JVPsй

 

 

Copying, storage, archiving, and also full or partial reproduction published on a site  www.allpatent.narod.ru materials of the information in printed editions

or an electronic kind without the indicationа on the reference in the Internet is forbidden.

 

 

 

The unused internal resources, technical safety.

Reduction of motivations to offences in system JVPsйа . The organization of access to under a site.

 

All possible changes have administrative character and do not demand expenses.

 

аThe proof of real safety in insurances of mobile phones.

аAvailable internal reserves of system.

1. а аNumber of the subscriber - unique.

2. а аIMEA - an internal phone number - unique.

3. а аOperators have the protected digital system of data transmission, much bit enciphering of the channel on air.аа

4. а аCellular distribution of retransmitters with binding on district.

5. а аthe Opportunity of the control of an arrangement in a cover zone of all bells.

6. а аthe Arrangement of the mobile phone to within tens meters.

7. а аOperators of mobile communicationblock area of reception up to 1 kilometers in radius from last retransmitter.

8. а аNot availability from the outside to the data of passage and processing of user's numbers. The accessible information on system of work of the operator of mobile communication. Through the Internet, it is carried out through systems of external and internal safety.

9. а аOperators of mobile communicationhave the legitimate right for reception and accumulation of the sums for the obverse settlement account of the subscriber, through the state organizations.

10. ааааа аthere Are accounting programs accepted officially for tax service.

11. ааааа аestimations of risk of loss and breakage under insurance tables Are subject. *straxRos.doc*

12. ааааа аProgram protection and security service of the operator of mobile communication.

13. ааааа аLaws of the country.

14. ааааа аAre protected it is hardware - an opportunity of switching-off of the stolen phones at all operators.

 

 

Check at registration of a member of system JVPsйа .

 

Registration in interior is lawful and voluntary step at registration of insurance of the mobile phone from plunder. It is stipulated in the contract at registration.

The client gives the document certifying the person.

Photographing of the person of the client occurs from the registered phone of the interior, having the built - in digital camera. GPRS/

The photo is sent on a code on under a site of the client from the instruction of the post address and given passports. The signature to a photo is the user's phone number of the client.

 

The mobile phone.

 

With the mobile phone of the client, the worker of interior, makes a bell with a base code *0*0*0*

The reception equipment a retransmitter number їїї (the area is determined on plans of cellular communication) - the nearest to the subscriber will take up processing a signal from the mobile phone.

Number of the subscriber, internal number-IMEA, time of a bell and his duration about seconds, number of a set - are determinedа with the program of processing of signals between subscribers of the operator of mobile communication. It will be worn out in a database on the subscriber. According to the tariff - make financial operation. As occurs further calculations on obverse to the account of the subscriber supervises tax management the given information under the maintenance and essence, is the official information. That is the proof accepted in court or other state bodies. Such as - the trading organizations, bank and financial services.

For today - the given opportunity in use of the information on bells, as such, are not used to the full.

Supported with a photo of the client and his nameplate data on under a site - registration of a bell by the operator of mobile communicationhas the completed kind, the checked up data on the client, for his personification in system JVPsйаа and giving to it of rights according to the contract.

 

 

All operations with a code of system JVPsйаа - * - in the beginning of processing by the operator of acting numbers, pass separately from the general base of the colloquial channel, do not prevent work of operators of mobile communication. That is stipulated by the software in all used computers for processing the information on bells.

That does not demand what or changes in system of work of operators of mobile communication.

Installation of the filter on the information on a set - *0*0*0* and other codes - is solved in the administrative way and does not demand monetary expenses.

 

In calculations of the filter are used a combination up to 7 groups of figures.

Code of the country - two times. - 3 figures

Numbers of subscribers - two times - up to 10 figures

The sum of insurance operation

Code the module of tax management - 1 time - 1 figure (0 or 1)

Division in a code of system JVPsйаа - occurs symbols - * and *

Code the module of base system - once - 3 figures.

Kind of a processable signal for the program of processing of the information of system JVPsйа а

*a*b*c*d* - not the full module of the order

*a*b*c*d*e*a*b* - the full code - module for tax management.

*f* - a code of access,

All other combinations for execution in system JVPsйаа occur from the given combinations.

The given list of codes - * operator1.doc*

 

Passive check occurs in a database of the operator of mobile communication.

