Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting wireless beep pager by encoding handset codes

A technology of a messenger and a mobile phone, applied in the field of wireless messengers, can solve the problems of inability to know the information received by the messenger 22, loss of the operator, and inability to know.

Inactive Publication Date: 2005-05-04
E-TEN
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the technical field of wireless paging, such as figure 2 As shown, the base station 21 transmits information by wireless broadcasting, and can be received by the communication machines 22. Therefore, the system cannot know how many communication machines 22 are receiving information, and in order to ensure that only legitimate users can To be able to receive broadcast information, the general operator will give the communication machine at least an identification code when the user applies for renting the communication machine 22, for example, recorded in the read-only memory or flash memory, and the information transmitted by the system operator It also has an identification code, so that one or more communicators 22 with corresponding identification codes can receive the broadcast information. In addition, in order to further control or set specific communicators 22, the operator gives each communicator a corresponding The mobile phone code, this mobile phone code is customized by the operator, and is also burned in the read-only memory or flash memory. If the operator wants to send information to some specific communicators through the air, he will assign the mobile phone in the transmitted information. The mobile phone code, the mobile phone code is the mobile phone code corresponding to the specific communication machine 22, when the communication machine 22 receives the broadcast information, only the specific communication machine 22 with the corresponding mobile phone code will process and execute this information. Perform related settings and controls on the communication machine 22, such as opening, closing or changing the identification code, etc.
[0004] Under the above security mechanism of wireless paging, since the paging system cannot know the amount of information received by each communicator, the current charging method is that the operator charges the user a fixed monthly fee, regardless of the amount of information received by the user every month. How much information, with this structure, when the user rents a communication machine, he will get a set of legal identification code and mobile phone code, and can legally use the communication machine to receive information, and because the set of identification code and mobile phone code is Recorded in the memory of the communication machine, so the user may also directly copy (copy) the legal identification code and mobile phone code to other communication machines, so that multiple communication machines can receive information, and because the system operator is The information is transmitted by wireless broadcasting, so it is impossible to know how many communication machines with the same identification code and mobile phone code are receiving the information, but the user does only pay for one communication machine, which causes great losses to the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting wireless beep pager by encoding handset codes
  • Method for protecting wireless beep pager by encoding handset codes
  • Method for protecting wireless beep pager by encoding handset codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] See first image 3 , which is an implementation state diagram of a preferred embodiment of the present invention, wherein the information provider terminal 31 transmits the information by the base station 32 in the form of wireless broadcast, and can be received by the communication machine 33, which has The receiver 331 , microprocessor 332 , memory 333 , and display device 334 are arranged so that the receiver 331 can receive wireless broadcast information, store it in the memory 333 and display it on the display device 334 . Wherein, the memory 333 also stores an encoded mobile phone code ciphertext, such as Figure 4 The shown mobile phone code ciphertext generation flow chart, this mobile phone code ciphertext is when the user uses the communication machine 33, the system operator executes an encoding program for the mobile phone code of the communication machine 33 with at least one key value (key) Gain, and store this mobile phone code cipher text in the memory ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The beep pager possesses the coded hidden text of the handset codes. The hidden texi is obtained by executing the routine for compiling the handset codes of the beep pager with at least one key valuebeing used. With the information having additional handset codes being received, the beep pager executes the routine for decoding the hidden text of handsets with at least one key valiue so as to generate the handset codes, which is compared to the handset codes in the received information which is processed only both of codes are consistent.

Description

(1) Technical field [0001] The invention relates to a wireless communication machine, especially to a wireless communication machine and a method for protecting a mobile phone code coded. (2) Background technology [0002] In the field of communication technology, it is usually necessary to confirm the identity of the user and encrypt the data to achieve the security of data transmission. In terms of traditional two-way communication, such as figure 1 As shown, there is a server end 11 and a client end 12 at both ends of a two-way communication link. When the client kicks 12 to obtain the information of the server end 11, the general security mechanism is to use a user name (user name) and a password (password ) to log in to the server 11, the server 11 will transmit the information to the client 12 only after the login authentication is successful, so the security of data transmission can be realized. [0003] However, in the technical field of wireless paging, such as f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/14H04W88/18
Inventor 丁圣哲孔德华
Owner E-TEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products