CN1486476A - Method and apparatus for using a cellular telephone as an authentification device - Google Patents
Method and apparatus for using a cellular telephone as an authentification device Download PDFInfo
- Publication number
- CN1486476A CN1486476A CNA018118232A CN01811823A CN1486476A CN 1486476 A CN1486476 A CN 1486476A CN A018118232 A CNA018118232 A CN A018118232A CN 01811823 A CN01811823 A CN 01811823A CN 1486476 A CN1486476 A CN 1486476A
- Authority
- CN
- China
- Prior art keywords
- caller
- transaction
- user
- pin
- participant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method and apparatus for authenticating a participant of an electronic transaction. The participant is pre-registered with a caller database, and the participant's wireless telephone number is unique to a particular user. When an authentication server is notified of a transaction, it generates a transaction pin for the transaction participant and forwards the transaction pin to the participant via a network. The participant calls the authentication server via a wireless phone. The authentication server identifies the wireless telephone number and prompts the caller for the transaction pin. When combined with a known transaction pin and a unique wireless telephone number, a wireless phone user can be authenticated as a valid participant of an on-line transaction.
Description
Background technology
Invention field
Present invention relates in general to evaluation, specifically relate to the method and system that the user in the electronic transaction is investigated the user.
Description of related art
The problem that people's identity is identified has existed hundreds of years.In common transaction, can finish evaluation with multiple mode.For example, can adopt a kind of documentation of identity of generally accepting form to investigate a people's identity, for example picture identification (" Image ID ").
Yet along with the appearance of the Internet, the quantity of electronic transaction (ecommerce) constantly increases.Utilize electronic transaction, all parties who participates in business can not see other litigant, often never can meet with other each side or be familiar with.
And the conventional method of identity verification generally includes and transmits the personal information of having only proper people will be appreciated that in electronic transaction.Example comprises employing credit number, social security number, address and other personal information.Because personal information is increased sharply, the secret expert and the public have reason to worry the diffusion of these data.What is worse, because the surge of personal information, information becomes " contaminated " and is too popular, as effective evaluation of personal identification.
Therefore, the problem of identifying transaction participant identity is remarkable and difficulty.
Thereby people need the method for the user in a kind of secure authentication electronic transaction.
The accompanying drawing summary
Fig. 1 illustrates a kind of embodiment that identifies user's system in electronic transaction.
Fig. 2 is a block scheme of identifying user's equipment in electronic transaction.
Fig. 3 is a block scheme of identifying user's embodiment in electronic transaction.
Fig. 4 is the process flow diagram that user's method is identified in request in electronic transaction.
Fig. 5 a and Fig. 5 b are the process flow diagrams of identifying user's method in electronic transaction.
Describe in detail
Fig. 1 describes the function block schematic according to the system 100 of embodiments of the invention formation and operation.System 100 is configured to identify the user in electronic transaction.Electronic transaction is any transaction (i.e. " online " transaction) that takes place on computer network.The example of this transaction includes but not limited to any sale or the purchase of commodity and service, or relates to any operation of litigant's electronic authentication.The former example is to buy books, CD or any other commodity or service by WWW (" WWW " or " Web ") explorer.The example of latter transaction is that the doctor agrees the medicine prescription filled in by electronic pharmacy.
The fact that this method relies on is, utilizes a caller database to make user's registered in advance, and user's wireless phone number is unique to a specific user.When making up with a known transaction code (for example Personal Identification Number PIN) (its be fed to the user as part online/network trading), wireless telephone user can be accredited as the participant of this online transaction.
In system 100, computing machine 120 is connected communication network 110 with authentication server 135.But network 110 also can comprise other interconnection device well-known in the art, as other computing machine 120, server 130, printer 125 and storage medium 140.Understandablely in the art be, but the computing machine interconnection device of any amount or kind or parts can be connected to network 110, and need not creationary ability.The example of other device includes but not limited to the device of server, computing machine, workstation, terminal, input media, output unit, printer, plotting apparatus, router, bridge, video camera, sensor or any other this class known in the art.Computing machine 120 can communicate on network 110, and it can be an any kind well known in the art.Server 130A-C can be any server known in the art, comprises web, database, printing or application server.The more important thing is that server 130A-C can produce, initiates or participate in to require to carry out the electronic transaction that the user identifies.The server that participates in electronic transaction is called as " trading server " 130.
