Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User mobile phone safety privacy protection method based on two-dimensional codes

A privacy protection and mobile phone security technology, applied in the field of private calls, can solve the problems of waste of communication service resources, secondary leakage, etc., and achieve the effect of reducing operating costs, avoiding secondary leakage, and enhancing privacy protection

Inactive Publication Date: 2018-11-09
中国东盟信息港股份有限公司
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, in actual operation, the platform service account will always be occupied by user A. If it is applied to a large third-party platform, it will require millions of platform service accounts, thousands of platform service accounts, or even hundreds of millions of platform service accounts; However, the number of users who are talking at the same time is much lower than the number of users who want to use it, so setting a large number of platform service accounts will cause serious waste of communication service resources; and as a security and privacy requirement, using the same platform service account for a long time will also cause Invisible secondary leakage, especially causing unnecessary trouble for users who need to use it temporarily

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User mobile phone safety privacy protection method based on two-dimensional codes
  • User mobile phone safety privacy protection method based on two-dimensional codes
  • User mobile phone safety privacy protection method based on two-dimensional codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The specific implementation of the invention will be further described below in conjunction with the accompanying drawings.

[0039] Such as figure 1 As shown, it is a functional schematic diagram of the system of the present invention, which includes a client, which is installed and installed in the user's mobile phone to scan the code to call the front desk, to respond to the request from the client, to generate a two-dimensional code, identify two-dimensional code information and complete the intermediate The code number is dynamically assigned; the mapping relationship between the QR code and the user's mobile phone number is generated. The intermediate number platform is linked with the code scanning front desk and the telecom core network, and is used to respond to the binding service request from the scanning code calling front desk; generate a code number binding relationship. The relational database is connected with the QR code scanning front desk and the int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a user mobile phone safety privacy protection method based on two-dimensional codes, belonging to the technical field of privacy conversation. The method comprises thesteps of: obtaining two-dimensional codes and registration by a user through a mobile phone client; allowing a code-scanning call reception to respond to a client request, generating two-dimensional codes, identifying two-dimensional code information and completing dynamic distribution of the middle codes; generating a mapping relation of the two-dimensional codes and user mobile phone numbers bythe code-scanning call reception and storing the mapping relation to a relation database; allowing a middle number platform to be connected with the code-scanning call reception and a telecom core network to respond to a binding service request from the code-scanning call reception; generating a code number binding relation and performing storage; allowing the middle number platform to perform binding of calling party numbers, middle code numbers and called party numbers to generate a code number binding relation and perform storage; and finally, performing relay connection of the calling party numbers, the middle code numbers and the called party numbers in the conversation through the telecom core network. The user mobile phone safety privacy protection method can meet the demands of mobile phone number privacy protection in different conditions so as to save the communication service resources and reduce the operation cost.

Description

technical field [0001] The invention relates to the technical field of private calls, in particular to a two-dimensional code-based security and privacy protection method for user mobile phones. Background technique [0002] Since the era of mobile Internet, with the rapid development of e-commerce, mobile phone numbers have become more and more common as a transaction identification. Unlike in the past, mobile phone numbers were only transferred between friends, colleagues and acquaintances. In e-commerce, mobile phone numbers need to be provided to strangers who have never met before. Users have no understanding of these strangers who can access their mobile phone numbers. It is quite worrying to expose the mobile phone number to others. [0003] In fact, there are indeed reports of cases caused by the exposure of personal mobile phone numbers. The following are the two main types of impacts; 1) Exposure of sensitive information: Due to the needs of online shopping, infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/42G06K7/14
CPCG06K7/1417H04M3/42008
Inventor 刘作陈杨陈星辰韦云张强
Owner 中国东盟信息港股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products