WO1999045690A1 - Procede et dispositif d'acces universel et protege a des reseaux telephoniques - Google Patents
Procede et dispositif d'acces universel et protege a des reseaux telephoniques Download PDFInfo
- Publication number
- WO1999045690A1 WO1999045690A1 PCT/EP1999/000709 EP9900709W WO9945690A1 WO 1999045690 A1 WO1999045690 A1 WO 1999045690A1 EP 9900709 W EP9900709 W EP 9900709W WO 9945690 A1 WO9945690 A1 WO 9945690A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification
- subscriber
- features
- central computer
- biometric
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
Definitions
- the invention relates to a method and a device for universal and secure access to telephone networks with mobile accessibility of the user, in particular to telephone networks according to the preamble of claim 1 for the method and claim 6 for the device.
- Switching technology facilities that can be reached by a user via toll-free numbers are generally known today. After successful selection of the switching technology facility, the user must identify himself to the switching technology facility. This is usually done by entering an identification number, for example via the keypad of a telephone, using the tone dialing method or by voice input. Certain features or an existing credit in a certain currency or certain telephone units can be assigned to the identification numbers. The user can then call up the features or the credit after successful identification.
- An essential feature of this method is that no special terminal is required (tone dialing / voice input is sufficient) and there are no costs on site by dialing in via a toll-free number.
- the identification feature can have a "paid” or “still to be paid” character, the identification can be linked to either a specific fixed credit or an open billing procedure comparable to that of a normal telephone connection. Furthermore, special individual performance features can be linked to each individual identification. - 2 -
- calling card systems are usually based on a central control unit with a corresponding database or a central computer.
- VCC Virtual Calling Card
- PIN Personal Identification Number
- Authentication is carried out in a security module installed in the terminal.
- the security module receives the chip data and, based on a system key, calculates an individual card key located in the memory chip card.
- a method for checking memory chip cards is known from DE 196 04 349 AI, which enables two or more authentication using cryptographic functions and using a terminal.
- the disadvantage of these described methods and systems is that they require the user to provide an identification feature, for example a card number. For security reasons - 3 -
- this card number should be as many digits as possible.
- the user can specify the ID feature in relation to a machine or an intermediate operator.
- this procedure is lengthy and complicated in comparison with the usual telephony.
- the cumbersome handling keeps many potential users from intensive use of so-called calling card systems.
- the invention is therefore based on the object of providing a method and a device for universal and secure access to networks, in particular to the telephone network, in which the subscribers identify themselves to a system and the individual usage profile is checked and, after correct identification of the subscribers, access to the System and thus to the desired service, the billing is assigned to the identification, the identification is to be carried out on a mobile basis and / or biometric identifications are used.
- biometric identifications are generally known for security systems of all kinds, the application has - A -
- This identification above all has the advantage that biometric features can be stored on chip cards and that after the identification has been entered, a profile evaluation can also be carried out in the central computer. A check is carried out, for example, as to whether it is plausible that the participant can be at the respective input device at all. If a usage took place a few hours earlier from a remote location, then the participant is very likely not authentic. Furthermore, the method and the device according to the invention can be used to check against a usage profile as part of the identification check, that is to say how often, when, from which location, with what turnover and which usage properties are used, for example. This makes CallingCard systems easier and safer to use. The response times to identified security problems are considerably shorter compared to the previous method and the assignment of performance features for identification can now be carried out in the central computer or in a central control unit of the switching equipment.
- Fig. 1 is a schematic diagram for explaining the method according to the invention
- 3a shows a basic diagram for a
- Fig. 3b is a diagram showing the stay of a
- 3c shows a diagram for the services used by customers.
- Terminal 1 shows two terminals 2 and 3, which have a reading device for identifying a subscriber. These terminals 2 and 3 are each used by a mobile data carrier 1 for identification with the system, in particular the calling card system.
- the biometric identifications shown in principle below, for example can also be carried out, for example with the aid of iris recognition, with the aid of fingerprint recognition or with the aid of special speech features.
- Terminal 2 is connected to the calling card system in the present example via a dial-up network 4. In the present example, this consists of a central computer 6 which is connected to a database 7 and a unit for identification 8. In the calling card system, the identification is checked and the performance features are assigned for identification. After the participant has been correctly identified, they will be given access to the - 6 -
- a mobile data carrier 1 is used in this method as identification, which automatically sends the identification to a specially equipped terminal 2 or 3.
- a biometric feature or two biometric features or more are transmitted as identification for the purpose of greater security. After checking the identification in the unit for identification check 8, the performance features are assigned to the respective identification.
- Identification can be increased in the security standard, for example, by additional secret information, for example a personal identification number. Above all, it is also interesting to combine the biometric identification features, for example the iris, the fingerprint and / or the language features for subscriber identification. This significantly increases the security standard without complicating the test procedures.