In a database Number of the subscriber, internal number-IMEA typed clients a base code *0*0*0* are entered.

As the data of the stolen phones. Use of such base allows to not connect the stolen phone at other operators of mobile communicationin territory of the country.

That considerably will reduce motivation to plunder of mobile phones, will destroy the most part of the black market of the stolen phones, official sale will increase. Experience of Australia *avstr.doc*

The message on plunder of the mobile phone is made by trusted people of the subscriber.

1         From the specified phones a member of system (social guarantors) also have very high rating at an estimation in system of insurance. All user's numbers of social guarantors - should not be in system JVPsй. For acknowledgement of the fact of theft it will be necessary for client of system to organize bells of social guarantors to the operator of mobile communication.

2         As a set *0*0 * the phone of a cell * - the general message on an insurance case (the phone is stolen),

аааааа Cancellation of operation on a code in the module.

аEXAMPLE - *0*0*1234567890 * - the general message on an insurance case (the phone is stolen), a cancellation of operation on a code in the module. The phone number 1234567890 On statistics casual concurrence of a set of a code from 10 figures at four guarantors is stolen during term stipulated in the contract till 3 - is not possible.

 

The set of the given combination at four persons testifies to presence of the real fact of plunder or group of malefactors. In any case the system pays the sum of the insurance.

On the active control numbers of social guarantors and IMEA phones are put. If in group of cross numbers there will be an attempt to take advantage stolen phone - with big share of probability is possible to assume the fact of swindle.

Ways of realization of mobile phones at household larceny it is limited to city of residing. At attempt to realize in the other city or at the operator ьё. - the operator has an opportunity to supervise all phone numbers in the nearest environment from the retransmitter which has taken on service of the stolen phone, determined on IMEA.

At concurrence IMEA of phones and user's numbers it is possible to calculate a criminal. The given information is in mathematics demonstrable, the technique is applied in law enforcement bodies. On the fact of plunder excitation of criminal case is possible.

 

On the basis of the charter of system

All operations in cells with number of social guarantors stop according to the contract. There is an informing members of a cell on the fact of plunder.

Cross numbers of subscribers submit to mathematical laws and there is an opportunity of calculation of groups, their mutual relation.

At attempt of use of the stolen phone - the operator has the right (according to the contract) to block SIM a card inserted in the phone. That facilitates work to law enforcement bodies further will reduce motivation to plunder of mobile phones. (the Developed module)

Large cities have some operators that facilitates detection of the stolen phone.

 

 

 

All operators use the Internet sites for granting the information to clients.

At registration of the client by the worker of interior it is filled the data on the client in a pattern under a site.

Including base data - the Surname the Name the Patronymic, date of birth, the post address, a photo of the client. The client at own discretion independently may give other data.

The mechanism of the organization of access to the client to a site is standard.

аExcept for a set of the password to access to time under a site where there is a got product in an electronic kind.а

At a set *0*0*0* on the mobile phone of registered client JVPsйаа - after check of concurrence of user's number, IMEA and IP-the address opens access on IP-to the client.

аThe password is given by the operatorа At a bell of the subscriber with a base code for a while the stipulated contract (during 3-5 minutes).а

The given technique precisely allows to determinetime of reception from a site of the seller a product in an electronic kind - end of trading operation, payment of the insurance sums. Thus the legal owner on product is precisely determined.

It the motivation to piracy distribution of illegal copies decreases

 

*0*0*0* - the name of a site in protected zone JVPsйа _*0*0*0*.

аJVPsйа _ The countries number of the subscriber * - the name under a site.

 

 

All operations occur on computers of the operator of mobile communication , are supervised by tax management, post the Internet service.

 

 

а- An electronic card of the owner of a phone number - JVPsйаа a card .

Comprises a part controllable by tax management and the operator of mobile communication.

Voluntary given data, with the right on the state protection on the basis of the Law on copyrights. Attempt not competent use another's JVPsйаа cards or the mobile phone may be pursued as for a fake of official documents.

 

 

 

The information allocated with red color is illegal.

It is given only for acquaintance - as the fact of existence in the Internet

 

аTo contact  " JVPS й " write: juri.jakovlev@mail.ru
й 2000-2004,  " JVPs й "

 

Сайт создан в системе uCoz