Network 110 can be any communication network well known in the art, comprises the Internet, Local Area Network, wide area network (WAN) or any with the system of computer link to authentication server 135.In addition, network 110 can constitute according to any layout known in the art, comprises star, annular, total linear or their any combination.
Authentication server 135 connects a telephone network 150, and this network support call number transmits (CND), is also referred to as caller ID (CID).Telephone network 150 can be constituted as any other telephone network 150 known in this field of packet switched telephony network, POTS plain ordinary telephone service (POTS), integrated services digital network (ISDN) or support call person ID.And telephone network 150 connects the also radio telephone system 160 of support call person ID.
Each user in the system 100 has wireless telephone 170.Authentication server 135 is grasped each user's wireless phone number, and wireless phone number is stored in the caller database.In certain embodiments, require to carry out trading server 130 that the user identifies and also may be the equipment identical, do not have any loss function with authentication server 135.
Functional block diagram hereinafter with reference to the exemplary authentication server 135 of Fig. 2 is described embodiment.Authentication server 135 operation multiple task operating systems, and comprise at least one CPU (central processing unit) (CPU) 102.CPU 102 can be any microprocessor well known in the art or microcontroller.For example, CPU 102 can be a microprocessor, as the Pentium III processor of being made by Intel Corp..The software of CPU of being used to programme can obtain on computer-readable recording medium 140, and perhaps another way is from the another location by network 110.CPU 102 connects computer memory 118.Authentication server 135 is controlled by the operating system of carrying out (OS) in computer memory 118.
Microphone 108 can be any suitable microphone well known in the art, is used for providing sound signal to CPU 102.In addition, can connect the loudspeaker (not shown), be used for 102 reproducing audio signals from CPU.It should be understood that microphone 108 and loudspeaker can comprise suitable D/A converting circuit and suitable analog to digital conversion circuit.
Data-in port 114 can be any FPDP well known in the art, be used to connect external accessory, data protocol that it adopts such as RS-232, USB (universal serial bus) (USB) and No. the 1394th, Institute for Electrical and Electronics Engineers standard (" live wire ").
Network interface 116 can be any interface well known in the art, be used for communication and transmission at the enterprising style of writing part of computer network, the example of such network comprises transmission control protocol/Internet Protocol (TCP/IP), Ethernet, Fiber Distributed Data Interface (FDDI), token bus or token-bus network.In addition, in some systems, network interface 116 can comprise a modulator-demodular unit that connects data-in port 114.Equally, telephone network interface 112 provides and being connected of authentication server 135, to communicate with telephone network 150.Therefore, telephone network interface 112 permission authentication server, 135 communications and processing are from the input of telephone wire.
Fig. 3 is the expanded function block scheme of CPU 102 and storage medium 140.Those skilled in the art are understandable to be, the functional part of Fig. 3 can adopt the form of hardware, firmware to realize, perhaps is implemented as the software instruction and the data of coding on the computer-readable recording medium 140.As shown in Figure 3, CPU (central processing unit) 102 comprises data processor 202, application interface 204, transaction processor 206 and call processing device 210 on function.Data processor 202 connects display 104, manual input device 106, storage medium 140, microphone 108, data-in port 114, internet interface 116 and telephone network interface 112.Data processor 202 makes the CPU 102 can be with data placement reading of data and data are write these parts on these parts, from these parts.
Fig. 4 is the process flow diagram of having described according to the process 300 of embodiment of the invention formation and operation.As shown in the square frame 302, process 300 begins to determine whether that trading server 130 is participated in need do the electronic transaction that the user identifies.Should determine and to finish by adopting in this area any known means, and comprise the inventory that needs the electronic transaction that the user identifies is tabled look-up, perhaps can be embedded in the program of carrying out by trading server 130.During the evaluation user, at square frame 304, process 300 can be suspended trading.
In square frame 306, process 300 starts trading server 130 to transmit the request identified (being also referred to as " Notice Of Transactions ") to authentication server 135.This evaluation request can comprise user ID and transaction ID.This user ID can be any information of identification user for the transaction litigant, comprises name, social security number or any other similar sign.This transaction ID is differentiated the transaction that needs evaluation.In addition, in some embodiments, user's e-mail address also can be coded in the request of evaluation.This notice is transmitted to authentication server 135 through network 110.In the embodiment of combination authentication server 135 and trading server 130, this notice can be sent by inner in device itself.
