Second-hand mobile phone control authentication method and system, electronic equipment and storage medium
An authentication method and mobile phone technology, applied in branch office equipment, digital data authentication, telephone communication, etc., can solve problems such as no good way to find a lost mobile phone, search for manual judgments, etc., achieve automatic research and judgment and timely alarm capabilities, and improve Efficiency and workload reduction effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0058] According to an embodiment of the present invention, the method for using the RSA encryption algorithm to carry out security authentication is:
[0059] Collect the serial code of the recycled mobile phone, gather the user name to generate the unique identification string of the basic user, call the merchant client data encryption service program encryption service program publicEncryptionsever to generate the public key and private key for the unique identification string.
[0060] According to an embodiment of the present invention, the serial code of the recovered mobile phone is collected, the user name is assembled to generate the unique identification string of the basic user, and the data encryption service program publicEncryptionsever of the merchant client that recovers the second-hand mobile phone is called to perform public key encryption on the unique identification string. and private key generation, including:
[0061] The first encryption service program...
Embodiment 1
[0128] The system application of this embodiment is mainly divided into three parts: information collection application at the Internet end, second-hand mobile phone control at the public security network end, and patrol management at the police communication end.
[0129] Internet application process:
[0130] The function points of the Internet terminal include registration, login, mobile phone information collection, employee collection, query statistics, employee management, home page display, policies and regulations, notices, password modification, personal center, and logout. General functions such as registration and login will not be introduced separately here, and the important processes related to business will be explained below.
[0131] Recycling registration process:
[0132] Such as image 3 As shown, in the recycling of second-hand mobile phone transactions, merchants need to register relevant information as required.
[0133] The process is as follows:
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



