Nothing Special   »   [go: up one dir, main page]

CN1486476A - Method and apparatus for using a cellular telephone as an authentification device - Google Patents

Method and apparatus for using a cellular telephone as an authentification device Download PDF

Info

Publication number
CN1486476A
CN1486476A CNA018118232A CN01811823A CN1486476A CN 1486476 A CN1486476 A CN 1486476A CN A018118232 A CNA018118232 A CN A018118232A CN 01811823 A CN01811823 A CN 01811823A CN 1486476 A CN1486476 A CN 1486476A
Authority
CN
China
Prior art keywords
caller
transaction
user
pin
participant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA018118232A
Other languages
Chinese (zh)
Inventor
��ά���¿���˹
戴维·奥克西斯
��������ء�ɳ����
小罗伯特·沙利文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of CN1486476A publication Critical patent/CN1486476A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and apparatus for authenticating a participant of an electronic transaction. The participant is pre-registered with a caller database, and the participant's wireless telephone number is unique to a particular user. When an authentication server is notified of a transaction, it generates a transaction pin for the transaction participant and forwards the transaction pin to the participant via a network. The participant calls the authentication server via a wireless phone. The authentication server identifies the wireless telephone number and prompts the caller for the transaction pin. When combined with a known transaction pin and a unique wireless telephone number, a wireless phone user can be authenticated as a valid participant of an on-line transaction.