In square frame 310, process 300 waits for that authentication server 135 is with response evaluation request.In case receive the response from authentication server 135, process 300 determines whether that the response indication user who is received is identified.When the user was identified by authentication server 135, transaction went through.Otherwise in square frame 314, transaction is under an embargo.
Fig. 5 a and Fig. 5 b are respectively the process flow diagrams of description process 400 and 450.Process 400 and 450 is described the evaluation order from the viewpoint of authentication server 135.At square frame 401, evaluation request or Notice Of Transactions that authentication server 135 receives from trading server 130.206 pairs of user ID of transaction processor and transaction ID are deciphered.At square frame 403, transaction processor 206 produces a transaction PIN, and this transaction PIN comprises the sequence of the numeral between 0 and 9.This sequence is used in combination with user's wireless phone number, to identify that the user participates in business.It should be noted that in certain embodiments transaction PIN can comprise alphanumeric character, comprise also that wherein symbol " * " and " # ", word maybe can be by the alphabetical sequences of telephone keypad input.
The embodiment that produces numeral transaction PIN can produce pseudo random number by any means known in the art.Adopt the embodiment of letter can produce pseudorandom series of letters and numeral, maybe can adopt dictionary to produce transaction PIN.Some embodiment searches user's clauses and subclauses in caller database 244, and adds or store this transaction ID and transaction PIN as the field in the caller database 244, or as the part of transaction log 242.
At square frame 405, process 400 sends transaction PIN to the user.This transaction processor 206 sends to the user by network interface 116 and network 110 PIN that should conclude the business.In all embodiments, the user is provided a telephone number, and they are required to call out to identify that they are certainly as the validated user in the transaction.This telephone number that is provided is connected to authentication server 135 through telephone network 150.In some embodiments, the transmission of this telephone number is by searching user's e-mail address in a caller database 244, sending e-mails to the user then and transmit this telephone number.Other embodiment comprises that utilization is coded in the e-mail address in the request of evaluation.Also have additional embodiments before the user, to show transaction PIN by web page.
The process 450 of Fig. 5 b is identified the user, is to be complementary by the caller who makes this user wireless phone number of discerning and the transaction PIN that is provided by the process among Fig. 5 a 400.The telephone number that this customer call provided arrives authentication server 135.At square frame 402, the calling that authentication server 135 receives from this user.At square frame 404, authentication server 135 is mated for through the caller of caller ID from a certain wireless phone number by making the user, and the user is identified.Authentication server 135 receives this calling through its telephone network interface 112.This calling is sent to call processing device 210 then.In certain embodiments, this caller ID signal is transmitted as the V.23 modulation-demodulation signal between the first and second annular cycles.In an embodiment, be connected to isdn line, according to the ITU-T standard Q.81.3, when the initial start-up of call setting, on D (signaling) channel, transmit caller ID.Caller ID processor 212 is derived user's telephone number, and irrelevant with the realization of caller ID.Caller's validator 214 is got this telephone number and search this caller identities in caller database 244.
If can not determine telephone number, perhaps this caller is not the known users (as being determined by caller database 244) of this system, at square frame 408, and this call of ignoring, authentication server 135 is hung up.
Otherwise,,, point out this caller to import transaction PIN at square frame 410 if this caller is identified as the known users in the caller database 244.
If the transaction PIN of caller's input and the transaction PIN coupling that sends to the user by process 400, as determined by transaction processor 206, then this user is identified, at square frame 414, should identify notice trading server 130 by internet interface 116.
If the transaction PIN of caller's input and the transaction PIN that sends to the user do not match, as determined, identify failure by transaction processor 206, should identify failure notification trading server 130 by internet interface 116.In some embodiments, can allow the user have an opportunity to import once more transaction PIN, see square frame 416.
The result who identifies can be recorded in the transaction log 242.
The description of the embodiment that more than provides makes any technician in this area can realize this method.Those skilled in the art will be easy to determine the various modification to these embodiment, go for other embodiment in the General Principle of this definition, and need not to utilize creative ability.Therefore, the present invention is not to be to be limited to embodiment described here, and should be given the wide region consistent with the above principle and novel feature.
