Event Playback
In recent months, many consumers to the media complaints into the "broadband discount" scam, and the situation has become increasingly fierce. Scam by means of buying a mobile phone network can enjoy a "lifetime discount", to buy high-definition player can reduce the monthly broadband fee, and then to add money can do a wide variety of broadband speed, and so on.
Of course, the pretext of perfection is not likely to deceive the consumers fully believe that there are supporting measures. Consumer's address, broadband account number, ID card numbers and other information readily available, there is no omission. The start of the scam stems from a call disguised as an operator's official customer service number, to carry out sales, "new package" commentary, and then disguised as operator staff, door-to-door charges, and the production of a prepared in advance with the company's official seal of the "document", the whole scam was made watertight, even if the operators encountered, I just thought it was a unit colleague.
Culprit
No matter how sophisticated a person disguised as a carrier, no matter how the liar is the phone number disguised as the operator's official customer service phone, no matter how the fraud documents to do the genuine, consumer personal information leakage is the key culprit! If the information does not leak, the liar can not find the door, there are no more powerful deception. So why do consumers ' personal information leak out?
Operator-related owners said they could not give an accurate answer. May involve leaking the personal data channel too many, the user installs the broadband data besides the operator to be able to master, but also has the door responsible for installs the debugging staff, the related piece area is responsible for the marketing maintenance agent and so on, is which link leaks is difficult to confirm.
How to crack a scam
To sum up, to prevent the case, suppression of data leakage is the most fundamental way to prevent fraud, but in the personal data leakage channels so many cases, how to suppress it?
Starting from the data, 10 people have access to information, there are 10 possible leaks, if only two to get the information, there are only two leaks, which not only reduce the possibility of leakage, but also narrow the scope of the investigation. To give each staff different permissions, responsible for different work, like a pipeline, each of them clear the content of the work, but can not know the content of others, even if the leak is not significant. How do you assign permissions to individual needs? I can not help but think of the more popular words in the past two years: cloud computing! For the emerging Internet service model of cloud computing, it is known as an Internet-related service that increases, uses, and delivers, providing dynamically scalable virtualization resources over the Internet. But the real application of cloud computing is poorly understood, and it is confusing how to use cloud computing to prevent information leaks.
In fact, as early as the end of March this year, China Telecom Shanghai Ideal Information Industry Co., Ltd. has cooperated with Hangzhou Multi-message Technology Co., Ltd. to create "China Telecom services cloud platform?" Shanghai ", the implementation of cloud computing landing applications.
Multi-message technology using self-developed wos Cloud field operating system built cloud platform, do not need to download installation, no matter when and where as long as there is a computer network can be logged in use, and its mobile version is testing, I believe that in the near future can meet with you.
By then, all staff are using cloud Platform office, from the consumer to the business hall for broadband services began, the staff opened the telecommunications cloud platform, with the work account password Landing cloud Platform, the consumer personal data input, stored in the cloud platform, the cloud Platform automatically to consumer address, the region, etc. to judge classification, The consumer data will be pushed to the area responsible for on-site maintenance and installation staff of the cloud platform, the relevant staff can log into the cloud platform through mobile phones, received information after the door-to-door installation of broadband completed, please enter the password to confirm the installation of the operation is complete, consumer data is automatically moved to the database platform backup.
WoS Cloud field Operating system can be assigned different permissions according to the nature of the user, if you can edit user data, access to the database, whether you can view user information, etc., so that, although each link staff have access to the user's information, but all according to the nature of the work to display only relevant information, and because the cloud platform can be used everywhere , consumer data does not exist in large numbers with an account, reducing the risk of data leakage.
Operators can also allocate cloud platform account to consumers, access to the customer account of the cloud platform, you can learn that the current operators of the dynamic, notice, the latest preferential policies, packages, etc., very convenient, reduce the possibility of being deceived, fooled.
(Responsible editor: The good of the Legacy)