Description

Use the method and apparatus of cell phone as identification apparatus
Background technology
Invention field
Present invention relates in general to evaluation, specifically relate to the method and system that the user in the electronic transaction is investigated the user.
Description of related art
The problem that people's identity is identified has existed hundreds of years.In common transaction, can finish evaluation with multiple mode.For example, can adopt a kind of documentation of identity of generally accepting form to investigate a people's identity, for example picture identification (" Image ID ").
Yet along with the appearance of the Internet, the quantity of electronic transaction (ecommerce) constantly increases.Utilize electronic transaction, all parties who participates in business can not see other litigant, often never can meet with other each side or be familiar with.
And the conventional method of identity verification generally includes and transmits the personal information of having only proper people will be appreciated that in electronic transaction.Example comprises employing credit number, social security number, address and other personal information.Because personal information is increased sharply, the secret expert and the public have reason to worry the diffusion of these data.What is worse, because the surge of personal information, information becomes " contaminated " and is too popular, as effective evaluation of personal identification.
Therefore, the problem of identifying transaction participant identity is remarkable and difficulty.
Thereby people need the method for the user in a kind of secure authentication electronic transaction.
The accompanying drawing summary
Fig. 1 illustrates a kind of embodiment that identifies user's system in electronic transaction.
Fig. 2 is a block scheme of identifying user's equipment in electronic transaction.
Fig. 3 is a block scheme of identifying user's embodiment in electronic transaction.
Fig. 4 is the process flow diagram that user's method is identified in request in electronic transaction.
Fig. 5 a and Fig. 5 b are the process flow diagrams of identifying user's method in electronic transaction.
Describe in detail
Fig. 1 describes the function block schematic according to the system 100 of embodiments of the invention formation and operation.System 100 is configured to identify the user in electronic transaction.Electronic transaction is any transaction (i.e. " online " transaction) that takes place on computer network.The example of this transaction includes but not limited to any sale or the purchase of commodity and service, or relates to any operation of litigant's electronic authentication.The former example is to buy books, CD or any other commodity or service by WWW (" WWW " or " Web ") explorer.The example of latter transaction is that the doctor agrees the medicine prescription filled in by electronic pharmacy.
The fact that this method relies on is, utilizes a caller database to make user's registered in advance, and user's wireless phone number is unique to a specific user.When making up with a known transaction code (for example Personal Identification Number PIN) (its be fed to the user as part online/network trading), wireless telephone user can be accredited as the participant of this online transaction.
In system 100, computing machine 120 is connected communication network 110 with authentication server 135.But network 110 also can comprise other interconnection device well-known in the art, as other computing machine 120, server 130, printer 125 and storage medium 140.Understandablely in the art be, but the computing machine interconnection device of any amount or kind or parts can be connected to network 110, and need not creationary ability.The example of other device includes but not limited to the device of server, computing machine, workstation, terminal, input media, output unit, printer, plotting apparatus, router, bridge, video camera, sensor or any other this class known in the art.Computing machine 120 can communicate on network 110, and it can be an any kind well known in the art.Server 130A-C can be any server known in the art, comprises web, database, printing or application server.The more important thing is that server 130A-C can produce, initiates or participate in to require to carry out the electronic transaction that the user identifies.The server that participates in electronic transaction is called as " trading server " 130.
Network 110 can be any communication network well known in the art, comprises the Internet, Local Area Network, wide area network (WAN) or any with the system of computer link to authentication server 135.In addition, network 110 can constitute according to any layout known in the art, comprises star, annular, total linear or their any combination.
Authentication server 135 connects a telephone network 150, and this network support call number transmits (CND), is also referred to as caller ID (CID).Telephone network 150 can be constituted as any other telephone network 150 known in this field of packet switched telephony network, POTS plain ordinary telephone service (POTS), integrated services digital network (ISDN) or support call person ID.And telephone network 150 connects the also radio telephone system 160 of support call person ID.
Each user in the system 100 has wireless telephone 170.Authentication server 135 is grasped each user's wireless phone number, and wireless phone number is stored in the caller database.In certain embodiments, require to carry out trading server 130 that the user identifies and also may be the equipment identical, do not have any loss function with authentication server 135.