- the biometric identification in the form of iris, fingerprint and / or language features can above all be stored in addition to the existing security identifications, such as a personal identification number.
- FIG. 2 again shows a basic illustration of a system for carrying out the method. It in turn consists of a dial-up network 4 or a direct connection 5 with an identifier 9 in on one side - 7th
- the identifier 9 can again identify itself with the help of a mobile data carrier by means of biometric identification features.
- Type testing of the identification of the biometric features can be done by storing the properties on the chip card.
- a profile evaluation is first carried out in the central computer 6. For example, it is checked whether it is plausible that the subscriber can be at the terminal at all.
- a user profile is stored in the unit for the identification check 8, for example, which indicates the location and the day on which a particular subscriber or the identifier 9 was or is located. Such a diagram is shown in Fig. 3b.
- 3a shows the usage behavior of an identifier 9 as an example, in which, for example, the sales made are shown on one day or on several days. This profile is then also saved in the unit for the identification check and is updated again and again. Furthermore, as part of the identification check, a check is made against a usage profile shown in FIG. 3c, that is to say how often, when, from which location, with which turnover which usage properties are used. For this purpose, the customers C1 to C3 are shown in the diagram on the vertical and the services DLa to DLd used on the horizontal. - 8th -
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephone Function (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99908839A EP1060607A1 (fr) | 1998-03-04 | 1999-02-03 | Procede et dispositif d'acces universel et protege a des reseaux telephoniques |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19809043.9 | 1998-03-04 | ||
DE19809043A DE19809043A1 (de) | 1998-03-04 | 1998-03-04 | Verfahren und Vorrichtung zum universellen und gesicherten Zugang zu Telefonnetzen |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999045690A1 true WO1999045690A1 (fr) | 1999-09-10 |
Family
ID=7859562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1999/000709 WO1999045690A1 (fr) | 1998-03-04 | 1999-02-03 | Procede et dispositif d'acces universel et protege a des reseaux telephoniques |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1060607A1 (fr) |
DE (1) | DE19809043A1 (fr) |
WO (1) | WO1999045690A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10000973A1 (de) * | 2000-01-06 | 2001-07-12 | Deutsche Telekom Ag | Verfahren zur sprachgesteuerten Identifizierung des Nutzers eines Telekommunikationsanschlusses im Telekommunikationsnetz beim Dialog mit einem sprachgesteuerten Dialogsystem |
WO2002021871A1 (fr) * | 2000-09-04 | 2002-03-14 | Bioid Ag | Procede et systeme de liberation d'un terminal mobile |
DE102007054474A1 (de) * | 2007-11-13 | 2009-05-28 | Vodafone Holding Gmbh | Verfahren und System zur Kommunikation mit einem Mobilfunknetz |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE20008345U1 (de) | 2000-05-09 | 2000-08-17 | Demuth Ulrich | Kommunikationsgerät mit Fingerabdrucksensor |
GB2363237A (en) * | 2000-06-10 | 2001-12-12 | Secr Defence | Integrated security system |
DE10054633C2 (de) * | 2000-10-13 | 2003-05-22 | Christian Hogl | Verfahren und System zum Kontrollieren des Zugangs zu Waren und Dienstleistungen |
DE10064040A1 (de) * | 2000-12-21 | 2002-07-18 | Tenovis Gmbh & Co Kg | Rechnergesteuertes Vermittlungssystem mit Leistungsmerkmalen und Verfahren zur Steuerung und Nutzung von Leistungsmerkmalen |
EP1235189A1 (fr) * | 2001-02-26 | 2002-08-28 | Keyware Technologies | Capteur biométrique |
DE102004014416A1 (de) * | 2004-03-18 | 2005-10-06 | Deutsche Telekom Ag | Verfahren und System zur Personen/Sprecherverifikation über Kommunikationssysteme |
DE102005003208B4 (de) * | 2005-01-24 | 2015-11-12 | Giesecke & Devrient Gmbh | Authentisierung eines Benutzers |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4899373A (en) * | 1986-11-28 | 1990-02-06 | American Telephone And Telegraph Company At&T Bell Laboratories | Method and apparatus for providing personalized telephone subscriber features at remote locations |
WO1994011959A1 (fr) * | 1992-11-12 | 1994-05-26 | Coral Systems, Inc. | Appareil et procede de detection d'usage potentiellement frauduleux de systemes de telecommunication |
WO1996004741A1 (fr) * | 1994-08-05 | 1996-02-15 | Mark Andrew R | Procede et appareil de transmission sure de donnees |
-
1998
- 1998-03-04 DE DE19809043A patent/DE19809043A1/de not_active Ceased
-
1999
