Check patentability & draft patents in minutes with Patsnap Eureka AI!

Second-hand mobile phone control authentication method and system, electronic equipment and storage medium

An authentication method and mobile phone technology, applied in branch office equipment, digital data authentication, telephone communication, etc., can solve problems such as no good way to find a lost mobile phone, search for manual judgments, etc., achieve automatic research and judgment and timely alarm capabilities, and improve Efficiency and workload reduction effect

Inactive Publication Date: 2021-05-18
航天神舟智慧系统技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It has played a certain role in the management and information entry of the second-hand mobile phone industry, but manual judgment is still required in terms of information sharing, suspicious mobile phone judgment, and search, and there is no good way to retrieve lost mobile phones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Second-hand mobile phone control authentication method and system, electronic equipment and storage medium
  • Second-hand mobile phone control authentication method and system, electronic equipment and storage medium
  • Second-hand mobile phone control authentication method and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0058] According to an embodiment of the present invention, the method for using the RSA encryption algorithm to carry out security authentication is:

[0059] Collect the serial code of the recycled mobile phone, gather the user name to generate the unique identification string of the basic user, call the merchant client data encryption service program encryption service program publicEncryptionsever to generate the public key and private key for the unique identification string.

[0060] According to an embodiment of the present invention, the serial code of the recovered mobile phone is collected, the user name is assembled to generate the unique identification string of the basic user, and the data encryption service program publicEncryptionsever of the merchant client that recovers the second-hand mobile phone is called to perform public key encryption on the unique identification string. and private key generation, including:

[0061] The first encryption service program...

Embodiment 1

[0128] The system application of this embodiment is mainly divided into three parts: information collection application at the Internet end, second-hand mobile phone control at the public security network end, and patrol management at the police communication end.

[0129] Internet application process:

[0130] The function points of the Internet terminal include registration, login, mobile phone information collection, employee collection, query statistics, employee management, home page display, policies and regulations, notices, password modification, personal center, and logout. General functions such as registration and login will not be introduced separately here, and the important processes related to business will be explained below.

[0131] Recycling registration process:

[0132] Such as image 3 As shown, in the recycling of second-hand mobile phone transactions, merchants need to register relevant information as required.

[0133] The process is as follows:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a second-hand mobile phone management and control authentication method and system, electronic equipment and a storage medium. The method comprises the steps of inputting identity information and mobile phone information of a mobile phone loser to a public security network end through an internet end; constructing a mobile phone loss database according to mobile phone loss information data at the Internet end; when a second-hand mobile phone is recycled, inputting identity information of a second-hand mobile phone holder and second-hand mobile phone information through an internet terminal; creating a second-hand mobile phone database according to the second-hand mobile phone information data of the internet end; carrying out collision analysis on the mobile phone loss database and the second-hand mobile phone database, and obtaining suspicion information and then sending the suspicion information to a police service terminal, wherein an RSA encryption algorithm is adopted for security authentication when identity information and mobile phone information of the mobile phone loser are input to the public security network end and suspicion information is acquired and then sent to the police service terminal. According to the method provided by the invention, the information automatic transmission of the second-hand mobile phone industry management of the public security service is realized, and the automatic study and judgment and timely alarm capability of the stolen and robbed mobile phone is realized.

Description

technical field [0001] The invention relates to a second-hand mobile phone management and authentication method, system, electronic equipment and storage medium. Background technique [0002] With the continuous popularization of mobile phones as communication tools, the replacement cycle of the mobile phone market is gradually shortened, and second-hand mobile phone transactions and markets have emerged. Due to the characteristics of various purchase channels, scattered recycling booths, and unknown sources of goods, it is easy to generate income. There is an urgent need for effective management of stolen goods and other phenomena. [0003] At present, for the management of second-hand mobile phones, paper ledgers have been used to register them, but due to cumbersome registration, difficult inspection, and ineffective results, they have given up using them. There is no supervision at this stage. With the growth of electronic products and replacement, second-hand mobile ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/72403H04W12/02H04W12/06G06F21/44G06F21/45G06F21/60G06F21/62G06F21/88
CPCG06F21/44G06F21/45G06F21/602G06F21/6218G06F21/88H04W12/02
Inventor 孔连锋孙继东张博郭佳任俊杰
Owner 航天神舟智慧系统技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More