Functional block diagram hereinafter with reference to the exemplary authentication server 135 of Fig. 2 is described embodiment.Authentication server 135 operation multiple task operating systems, and comprise at least one CPU (central processing unit) (CPU) 102.CPU 102 can be any microprocessor well known in the art or microcontroller.For example, CPU 102 can be a microprocessor, as the Pentium III processor of being made by Intel Corp..The software of CPU of being used to programme can obtain on computer-readable recording medium 140, and perhaps another way is from the another location by network 110.CPU 102 connects computer memory 118.Authentication server 135 is controlled by the operating system of carrying out (OS) in computer memory 118.
CPU 102 is communicated with a plurality of peripherals, comprises computer network interface 116 and telephone network interface 112.Additional peripherals comprises display 104, manual input device 106, storage medium 140, microphone 108 and data-in port 114.Display 104 can be a visual display unit, as cathode ray tube (CRT) monitor, liquid crystal display (LCD) screen, touch-screen or any other monitor well known in the art, is used for visually display image and literal to the user.Manual input device 106 can be conventional keyboard, keypad, mouse, tracking ball or other input media well known in the art, is used for the artificial input data.Storage medium 140 can be conventional read-write memory, as disc driver, floppy disk, compact disc read-only memory (CD-ROM) driver, based on transistorized storer or other computer readable storage means known in the field, be used for storage and take out data.It should be noted that storage medium 140 can be positioned at the position away from CPU, and connect CPU 102 through network 110 (as LAN (Local Area Network), wide area network or the Internet).
Microphone 108 can be any suitable microphone well known in the art, is used for providing sound signal to CPU 102.In addition, can connect the loudspeaker (not shown), be used for 102 reproducing audio signals from CPU.It should be understood that microphone 108 and loudspeaker can comprise suitable D/A converting circuit and suitable analog to digital conversion circuit.
Data-in port 114 can be any FPDP well known in the art, be used to connect external accessory, data protocol that it adopts such as RS-232, USB (universal serial bus) (USB) and No. the 1394th, Institute for Electrical and Electronics Engineers standard (" live wire ").
Network interface 116 can be any interface well known in the art, be used for communication and transmission at the enterprising style of writing part of computer network, the example of such network comprises transmission control protocol/Internet Protocol (TCP/IP), Ethernet, Fiber Distributed Data Interface (FDDI), token bus or token-bus network.In addition, in some systems, network interface 116 can comprise a modulator-demodular unit that connects data-in port 114.Equally, telephone network interface 112 provides and being connected of authentication server 135, to communicate with telephone network 150.Therefore, telephone network interface 112 permission authentication server, 135 communications and processing are from the input of telephone wire.
Fig. 3 is the expanded function block scheme of CPU 102 and storage medium 140.Those skilled in the art are understandable to be, the functional part of Fig. 3 can adopt the form of hardware, firmware to realize, perhaps is implemented as the software instruction and the data of coding on the computer-readable recording medium 140.As shown in Figure 3, CPU (central processing unit) 102 comprises data processor 202, application interface 204, transaction processor 206 and call processing device 210 on function.Data processor 202 connects display 104, manual input device 106, storage medium 140, microphone 108, data-in port 114, internet interface 116 and telephone network interface 112.Data processor 202 makes the CPU 102 can be with data placement reading of data and data are write these parts on these parts, from these parts.
Application interface 204 makes the CPU 102 can be according to independently software application or entity (entity) carry out some processing.For example, application interface 204 can adopt the form of the user interface of windowing, as known in the art.
Transaction processor 206 is handled e-commerce transaction.Transaction processor 206 is according to ratifying or disapprove transaction by 210 couples of users' of call processing device checking.The result of transaction processor 206 can be recorded on the storage medium 140, as transaction log 242.Call processing device 210 can further comprise caller ID processor 212 and caller's validator 214.These parts of call processing device 210 and a known caller database 244 carry out can understanding better according to the process flow diagram of Fig. 4,5a and 5b alternately, and be as described below.
Fig. 4 is the process flow diagram of having described according to the process 300 of embodiment of the invention formation and operation.As shown in the square frame 302, process 300 begins to determine whether that trading server 130 is participated in need do the electronic transaction that the user identifies.Should determine and to finish by adopting in this area any known means, and comprise the inventory that needs the electronic transaction that the user identifies is tabled look-up, perhaps can be embedded in the program of carrying out by trading server 130.During the evaluation user, at square frame 304, process 300 can be suspended trading.
In square frame 306, process 300 starts trading server 130 to transmit the request identified (being also referred to as " Notice Of Transactions ") to authentication server 135.This evaluation request can comprise user ID and transaction ID.This user ID can be any information of identification user for the transaction litigant, comprises name, social security number or any other similar sign.This transaction ID is differentiated the transaction that needs evaluation.In addition, in some embodiments, user's e-mail address also can be coded in the request of evaluation.This notice is transmitted to authentication server 135 through network 110.In the embodiment of combination authentication server 135 and trading server 130, this notice can be sent by inner in device itself.