Claims (18)
1, a kind of equipment comprises:
First network interface connects a computer network, is configured to receive Notice Of Transactions, and this Notice Of Transactions comprises user ID, the participant of this user ID identification electronic transaction;
Processor connects this first network interface, is configured with the subscriber directory number in this user ID and caller database coupling, and produces a transaction PIN, and this first network interface PIN that should conclude the business sends this participant to; And
Second network interface, be connected to this processor and a telephone network, be configured with reception and have the call that the caller of caller's telephone number sends, wherein, this processor is pointed out this caller for caller PIN, this processor is discerned this caller's telephone number, and when this caller's telephone number and subscriber directory number coupling and should transaction PIN and during this caller PIN coupling, this processor is identified this participant.
2, equipment as claimed in claim 1, this processor also comprises:
Transaction processor with subscriber directory number and user ID coupling, produces transaction PIN, when this caller's telephone number and subscriber directory number coupling and should transaction PIN and during this caller PIN coupling, identify the participant.
3, equipment as claimed in claim 2, this processor also comprises:
Caller ID processor connects this transaction processor, is configured to discern this caller's telephone number.
4, equipment as claimed in claim 3, this processor also comprises:
Caller's validator connects this transaction processor, is configured so that the subscriber directory number coupling in this user ID and this caller database.
5, a kind of method comprises:
Receive Notice Of Transactions through one first network interface, this Notice Of Transactions comprises identification electronic transaction participant's user ID;
With a subscriber directory number and this user ID coupling;
Produce transaction PIN;
The PIN that should conclude the business sends the participant to;
Receive the call that caller with caller's telephone number sends through second network interface;
For caller PIN points out this caller;
When this caller's telephone number and subscriber directory number coupling, verify that this caller is the user; And
When this transaction PIN and this caller PIN coupling, verify that this caller is the participant of electronic transaction.
6, method as claimed in claim 5 also comprises:
When this caller is verified as the user, and when this caller is verified as the participant of electronic transaction, identify the user of electronic transaction.
7, method as claimed in claim 6 also comprises:
The notice trading server whether user of electronic transaction is identified.
8, method as claimed in claim 7 also comprises:
When not identified, the user of electronic transaction cancels this electronic transaction.
9, method as claimed in claim 8 also comprises:
The outcome record that the user is identified is in a transaction log.
10, method as claimed in claim 9, wherein, producing transaction PIN is to make up by the pseudorandom that produces numeral and letter to finish.
11, method as claimed in claim 9, wherein, producing transaction PIN is to select to finish by the pseudorandom that produces one or more words from dictionary.
12, a kind of coding has the computer-readable medium of data and instruction, and these data and instruction make an equipment carry out these instructions to realize:
Receive Notice Of Transactions through one first network interface, this Notice Of Transactions comprises identification electronic transaction participant's user ID;
With a subscriber directory number and this user ID coupling;
Produce transaction PIN;
The PIN that should conclude the business sends the participant to;
Receive the call that caller with caller's telephone number sends through second network interface;
For caller PIN points out this caller;
When this caller's telephone number and subscriber directory number coupling, verify that this caller is the user; And
When this transaction PIN and this caller PIN coupling, verify that this caller is the participant of electronic transaction.
13, as the computer-readable medium of claim 12, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
When this caller is verified as the user, and when this caller is verified as the participant of electronic transaction, identify the user of electronic transaction.
14, as the computer-readable medium of claim 13, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
The notice trading server whether user of electronic transaction is identified.
15, as the computer-readable medium of claim 14, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
When not identified, the user of electronic transaction cancels this electronic transaction.
16, as the computer-readable medium of claim 15, also coding has data and instruction, these data and instruction to make an equipment carry out these instructions to realize:
The outcome record that the user is identified is in a transaction log.
17, as the computer-readable medium of claim 16, wherein, producing transaction PIN is to make up by the pseudorandom that produces numeral and letter to finish.