- 1999-02-03 WO PCT/EP1999/000709 patent/WO1999045690A1/fr not_active Application Discontinuation
- 1999-02-03 EP EP99908839A patent/EP1060607A1/fr not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4899373A (en) * | 1986-11-28 | 1990-02-06 | American Telephone And Telegraph Company At&T Bell Laboratories | Method and apparatus for providing personalized telephone subscriber features at remote locations |
WO1994011959A1 (fr) * | 1992-11-12 | 1994-05-26 | Coral Systems, Inc. | Appareil et procede de detection d'usage potentiellement frauduleux de systemes de telecommunication |
WO1996004741A1 (fr) * | 1994-08-05 | 1996-02-15 | Mark Andrew R | Procede et appareil de transmission sure de donnees |
Non-Patent Citations (1)
Title |
---|
LAPÈRE, MARTIN; JOHNSON, ERIC: "User Authentication in Mobile Telecommunication Environments Using Voice Biometrics and Smartcards", PROCEEDIGS, FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENCE IN SERVICES AND NETWORKS, IS&N '97, CERNOBBIO, ITALY, 27 May 1997 (1997-05-27) - 29 May 1999 (1999-05-29), Springer-Verlag, Germany, pages 437 - 443, XP002106691 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10000973A1 (de) * | 2000-01-06 | 2001-07-12 | Deutsche Telekom Ag | Verfahren zur sprachgesteuerten Identifizierung des Nutzers eines Telekommunikationsanschlusses im Telekommunikationsnetz beim Dialog mit einem sprachgesteuerten Dialogsystem |
US7246061B2 (en) | 2000-01-06 | 2007-07-17 | Deutsche Telekom Ag | Method for the voice-operated identification of the user of a telecommunications line in a telecommunications network in the course of a dialog with a voice-operated dialog system |
WO2002021871A1 (fr) * | 2000-09-04 | 2002-03-14 | Bioid Ag | Procede et systeme de liberation d'un terminal mobile |
DE102007054474A1 (de) * | 2007-11-13 | 2009-05-28 | Vodafone Holding Gmbh | Verfahren und System zur Kommunikation mit einem Mobilfunknetz |
Also Published As
Publication number | Publication date |
---|---|
DE19809043A1 (de) | 1999-09-09 |
EP1060607A1 (fr) | 2000-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69117915T2 (de) | Rufvorrichtung für Kreditkartenfernsprechgerät in einem Fernsprechnetz und Betriebsverfahren | |
DE69314804T2 (de) | Verfahren zum durchführen von finanziellen transaktionen mittels eines mobilen telephonsystems | |
DE69429379T2 (de) | Betrugsschutz für Kartentransaktionen | |
DE69926977T2 (de) | Anruferidentifizierungsauthentisierung und Leitweglenkung als Antwort hierauf | |
EP0805607B1 (fr) | Méthode d'accès d'au moins une partie des données d'une carte à microprocesseur | |
EP1240631A1 (fr) | Procede et systeme de transaction de paiement | |
EP2174281A2 (fr) | Carte prépayée ou de crédit virtuelle et procédé ainsi que système de fourniture de celle-ci et de gestion de paiement électronique | |
EP1306789A2 (fr) | Serveur pour bloquer des cartes bancaires | |
EP1060607A1 (fr) | Procede et dispositif d'acces universel et protege a des reseaux telephoniques | |
DE69906206T2 (de) | Chipkarte mit Zugriff auf eine entfernte Anwendung, Endgerät und zugehöriges Übertragungssystem und Verfahren zum Zugriff auf die entfernte Anwendung mittels dieser Chipkarte | |
WO2000039758A1 (fr) | Procede de manipulation fiable de monnaie ou d'unites de valeurs avec des supports de donnees prepayes | |
EP1860595B1 (fr) | Carte à puce dotée dýau moins deux identités | |
DE4441413C2 (de) | Datenaustauschsystem | |
DE60026316T2 (de) | System und verfahren zur bearbeitung von fernsprechanrufen | |
DE4231937C1 (de) | Verfahren zum Feststellen der Identität des Inhabers einer Chipkarte, inbesondere Kreditkarte | |
EP1414259B1 (fr) | Procédé pour détecter un module d'identification doublé | |
EP0935870B1 (fr) | Systeme d'authentification d'un reseau de communication | |
DE4406590C2 (de) | System zur Authentifizierung von Anrufern | |
WO2007036341A1 (fr) | Deblocage de cartes de telephonie mobile | |
WO2005117404A1 (fr) | Procede d'autorisation d'une transaction telephonique et noeud de commutation | |
DE60221749T2 (de) | Eröffnen einer Subscription in einem Mobilfunksystem | |
EP3629542B1 (fr) | Délivrer des données confidentielles au moyen d'un téléphone fixe | |
EP1370107B1 (fr) | Méthode et appareil pour accéder à des données de portabilité de numéros | |
EP1115242B1 (fr) | Authentification d'un abonné d'un service de télécommunication à l'aide d'une adresse souvent composée | |
EP0818760B1 (fr) | Méthode pour empêcher l'abus de modules |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): HU US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999908839 Country of ref document: EP |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1999908839 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999908839 Country of ref document: EP |