In square frame 310, process 300 waits for that authentication server 135 is with response evaluation request.In case receive the response from authentication server 135, process 300 determines whether that the response indication user who is received is identified.When the user was identified by authentication server 135, transaction went through.Otherwise in square frame 314, transaction is under an embargo.
Fig. 5 a and Fig. 5 b are respectively the process flow diagrams of description process 400 and 450.Process 400 and 450 is described the evaluation order from the viewpoint of authentication server 135.At square frame 401, evaluation request or Notice Of Transactions that authentication server 135 receives from trading server 130.206 pairs of user ID of transaction processor and transaction ID are deciphered.At square frame 403, transaction processor 206 produces a transaction PIN, and this transaction PIN comprises the sequence of the numeral between 0 and 9.This sequence is used in combination with user's wireless phone number, to identify that the user participates in business.It should be noted that in certain embodiments transaction PIN can comprise alphanumeric character, comprise also that wherein symbol " * " and " # ", word maybe can be by the alphabetical sequences of telephone keypad input.
The embodiment that produces numeral transaction PIN can produce pseudo random number by any means known in the art.Adopt the embodiment of letter can produce pseudorandom series of letters and numeral, maybe can adopt dictionary to produce transaction PIN.Some embodiment searches user's clauses and subclauses in caller database 244, and adds or store this transaction ID and transaction PIN as the field in the caller database 244, or as the part of transaction log 242.
At square frame 405, process 400 sends transaction PIN to the user.This transaction processor 206 sends to the user by network interface 116 and network 110 PIN that should conclude the business.In all embodiments, the user is provided a telephone number, and they are required to call out to identify that they are certainly as the validated user in the transaction.This telephone number that is provided is connected to authentication server 135 through telephone network 150.In some embodiments, the transmission of this telephone number is by searching user's e-mail address in a caller database 244, sending e-mails to the user then and transmit this telephone number.Other embodiment comprises that utilization is coded in the e-mail address in the request of evaluation.Also have additional embodiments before the user, to show transaction PIN by web page.
The process 450 of Fig. 5 b is identified the user, is to be complementary by the caller who makes this user wireless phone number of discerning and the transaction PIN that is provided by the process among Fig. 5 a 400.The telephone number that this customer call provided arrives authentication server 135.At square frame 402, the calling that authentication server 135 receives from this user.At square frame 404, authentication server 135 is mated for through the caller of caller ID from a certain wireless phone number by making the user, and the user is identified.Authentication server 135 receives this calling through its telephone network interface 112.This calling is sent to call processing device 210 then.In certain embodiments, this caller ID signal is transmitted as the V.23 modulation-demodulation signal between the first and second annular cycles.In an embodiment, be connected to isdn line, according to the ITU-T standard Q.81.3, when the initial start-up of call setting, on D (signaling) channel, transmit caller ID.Caller ID processor 212 is derived user's telephone number, and irrelevant with the realization of caller ID.Caller's validator 214 is got this telephone number and search this caller identities in caller database 244.
If can not determine telephone number, perhaps this caller is not the known users (as being determined by caller database 244) of this system, at square frame 408, and this call of ignoring, authentication server 135 is hung up.
Otherwise,,, point out this caller to import transaction PIN at square frame 410 if this caller is identified as the known users in the caller database 244.
If the transaction PIN of caller's input and the transaction PIN coupling that sends to the user by process 400, as determined by transaction processor 206, then this user is identified, at square frame 414, should identify notice trading server 130 by internet interface 116.
If the transaction PIN of caller's input and the transaction PIN that sends to the user do not match, as determined, identify failure by transaction processor 206, should identify failure notification trading server 130 by internet interface 116.In some embodiments, can allow the user have an opportunity to import once more transaction PIN, see square frame 416.
The result who identifies can be recorded in the transaction log 242.
The description of the embodiment that more than provides makes any technician in this area can realize this method.Those skilled in the art will be easy to determine the various modification to these embodiment, go for other embodiment in the General Principle of this definition, and need not to utilize creative ability.Therefore, the present invention is not to be to be limited to embodiment described here, and should be given the wide region consistent with the above principle and novel feature.

Claims (18)

1, a kind of equipment comprises:
First network interface connects a computer network, is configured to receive Notice Of Transactions, and this Notice Of Transactions comprises user ID, the participant of this user ID identification electronic transaction;
Processor connects this first network interface, is configured with the subscriber directory number in this user ID and caller database coupling, and produces a transaction PIN, and this first network interface PIN that should conclude the business sends this participant to; And
Second network interface, be connected to this processor and a telephone network, be configured with reception and have the call that the caller of caller's telephone number sends, wherein, this processor is pointed out this caller for caller PIN, this processor is discerned this caller's telephone number, and when this caller's telephone number and subscriber directory number coupling and should transaction PIN and during this caller PIN coupling, this processor is identified this participant.
2, equipment as claimed in claim 1, this processor also comprises:
Transaction processor with subscriber directory number and user ID coupling, produces transaction PIN, when this caller's telephone number and subscriber directory number coupling and should transaction PIN and during this caller PIN coupling, identify the participant.
3, equipment as claimed in claim 2, this processor also comprises:
Caller ID processor connects this transaction processor, is configured to discern this caller's telephone number.
4, equipment as claimed in claim 3, this processor also comprises:
Caller's validator connects this transaction processor, is configured so that the subscriber directory number coupling in this user ID and this caller database.
5, a kind of method comprises:
Receive Notice Of Transactions through one first network interface, this Notice Of Transactions comprises identification electronic transaction participant's user ID;
With a subscriber directory number and this user ID coupling;
Produce transaction PIN;
The PIN that should conclude the business sends the participant to;
Receive the call that caller with caller's telephone number sends through second network interface;
For caller PIN points out this caller;
When this caller's telephone number and subscriber directory number coupling, verify that this caller is the user; And
When this transaction PIN and this caller PIN coupling, verify that this caller is the participant of electronic transaction.
6, method as claimed in claim 5 also comprises:
When this caller is verified as the user, and when this caller is verified as the participant of electronic transaction, identify the user of electronic transaction.
7, method as claimed in claim 6 also comprises:
The notice trading server whether user of electronic transaction is identified.
8, method as claimed in claim 7 also comprises:
When not identified, the user of electronic transaction cancels this electronic transaction.
9, method as claimed in claim 8 also comprises:
The outcome record that the user is identified is in a transaction log.
10, method as claimed in claim 9, wherein, producing transaction PIN is to make up by the pseudorandom that produces numeral and letter to finish.
11, method as claimed in claim 9, wherein, producing transaction PIN is to select to finish by the pseudorandom that produces one or more words from dictionary.
12, a kind of coding has the computer-readable medium of data and instruction, and these data and instruction make an equipment carry out these instructions to realize:
Receive Notice Of Transactions through one first network interface, this Notice Of Transactions comprises identification electronic transaction participant's user ID;
With a subscriber directory number and this user ID coupling;
Produce transaction PIN;
The PIN that should conclude the business sends the participant to;
Receive the call that caller with caller's telephone number sends through second network interface;
For caller PIN points out this caller;
When this caller's telephone number and subscriber directory number coupling, verify that this caller is the user; And
When this transaction PIN and this caller PIN coupling, verify that this caller is the participant of electronic transaction.
13, as the computer-readable medium of claim 12, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
When this caller is verified as the user, and when this caller is verified as the participant of electronic transaction, identify the user of electronic transaction.
14, as the computer-readable medium of claim 13, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
The notice trading server whether user of electronic transaction is identified.
15, as the computer-readable medium of claim 14, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
When not identified, the user of electronic transaction cancels this electronic transaction.
16, as the computer-readable medium of claim 15, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
The outcome record that the user is identified is in a transaction log.
17, as the computer-readable medium of claim 16, wherein, producing transaction PIN is to make up by the pseudorandom that produces numeral and letter to finish.
18, as the computer-readable medium of claim 16, wherein, producing transaction PIN is to select to finish by the pseudorandom that produces one or more words from dictionary.
CNA018118232A 2000-06-26 2001-06-01 Method and apparatus for using a cellular telephone as an authentification device Pending CN1486476A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60316900A 2000-06-26 2000-06-26
US09/603,169 2000-06-26

Publications (1)

Publication Number Publication Date
CN1486476A true CN1486476A (en) 2004-03-31

Family

ID=24414354

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA018118232A Pending CN1486476A (en) 2000-06-26 2001-06-01 Method and apparatus for using a cellular telephone as an authentification device

Country Status (4)

Country Link
EP (1) EP1330797A2 (en)
CN (1) CN1486476A (en)
AU (1) AU2001265284A1 (en)
WO (1) WO2002001516A2 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001282795A1 (en) * 2000-08-30 2002-03-13 Telefonaktiebolaget Lm Ericsson (Publ) End-user authentication independent of network service provider
GB2386236A (en) * 2002-03-05 2003-09-10 Marconi Comm Ltd Cashless transactions via a telecommunications network
US7697920B1 (en) 2006-05-05 2010-04-13 Boojum Mobile System and method for providing authentication and authorization utilizing a personal wireless communication device
DE10306993A1 (en) * 2003-02-19 2004-09-09 Call & Card Communication Anstalt Cashless payment method, by transmitting transaction number to provider who checks if input PIN is associated with buyer identification number
DE10344483A1 (en) * 2003-09-24 2005-05-12 Vodafone Holding Gmbh Method for checking the authorization during the establishment and / or forwarding of a telecommunications connection
EP1544816A1 (en) * 2003-12-12 2005-06-22 Finport B.V. Method and system for authorising computer network rendered services
WO2007050005A1 (en) * 2005-10-25 2007-05-03 Udo Hinz Credit card substitute
US20080209213A1 (en) * 2007-02-23 2008-08-28 Sony Ericsson Mobile Communications Ab Authorizing secure resources
US8577804B1 (en) 2008-02-20 2013-11-05 Collective Dynamics LLC Method and system for securing payment transactions
GB201106976D0 (en) 2011-10-03 2011-10-03 Corcost Ltd Corcost-SG002

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2100134C (en) * 1992-09-29 1999-06-22 Raymond Otto Colbert Secure credit/debit card authorization
GB2328310B (en) * 1996-05-15 1999-12-08 Ho Keung Tse Electronic transaction apparatus and method therefor
US5883810A (en) * 1997-09-24 1999-03-16 Microsoft Corporation Electronic online commerce card with transactionproxy number for online transactions
SE516066C2 (en) * 1999-01-20 2001-11-12 Netcom Ab Method, system and network node for providing services on the Internet

Also Published As

Publication number Publication date
WO2002001516A3 (en) 2003-04-17
WO2002001516A2 (en) 2002-01-03
EP1330797A2 (en) 2003-07-30
AU2001265284A1 (en) 2002-01-08

Similar Documents

Publication Publication Date Title
US9001982B2 (en) System and method for facilitating account-based transactions
US7254619B2 (en) Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network
US20070006286A1 (en) System and method for security in global computer transactions that enable reverse-authentication of a server by a client
HUP0302098A2 (en) System and method for providing security for financial services terminals with a document driven interface
TW201014315A (en) User identity authentication method, system thereof and identifying code generating maintenance subsystem
JP2001502479A (en) Method and system for communication access restriction
US8948361B2 (en) Mitigating spam and identifying callers in video calls
CN107423975A (en) By submitting number to carry out strong authentication
WO2010019348A2 (en) Method and system for automated user authentication
US20030046246A1 (en) Blocking server
CN1486476A (en) Method and apparatus for using a cellular telephone as an authentification device
US20040024817A1 (en) Selectively restricting access of automated agents to computer services
CN1770804A (en) Telephone customer service through transmission of interactive menu
US20100310061A1 (en) Account number security system with communication system
WO2003046730A2 (en) Method for making secure access to a digital resource
CN101309140A (en) Account anti-theft system having communication mechanism
WO2008004672A1 (en) User authenticating method, user authenticating system, user authenticating device and user authenticating program
JP5947419B1 (en) Authentication method executed by call center system
WO1997005731A1 (en) Multifunction screenphone
KR200193550Y1 (en) For free telephone connect system of a internet phone
KR20020041354A (en) Mamber's call-ID witness type internet site login service system
TWI744810B (en) Speaking end device, receiving end device and cloud server of user data fingerprint verification operation
JP2748941B2 (en) Home terminal
US20090216784A1 (en) System and Method of Storing Probabilistic Data
JP3803612B2 (en) Telephone equipped with web browser, customer management system, data processing method, customer management method and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1064487

Country of ref document: HK

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1064487

Country of ref document: HK