The unused internal resources, technical safety.
Reduction of motivations to offences in system JVPsйа . The organization of access to under a
site.
All possible changes have
administrative character and do not demand expenses.
аThe
proof of real safety in insurances of mobile phones.
аAvailable
internal reserves of system.
1. а аNumber of the subscriber
- unique.
2. а аIMEA - an internal phone
number - unique.
3. а аOperators have the
protected digital system of data transmission, much bit enciphering of the
channel on air.аа
4. а аCellular distribution of
retransmitters with binding on district.
5. а аthe Opportunity of the
control of an arrangement in a cover zone of all bells.
6. а аthe Arrangement of the
mobile phone to within tens meters.
7. а аOperators of mobile
communicationblock area of reception up to 1 kilometers in radius from last
retransmitter.
8. а аNot availability from the outside to the
data of passage and processing of user's numbers. The accessible
information on system of work of the operator of mobile communication.
Through the Internet, it is carried out through systems of external and
internal safety.
9. а аOperators of mobile communicationhave the
legitimate right for reception and accumulation of the sums for the obverse
settlement account of the subscriber, through the state organizations.
10. ааааа аthere Are accounting programs accepted
officially for tax service.
11. ааааа аestimations of risk of loss and breakage
under insurance tables Are subject. *straxRos.doc*
12. ааааа аProgram protection and security service of
the operator of mobile communication.
13. ааааа аLaws of the country.
14. ааааа аAre protected it is
hardware - an opportunity of switching-off of the stolen phones at all
operators.
Check at registration of a member of system JVPsйа .
Registration in interior is lawful and voluntary step at
registration of insurance of the mobile phone from plunder. It is
stipulated in the contract at registration.
The client gives the document certifying the person.
Photographing of the person of the client occurs from the registered
phone of the interior, having the built - in digital camera. GPRS/
The photo is sent on a code on under a site of the client from the
instruction of the post address and given passports. The signature to a
photo is the user's phone number of the client.
The mobile phone.
With the mobile phone of the client, the worker of interior, makes a
bell with a base code *0*0*0*
The reception equipment a retransmitter number їїї (the area is determined
on plans of cellular communication) - the nearest to the subscriber will
take up processing a signal from the mobile phone.
Number of the subscriber, internal number-IMEA, time of a bell and
his duration about seconds, number of a set - are determinedа with the program of processing of signals
between subscribers of the operator of mobile communication. It will be
worn out in a database on the subscriber. According to the tariff - make
financial operation. As occurs further calculations on obverse to the
account of the subscriber supervises tax management the given information
under the maintenance and essence, is the official information. That is the
proof accepted in court or other state bodies. Such as - the trading
organizations, bank and financial services.
For today - the given opportunity in use of the information on
bells, as such, are not used to the full.
Supported with a photo of the client and his nameplate data on under
a site - registration of a bell by the operator of mobile communicationhas
the completed kind, the checked up data on the client, for his
personification in system JVPsйаа and
giving to it of rights according to the contract.
All operations with a code of system JVPsйаа - * - in the beginning of processing by
the operator of acting numbers, pass separately from the general base of
the colloquial channel, do not prevent work of operators of mobile
communication. That is stipulated by the software in all used computers for
processing the information on bells.
That does not demand what or changes in system of work of operators
of mobile communication.
Installation of the filter on the information on a set - *0*0*0* and
other codes - is solved in the administrative way and does not demand
monetary expenses.
In calculations of the filter are used a combination up to 7 groups
of figures.
Code of the country - two times. - 3 figures
Numbers of subscribers - two times - up to 10 figures
The sum of insurance operation
Code the module of tax management - 1 time - 1 figure (0 or 1)
Division in a code of system JVPsйаа
- occurs symbols - * and *
Code the module of base system - once - 3 figures.
Kind of a processable signal for the program of processing of the
information of system JVPsйа а
*a*b*c*d* - not the full module of the order
*a*b*c*d*e*a*b* - the full code - module for tax management.
*f* - a code of access,
All other combinations for execution in system JVPsйаа occur from the given combinations.
The given list of codes - * operator1.doc*
Passive check occurs in a database of the
operator of mobile communication.
In a database Number of the subscriber,
internal number-IMEA typed clients a base code *0*0*0* are entered.
As the data of the stolen phones. Use of
such base allows to not connect the stolen phone at other operators of
mobile communicationin territory of the country.
That considerably will reduce motivation to
plunder of mobile phones, will destroy the most part of the black market of
the stolen phones, official sale will increase. Experience of Australia *avstr.doc*
The message on plunder of the mobile phone
is made by trusted people of the subscriber.
1
From the specified
phones a member of system (social guarantors) also have very high rating at
an estimation in system of insurance. All user's numbers of social
guarantors - should not be in system JVPsй. For acknowledgement of the fact
of theft it will be necessary for client of system to organize bells of
social guarantors to the operator of mobile communication.
2
As a set *0*0 *
the phone of a cell * - the
general message on an insurance case (the phone is stolen),
аааааа Cancellation
of operation on a code in the module.
аEXAMPLE - *0*0*1234567890 * - the general message on
an insurance case (the phone is stolen), a cancellation of operation on a
code in the module. The phone number 1234567890 On statistics casual
concurrence of a set of a code from 10 figures at four guarantors is stolen during term stipulated in
the contract till 3 - is not possible.
The set of the given combination at four
persons testifies to presence of the real fact of plunder or group of
malefactors. In any case the system pays the sum of the insurance.
On the active control numbers of social
guarantors and IMEA phones are put. If in group of cross numbers there will
be an attempt to take advantage stolen phone - with big share of
probability is possible to assume the fact of swindle.
Ways of realization of mobile phones at
household larceny it is limited to city of residing. At attempt to realize
in the other city or at the operator ьё. - the operator has an opportunity to supervise all phone numbers
in the nearest environment from the retransmitter which has taken on
service of the stolen phone, determined on IMEA.
At concurrence IMEA of phones and user's
numbers it is possible to calculate a criminal. The given information is in
mathematics demonstrable, the technique is applied in law enforcement
bodies. On the fact of plunder excitation of criminal case is possible.
On the basis of the charter of system
All operations in cells with number of
social guarantors stop according to the contract. There is an informing
members of a cell on the fact of plunder.
Cross numbers of subscribers submit to
mathematical laws and there is an opportunity of calculation of groups,
their mutual relation.
At attempt of use of the stolen phone - the
operator has the right (according to the contract) to block SIM a card
inserted in the phone. That facilitates work to law enforcement bodies
further will reduce motivation to plunder of mobile phones. (the Developed
module)
Large cities have some operators that
facilitates detection of the stolen phone.
All operators use the Internet sites for granting the information to
clients.
At registration of the client by the worker of interior it is filled
the data on the client in a pattern under a site.
Including base data - the Surname the Name the Patronymic, date of
birth, the post address, a photo of the client. The client at own
discretion independently may give other data.
The mechanism of the organization of access to the client to a site
is standard.
аExcept
for a set of the password to access to time under a site where there is a
got product in an electronic kind.а
At a set *0*0*0* on the mobile phone of registered client JVPsйаа - after check of concurrence of user's
number, IMEA and IP-the address opens access on IP-to the client.
аThe
password is given by the operatorа At
a bell of the subscriber with a base code for a while the stipulated
contract (during 3-5 minutes).а
The given technique precisely allows to determinetime of reception
from a site of the seller a product in an electronic kind - end of trading
operation, payment of the insurance sums. Thus the legal owner on product
is precisely determined.
It the motivation to piracy distribution of illegal copies decreases
*0*0*0* - the name of a site in protected zone JVPsйа _*0*0*0*.
аJVPsйа _ The countries number of the subscriber
* - the name under a site.
All operations occur on computers of the operator of mobile
communication , are supervised by tax management, post the Internet
service.
а-
An electronic card of the owner of a phone number - JVPsйаа a card .
Comprises a part controllable by tax management and the operator of
mobile communication.
Voluntary given data, with the right on the state protection on the
basis of the Law on copyrights. Attempt not competent use another's
JVPsйаа cards or the mobile phone may
be pursued as for a fake of official documents.
The information
allocated with red color is illegal.
It is given
only for acquaintance - as the fact of existence in the Internet
|