Customized protection method for user mobile phone security privacy based on USSD and two-dimensional code

A mobile phone security and two-dimensional code technology, which is applied in the field of private calls, can solve problems such as secondary leakage and waste of communication service resources, and achieve the effects of reducing operating costs, saving communication service resources, and enhancing privacy protection

Active Publication Date: 2018-11-06
中国东盟信息港股份有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, in actual operation, the platform service account will always be occupied by user A. If it is applied to a large third-party platform, it will require millions of platform service accounts, thousands of platform service accounts, or even hundreds of millions of platform service accounts; However, the number of users who are talking at the same time is much lower than the number of users who want to use it, so setting a large number of platform service accounts will cause serious waste of communication service resources; and as a security and privacy requirement, using the same platform service account for a long time will also cause Invisible secondary leakage, especially causing unnecessary trouble for users who need to use it temporarily

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Customized protection method for user mobile phone security privacy based on USSD and two-dimensional code
  • Customized protection method for user mobile phone security privacy based on USSD and two-dimensional code
  • Customized protection method for user mobile phone security privacy based on USSD and two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific implementation of the invention will be further described below in conjunction with the accompanying drawings.

[0040] Such as figure 1 As shown, the functional schematic diagram of the system of the present invention includes a client terminal, which is installed in the user's mobile phone terminal. Scanning the code to call the front desk is used to respond to the request from the client, to generate the QR code, identify the QR code information and complete the dynamic allocation of the intermediate code number; generate the mapping relationship between the QR code and the user's mobile phone number and purpose prompts. The intermediate number platform is linked with the code scanning front desk and the telecom core network, and is used to respond to the binding service request from the scanning code calling front desk; generate a code number binding relationship. The USSD service platform is used to respond to the text push request sent by the code sc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a customized protection method for user mobile phone security privacy based on USSD and a two-dimensional code, belonging to the technical field of private communication. The customized protection method for user mobile phone security privacy based on the USSD and the two-dimensional code comprises the following steps: a user obtains the two-dimensional code and registers through a mobile phone client; a scanning call front desk responds to a request of the client, generates the two-dimensional code, identifies the two-dimensional code information and completes dynamicallocation of the intermediate code number; an intermediate number platform responds to a binding service request from the scanning call front desk, generates the number binding relationship and stores; the intermediate number platform binds the calling user number-the intermediate number-the called user number to generate the binding relationship of the code numbers and stores; the telephone channel relay connection of the call user number to the intermediate number, and the intermediate number to the called user number is made through the core network of the telecommunication; and the USSD service platform responds to the text push request from the canning call front desk and pushes the text prompt message to the user terminal. The invention can meet the needs of privacy protection of mobile phone number of users under different circumstances, save service resources and reduce operation costs.

Description

technical field [0001] The invention relates to the technical field of private calls, in particular to a user mobile phone security and privacy customized protection method based on USSD and two-dimensional codes. Background technique [0002] Since the era of mobile Internet, with the rapid development of e-commerce, mobile phone numbers have become more and more common as a transaction identification. Unlike in the past, mobile phone numbers were only transferred between friends, colleagues and acquaintances. In e-commerce, mobile phone numbers need to be provided to strangers who have never met before. Users have no understanding of these strangers who can access their mobile phone numbers. It is quite worrying to expose the mobile phone number to others. [0003] In fact, there are indeed reports of cases caused by the exposure of personal mobile phone numbers. The following are the two main types of impacts; 1) Exposure of sensitive information: Due to the needs of onl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/42G06K7/14G06K17/00
CPCG06K7/1417G06K17/00H04M3/42008H04M3/42382
Inventor 刘作陈杨陈星辰王建明罗一鸣韦云张强
Owner 中国东盟信息港股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products