18, as the computer-readable medium of claim 16, wherein, producing transaction PIN is to select to finish by the pseudorandom that produces one or more words from dictionary.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US60316900A | 2000-06-26 | 2000-06-26 | |
US09/603,169 | 2000-06-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1486476A true CN1486476A (en) | 2004-03-31 |
Family
ID=24414354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA018118232A Pending CN1486476A (en) | 2000-06-26 | 2001-06-01 | Method and apparatus for using a cellular telephone as an authentification device |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1330797A2 (en) |
CN (1) | CN1486476A (en) |
AU (1) | AU2001265284A1 (en) |
WO (1) | WO2002001516A2 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2001282795A1 (en) * | 2000-08-30 | 2002-03-13 | Telefonaktiebolaget Lm Ericsson (Publ) | End-user authentication independent of network service provider |
GB2386236A (en) * | 2002-03-05 | 2003-09-10 | Marconi Comm Ltd | Cashless transactions via a telecommunications network |
US7697920B1 (en) | 2006-05-05 | 2010-04-13 | Boojum Mobile | System and method for providing authentication and authorization utilizing a personal wireless communication device |
DE10306993A1 (en) * | 2003-02-19 | 2004-09-09 | Call & Card Communication Anstalt | Cashless payment method, by transmitting transaction number to provider who checks if input PIN is associated with buyer identification number |
DE10344483A1 (en) * | 2003-09-24 | 2005-05-12 | Vodafone Holding Gmbh | Method for checking the authorization during the establishment and / or forwarding of a telecommunications connection |
EP1544816A1 (en) * | 2003-12-12 | 2005-06-22 | Finport B.V. | Method and system for authorising computer network rendered services |
WO2007050005A1 (en) * | 2005-10-25 | 2007-05-03 | Udo Hinz | Credit card substitute |
US20080209213A1 (en) * | 2007-02-23 | 2008-08-28 | Sony Ericsson Mobile Communications Ab | Authorizing secure resources |
US8577804B1 (en) | 2008-02-20 | 2013-11-05 | Collective Dynamics LLC | Method and system for securing payment transactions |
GB201106976D0 (en) | 2011-10-03 | 2011-10-03 | Corcost Ltd | Corcost-SG002 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2100134C (en) * | 1992-09-29 | 1999-06-22 | Raymond Otto Colbert | Secure credit/debit card authorization |
GB2328310B (en) * | 1996-05-15 | 1999-12-08 | Ho Keung Tse | Electronic transaction apparatus and method therefor |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
SE516066C2 (en) * | 1999-01-20 | 2001-11-12 | Netcom Ab | Method, system and network node for providing services on the Internet |
-
2001
- 2001-06-01 CN CNA018118232A patent/CN1486476A/en active Pending
- 2001-06-01 AU AU2001265284A patent/AU2001265284A1/en not_active Abandoned
- 2001-06-01 WO PCT/US2001/017704 patent/WO2002001516A2/en not_active Application Discontinuation
- 2001-06-01 EP EP01939805A patent/EP1330797A2/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2002001516A3 (en) | 2003-04-17 |
WO2002001516A2 (en) | 2002-01-03 |
EP1330797A2 (en) | 2003-07-30 |
AU2001265284A1 (en) | 2002-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9001982B2 (en) | System and method for facilitating account-based transactions | |
US7254619B2 (en) | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network | |
US20070006286A1 (en) | System and method for security in global computer transactions that enable reverse-authentication of a server by a client | |
HUP0302098A2 (en) | System and method for providing security for financial services terminals with a document driven interface | |
TW201014315A (en) | User identity authentication method, system thereof and identifying code generating maintenance subsystem | |
JP2001502479A (en) | Method and system for communication access restriction | |
US8948361B2 (en) | Mitigating spam and identifying callers in video calls | |
CN107423975A (en) | By submitting number to carry out strong authentication | |
WO2010019348A2 (en) | Method and system for automated user authentication | |
US20030046246A1 (en) | Blocking server | |
CN1486476A (en) | Method and apparatus for using a cellular telephone as an authentification device | |
US20040024817A1 (en) | Selectively restricting access of automated agents to computer services | |
CN1770804A (en) | Telephone customer service through transmission of interactive menu | |
US20100310061A1 (en) | Account number security system with communication system | |
WO2003046730A2 (en) | Method for making secure access to a digital resource | |
CN101309140A (en) | Account anti-theft system having communication mechanism | |
WO2008004672A1 (en) | User authenticating method, user authenticating system, user authenticating device and user authenticating program | |
JP5947419B1 (en) | Authentication method executed by call center system | |
WO1997005731A1 (en) | Multifunction screenphone | |
KR200193550Y1 (en) | For free telephone connect system of a internet phone | |
KR20020041354A (en) | Mamber's call-ID witness type internet site login service system | |
TWI744810B (en) | Speaking end device, receiving end device and cloud server of user data fingerprint verification operation | |
JP2748941B2 (en) | Home terminal | |
US20090216784A1 (en) | System and Method of Storing Probabilistic Data | |
JP3803612B2 (en) | Telephone equipped with web browser, customer management system, data processing method, customer management method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1064487 Country of ref document: HK |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1064487 Country of ref document: HK |