mobile devices, the Internet or proximity sensing to generate currency payment and fund transfer behaviors, thereby realizing the mobile payment function. Mobile payment usually needs to be bound with a user identification card (mobile phone card), therefore, the user identification card plays a vital role in the security of mobile payment. [0003] Mobile phones, bank cards, and ID cards are all around, but the deposits in the bank cards are mi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18H04W8/20H04W12/06H04Q9/00H04W12/71
CPCH04Q9/00H04W8/183H04W8/205H04W12/06H04Q2209/40
Inventor 张祖辉
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More