作者: Jeroen Laarakkers , Frank Muller , Tim Hartog
DOI:
关键词: User verification 、 Computer security 、 Terminal (electronics) 、 Computer network 、 Service (business) 、 Secure communication channel 、 Computer science
摘要: A Method and a system for managing undesired service requests sent from at least one terminal to network are described, wherein the comprises node storing trusted service-information. The method steps of: receiving request terminal, comprising information; and, sending, preferably via secure communication channel, user verification requesting verify requested by if part of information is not listed in