Features of protection
in system JVPsй.
The divided functions in
a cell, return positive communication in a cell , two foreign insurance,
three foreign control, fast delivery - do not leave an opportunity and time
for illegal actions in system JVPsй.
The basic difference of
system.
The client makes the
order from the phone. The right of acknowledgement of operation gives the
authorized representative.
( Lawyer Bo Jahansson
Jurist / LL. M Address: Gyllenstiernsgatan 14, S-115 26 Stockholm, Sweden Tel
/ + 4686602170. Fax / +4686650940 bo.johansson@radgivningsbyran.org
JVPsй . - in system the
obligatory condition - from one phone only is possible to order the goods
with delivery JVPsй ., another phone numbers - specified by the client -
reception of the goods with delivery JVPsй . only is possible to confirm.
аmailto:bo.johansson@radgivningsbyran.org
For proofs of a reality
of project JVPsй .
1
Really
exists and the element of hardware protection used in system is used in
practice.
2
There
is a practice of insurance of mobile phones in Russia.
3
Proofs
- mathematics and psychologies in calculations on the organization of
safety.
4
Experience
of foreign and domestic operators of mobile communication . Advertising
ORT-1 to Israel - *33
5
Infrastructure
of operators of mobile communication - system of payment and the control.
6
Not
used internal resources. (http://www.allpatent.narod.ru/JVPskard1.htm
)
The divided functions in
a cell.
Division occurs on all
steps of operation.
1. Division of the
order. A set of a code for the beginning operations - passive check of
numbers IMEA and SIM cards . The first part of a code - is supervised by
tax service, the advertising company.
2. Acknowledgement of
registration of the order - not personal, the guarantor of operation.
3. Reception of the
goods or service - personally with acknowledgement on the base module.
4. Different on time of operation
payment reception.
Visa a history and
principles (http://www.allpatent.narod.ru/visa1.htm
)
аNot
prosperities of existing systems of realization of payments.
1. there Is a probability
use of number of a credit card by the extraneous person. (http://www.allpatent.narod.ru/PayPal1.htm
, http://www.allpatent.narod.ru/PayPal21.htm )
2. Numbers of
cards can be generated, received in the Internet to steal at the owner, to
learn at payment of the goods in shop etc.
3. To take
advantage at purchase through the Internet.
(http://www.allpatent.narod.ru/shop1.htm)
аIn bank devices (http://www.allpatent.narod.ru/bankom1.htm
)
4. To make in
domestic conditions. (http://www.allpatent.narod.ru/kard1.htm , http://www.allpatent.narod.ru/made1.htm
, http://www.allpatent.narod.ru/work1.htm )
л
.. in Russia the generation enough the qualified malefactors, capable to
withdraw money from bank devices on false plastic cards has appeared. As it
was already marked, cards with a magnetic strip are easy enough for
forging, and the PIN-code can be found out various ways. " Plastic
money " cannot be seen, it is impossible to count up without the
special equipment, therefore, if them will steal, the owner at once about
it and does not learn{*find out*}. Besides real documents which could be
showed , for example, in court, no. There are no signatures of persons
responsible for trusted money and therefore to ask there is nobody.╗ The
citation from visa.doc.
The
technical element - the Phone in system is the most protected.
1.
- loss the owner will find out the Stolen phone quickly enough, for today
the mobile phone is actively used in daily life. There is a technique of
insurance of mobile phones in Russia (
http:/www.allpatent.narod.ru/straxRos1.htm )
2. At payment through
code system - the right of acknowledgement of operation has the authorized representative
of the owner. To inform it on plunder of the phone it is possible. At not
the consent of the authorized representative (the
guarantor http://www.allpatent.narod.ru/JVPskard1.htm
)
a. the second part of a
code of system JVPsй is not formed. Also there is no operation.
b. the system stops work
in the given cell.
3. Enter systems of
signaling of the operator of mobile communication in domestic conditions
not probably. The system of digital data transmission highly is protected.
4. fake IMEA and SIM
cards Is possible that is complex enough, casual concurrence of the second
part of the module is estimated as 1 to
3,0414093201713378043612608166065e+64
аIt
is not possible to determine the data of the guarantor.
5. the System of work of
the operator of mobile communication instantly allows to determine any
attempts of an input in system due to carried data IMEA - number of a
telephone set and number SIM of a card of the phone.
6. At attempt of
realization of the stolen phone - the new buyer inserts the SIM a card and
may be traced.
аPsychologically
- the given knowledge of the control will lower motives to purchase of the
stolen phone. In case of purchase new SIM cards - it are blocked and is not
connected without definition of the person of the owner. Economically - to
lose money to check of the stolen device.
аAt
discrepancy it is pairs the data probably blocking by the operator of an
opportunity To make a bell. That is the device and number SIM of a card is
subject to switching-off.
аExperience
of Australia
ал The Australian operators of communication from
submission of authorities have agreed to create uniform bank л (avstr.doc).
7. Division of functions
the order - reception acknowledgement , number of the device - number SIM
of a card , the first part of a code - it is popular only at registration
of the owner of the goods or service - the second part of a code - is not
accessible in an electronic kind and may not be forged. The given phones of
guarantors the owner of the device - not in system JVPsй - resemble passive
check in the system, psychologically justified assumption of a degree of
trust between them (not to the familiar person do not trust).
8. At reception of the
goods or service in the Internet.
аUnder
a site it is formed by post service - on the basis of a full code - access
at a bell
аPassive
check. *0*0*0* - the base module of access on a site, realization of
interrogations, passive Checks.
9. the Client
anonymously may not receive a product in an electronic kind. The product
has the built - in code - the module.
The law on insurance in
the Internet - Is based on the Law of Russia on insurance.
Creation of an insurance
society to system JVPsй - with model of protection and realization of
payments - submits to Laws of Russia.
System JVPsй . It is
developed since 04.2000.
The trade mark and
Alphanumeric combinations of a code as a whole and in parts are property
JVPsй .
The project of the
uniform law developed really about insurance of copyrights in the Internet
it was not found out till 25.06.2002.
It is protected by the law on the copyright of Russia.
All operations in system
are made on algorithms and principles developed
Jakovlevym Jury
Anatol'evichem. JVPsй .
Protection of the
copyrights according to laws of the country. JVPsй .
Acknowledgement of the
given information on a site - www.allpatent.narod.ru JVPsй
.
The analysis and system
of an estimation it is based on development
The information
allocated with red color is illegal.
It is given
only for acquaintance - as the fact of existence in the Internet
|