It is the first time I used Bytes... and the give us more details will not let me in? I want to design a system with 100% browser web access to my site/webpage. I want UK only mobile handsets to have access. I understand that the incoming dot.mobi message access will not show handset details. Can my website establish a handshake (or separate session) with the handset (web access source) to check if it is on a UK network. I do understand that a USSD link to a handset provides all required detail, but need to understand if my HTML5 code can include a call/handshake/echo to identify the handset source. I am told that all handset web accesses will use a dynamic IP address. Do UK MNOs have a specific range of dynamic IP addresses that we might be able to check against. The authentication of the user is crucial to the solution!!
I trust this attachment can be accessed!!
John Aldridge
2 6686
"Do UK MNOs have a specific range of dynamic IP addresses that we might be able to check against." the current answer seems to be "no". They might say that they are, but they are probably not.
Here is an example: A cell phone tower in France (or where ever across the channel) has so many connections that it fills up to a limit that activates a relay to another cell tower. The other cell tower is across the channel in the United Kingdom. You see the user as in the UK because some switching in the long distance carrier assumes that the user is in the UK. You therefore have invalid data and someone outside the UK is assumed as being inside the UK.
Or, more serious example, someone writes a program that simulates that overload and rejects all relayed towers that are outside of the UK until it gets relayed to a cell phone tower that is known to be in the UK thus programmaticall y being seen as inside the UK.
Currently, it seems, the government of the UK has not aggressively chosen to rectify that situation. The problem of communication re-vectoring can be obfuscated, but maybe they do not yet care enough. The Bible says, "strong fences make good neighbors", but it seems that many people and businesses and governments are lazy about building strong fences. The truth is there. Follow it.
Some thoughts on some things:
SSL, and firmware, and many current operating systems have built in back doors or are breakable. SSL can be broken and analyzed and changed. Firmware currently commonly connects and communicates with third party intruders by design and can be intercepted in its communications. Many current operating systems do similar intrusions and much more intrusions than the firmware.
Do not give up. Your asking is a first step. Secure at your end and work from there.
Can my website establish a handshake (or separate session) with the handset (web access source) to check if it is on a UK network. I do understand that a USSD link to a handset provides all required detail, but need to understand if my HTML5 code can include a call/handshake/echo to identify the handset source.
HTML isn't going to do this. HTML cannot interact with anything, because HTML is a static language.
You could use an Apache server, and use mod_rewrite to direct / redirect based upon user agent (to detect if mobile device or not), then use a php script to compare IP address with a white list. (Though it is better to do this in the server not the content.)The problem with this is then you have the issue of the mobile towers sending and receiving proxy as a means of network load handling, and then you have the whole issue of blocking Tor exit nodes. (if you've never heard of Tor, visit http://www.torproject.org for a primer).
In short, its possible to do what you aim to do, but it will be very difficult.
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: RC |
last post by:
I assume the answer is yes.
I try to write readSubdir function read all files
in all sub-directories.
<?php
readSubdir("Documents/2005");
function readSubdir($dirPath) {
$dirPointer = opendir($dirPath);
|
by: ThomasR |
last post by:
I understand that virtual methods on inherited objects are slower than
non-virtual methods because of the indirection required to support the
call.
However, when looking at IL code produced by the compiler, I notice
that all methods on object variables use callvirt instead of call,
regardless of whether the method is truly virtual or not.
I assume this allows .NET to check if the object reference is null or
not before invoking the...
|
by: Paul Aspinall |
last post by:
Hi
I have an application which runs on a desktop.
I want to synchronise the DB with a PDA app, which also uses SQL Server 2005
(mobile and express).
I believe that I will need to write my own synchronization application, in
order to update the data across the machines.
My questions are:
- Is there a way of picking up an event that will notify my application when
the PDA is connected to the desktop??
|
by: jens Jensen |
last post by:
Hello,
Assum i have an oracle function called ofunction.
Can someone tell me how i can call this function assuming it take the
parameter in_param of type clob.
Any help will be highly appreciated
C# .ADO.NET 2.0
|
by: mrhoo |
last post by:
Does anyone know from experience if there are any browsers that do support document.implementation && Object.hasOwnProperty,
that do NOT support Function.call?
| |
by: udaypawar |
last post by:
Hi All,
I am developing a mobile application using PHP and XHTML for mobile.
In this application I am just counting number of downloads and after each hit I am making an entry in Mysql database. Its working fine up to this point.
Next I want is my "Java application" which I am allowing users to download should get downloaded only on supported handsets. I don't know how to identify the Model Number of mobile handset which is accessing...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
| |
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |