NO313949B1 - Authentication in mobile networks - Google Patents
Authentication in mobile networks Download PDFInfo
- Publication number
- NO313949B1 NO313949B1 NO19992071A NO992071A NO313949B1 NO 313949 B1 NO313949 B1 NO 313949B1 NO 19992071 A NO19992071 A NO 19992071A NO 992071 A NO992071 A NO 992071A NO 313949 B1 NO313949 B1 NO 313949B1
- Authority
- NO
- Norway
- Prior art keywords
- wml
- user
- voice
- authentication
- wireless
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 10
- 230000004044 response Effects 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000001413 cellular effect Effects 0.000 claims description 2
- 238000001514 detection method Methods 0.000 claims description 2
- 230000007246 mechanism Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims 2
- 239000000243 solution Substances 0.000 description 9
- 230000006870 function Effects 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 239000012086 standard solution Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Multimedia (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Marketing (AREA)
- Acoustics & Sound (AREA)
- Human Computer Interaction (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Denne oppfinnelse vedrører et arrangement og en fremgangs- måte for å tilveiebringe autentisering av en bruker ved utførelse av trådløse elektroniske handelstransaksjoner ved å bruke en mobilenhet. Dette oppnås ved å kombinere en WML- (WAP Markup-språk) basert mikroleser på mobilenheten og talebasert autentisering i nettet.This invention relates to an arrangement and method for providing authentication of a user in performing wireless electronic commerce transactions using a mobile device. This is achieved by combining a WML (WAP Markup language) based micro-reader on the mobile device and voice-based authentication in the network.
Description
TEKNISK OMRÅDE TECHNICAL AREA
Denne oppfinnelse vedrører et arrangement og en fremgangsmåte for å tilveiebringe brukerautentisering ved utførelse av trådløse elektroniske handelstransaksjoner ved å bruke en mobilenhet. This invention relates to an arrangement and method for providing user authentication when performing wireless electronic commerce transactions using a mobile device.
KJENT TEKNIKK PRIOR ART
Problemet er å tilveiebringe et tilfredsstillende sikker-hetsnivå når noen utfører trådløse elektroniske handelstransaksjoner på en mobilenhet. Fra tidligere kjent teknikk er det kjent noen løsninger på dette problem, som inkluderer : 1. Å bruke SIM-kortbasert sikkerhet. Dette krever enten at mikroleseren er lokalisert på SIM-kortet, eller at det fin-nes standardløsninger for en mikroleser for telefon for å aksessere sikkerhetsfunksjonene på SIM-kortet. Løsningene ved SIM-kort er begrenset til GSM-systemer. En på SIM Application Toolkit- {verktøysett for SIM-applikasjon) basert leser (browser) har visse begrensninger på grunn av proprietær SIM-teknologi; begrenset funksjonalitet i SIM Toolkit-standardene og ingen understøttelse utenfor GSM. Det pågår en standardisering for å tilveiebringe SIM-/smartkortsikkerhet innen WAP, men standardene er ikke fer-dige . Derfor er det behov for mellomløsninger som benytter WAP 1.0-baserte løsninger, som ikke har løst sikkerhetsas-pektene . 2. Å bruke sikkerhetsfunksjoner på et smartkort som kan le-ses fra telefonen med en ekstra kortleser. The problem is to provide a satisfactory level of security when someone conducts wireless electronic commerce transactions on a mobile device. Some solutions to this problem are known from the prior art, which include: 1. Using SIM card-based security. This requires either that the microreader is located on the SIM card, or that there are standard solutions for a microreader for phones to access the security functions on the SIM card. SIM card solutions are limited to GSM systems. A SIM Application Toolkit-based browser has certain limitations due to proprietary SIM technology; limited functionality in the SIM Toolkit standards and no support outside of GSM. Standardization is underway to provide SIM/smart card security within WAP, but the standards are not finished. There is therefore a need for intermediate solutions that use WAP 1.0-based solutions, which have not solved the security aspects. 2. Using security features on a smart card that can be read from the phone with an additional card reader.
Begrensningen ved denne løsning er at det kreves en telefon med ekstra smartkortleser. Det er begrenset tilgjengelighet til disse telefoner, løsninger er ikke standardisert ennå, og telefonene blir lett større og mer kostbare. 3.Å bruke eksterne sikkerhetsinnretninger, slik som pass-ordkalkulatorer som genererer engangspassord og krever en personlig PIN-kode for å aktiveres. The limitation of this solution is that a phone with an additional smart card reader is required. Availability of these phones is limited, solutions are not standardized yet, and the phones easily become larger and more expensive. 3.Using external security devices, such as password calculators that generate one-time passwords and require a personal PIN to activate.
Det er ikke særlig hendig å bære med deg en passordkalkula-tor, og det tar tid å bruke den (skriv først inn PIN, skriv så inn generert passord på telefonen). Videre øker kostna-dene ved løsningen for sluttbrukeren. It is not very convenient to carry a password calculator with you, and it takes time to use it (first enter the PIN, then enter the generated password on the phone). Furthermore, the costs of the solution for the end user increase.
HENSIKTER MED OPPFINNELSEN OBJECTS OF THE INVENTION
Den foreliggende oppfinnelse har som sin hensikt å tilveiebringe sikker brukerautentisering ved utførelse av trådløse handelstransaksjoner på en mobilenhet uten sikkerhetsfunksjoner utover standard sikkerhet tilveiebrakt av nettver-ket. The purpose of the present invention is to provide secure user authentication when performing wireless business transactions on a mobile device without security functions beyond the standard security provided by the network.
Dette oppnås ved å kombinere en WML- {WAP Markup Language - WAP Markup-språk) basert mikroleser på mobilenheten og talebasert autentisering i nettet. This is achieved by combining a WML (WAP Markup Language) based microreader on the mobile device and voice-based authentication in the web.
Oppfinnelsen kan benyttes i trådløs elektronisk handel og andre Wireless Application Protocol- (WAP) baserte applikasjoner som krever brukerautentisering utover det som tilveiebringes av selve det trådløse nettverk. Oppfinnelsen kan benyttes i trådløse nett, slik som GSM, D-AMPS og CDMA. The invention can be used in wireless electronic commerce and other Wireless Application Protocol (WAP)-based applications that require user authentication beyond that provided by the wireless network itself. The invention can be used in wireless networks, such as GSM, D-AMPS and CDMA.
Det eksakte omfang av oppfinnelsen er som definert i de vedlagte patentkrav. The exact scope of the invention is as defined in the attached patent claims.
KORTFATTET BESKRIVELSE AV TEGNINGENE BRIEF DESCRIPTION OF THE DRAWINGS
Figur 1 er et skjematisk diagram som viser forskjellige enheter (objekter/entiteter) i en transaksjon som bruker den foreliggende oppfinnelse. Figur 2 viser et eksempel på en nettverksarkitektur for systemer som benytter oppfinnelsen. Figur 3 viser et eksempel på meldingsflyt for en transaksjon som benytter oppfinnelsen. Figure 1 is a schematic diagram showing different entities (objects/entities) in a transaction using the present invention. Figure 2 shows an example of a network architecture for systems that use the invention. Figure 3 shows an example of message flow for a transaction that uses the invention.
DETALJERT BESKRIVELSE AV OPPFINNELSEN DETAILED DESCRIPTION OF THE INVENTION
Figur 1 viser de forskjellige enheter involvert når en bruker ønsker å aksessere en WML-basert applikasjon (trådløs e-handel. Intranett-aksessnettport, tilgang til bonustje-neste og så videre), 4, via en mobilenhet, og ved å bruke en fremgangsmåte og et system ifølge den foreliggende oppfinnelse. Brukeren starter en WML-basert dialog som invol-verer WML-basert leser, 1, en mikroleser med evnen til å vise frem Wireless Markup Language (WML). Leseren kan være lokalisert i en telefon eller annen type trådløs enhet, slik som en personlig digital assistent (PDA). For enklere trådløse enheter kan deler av leseren være implementert i en server. Et eksempel på dette er en GSM-telefon som bruker USSD-egenskapene ved GSM fase 2 sammen med en proksyserver som konverterer WML-innhold til USSD-tekststrenger som vises frem på telefonen. Alternativt kan det benyttes SMS eller GPRS som bærer. Figure 1 shows the different devices involved when a user wants to access a WML-based application (wireless e-commerce. Intranet access portal, access to bonus service and so on), 4, via a mobile device, and using a method and a system according to the present invention. The user initiates a WML-based dialog involving the WML-based reader, 1, a microreader with the ability to display Wireless Markup Language (WML). The reader may be located in a telephone or other type of wireless device, such as a personal digital assistant (PDA). For simpler wireless devices, parts of the reader can be implemented in a server. An example of this is a GSM phone that uses the USSD capabilities of GSM phase 2 together with a proxy server that converts WML content into USSD text strings that are displayed on the phone. Alternatively, SMS or GPRS can be used as the carrier.
Mobilenheten er tilknyttet et trådløst nettverk, 2, som inkluderer en WAP-nettport. Denne enhet (entitet) består av alle trådløse svitsjekomponenter, slik som basestasjon-system (BSS) og mobilsvitsjesenter (MSC). I tillegg til dette inneholder den WAP-nettporten. WAP-nettporten konverterer mellom WAP-protokollen og bærertjenestene på radiosiden, og Internett-protokoller på Internett-siden. Brukeren aksesserer den WML-baserte applikasjon, 4. Denne enhet er en applikasjon som bruker den WAP-definerte Wireless Markup -sp råk (WML) for dialog med en bruker. På et bestemt trinn i dialogen kreves det en autentisering. Applikasjonen, 4, bruker en enhet, 3, som håndterer talepassord, for autentisering av brukeren. Denne enhet er en nettverkskom-ponent som håndterer talegjenkjenning og talebasert dialog med brukeren. Den vil også håndtere passordet og mekanismer for personlig taledetektering. Denne enhet vil typisk være basert på et integrert taleresponssystem (IVR - Integrated Voice Response). Autentiseringen kan utføres ved å presentere WML-kort (side) til brukeren som inkluderer et meny-valg som initierer et taleanrop til et IVR-basert autenti-seringssenter ved å bruke basal trådløs funksjonalitet ved telefoniapplikasjon (evnen til å utføre et telefonanrop ved å velge en post i WAP-basert meny). Autentiseringen utføres ved å bruke et talebasert passord som kan tilveiebringe både et brukerpassord og verifisering av brukerens tale. Resultatet av autentiseringen returneres til den WML-baserte applikasjon, som fortsetter eller avslutter transaksjonen. The mobile device is connected to a wireless network, 2, which includes a WAP web port. This unit (entity) consists of all wireless switching components, such as base station system (BSS) and mobile switching center (MSC). In addition to this, it contains the WAP web portal. The WAP gateway converts between the WAP protocol and bearer services on the radio side, and Internet protocols on the Internet side. The user accesses the WML-based application, 4. This device is an application that uses the WAP-defined Wireless Markup Language (WML) for dialogue with a user. At a certain step in the dialog, an authentication is required. The application, 4, uses a device, 3, which handles voice passwords, for authenticating the user. This device is a network component that handles speech recognition and speech-based dialogue with the user. It will also handle the password and personal voice detection mechanisms. This device will typically be based on an integrated voice response system (IVR - Integrated Voice Response). The authentication can be performed by presenting a WML card (page) to the user that includes a menu selection that initiates a voice call to an IVR-based authentication center using basic wireless telephony functionality (the ability to make a phone call by selecting an entry in the WAP-based menu). The authentication is performed using a voice-based password that can provide both a user password and verification of the user's speech. The result of the authentication is returned to the WML-based application, which continues or terminates the transaction.
Hvis leseren ikke understøtter denne menyegenskap (klikk for anrop), kan enheten som håndterer talepassord i stedet initiere et anrop til brukeren, etter at WML-dialogen er avsluttet, for å utføre autentiseringen. Enheten for å håndtere talepassord kan identifisere bruken som skal au-tentiseres ved hans/hennes anropende ID (telefonnummer). I tilfelle av flere brukere koblet til det samme telefonnummer, eller i tilfelle av en telefon som ikke eies av brukeren, er ekstra identifikasjon av brukeren påkrevd for enheten som håndterer talepassordet. Dette kan oppnås ved å bruke et B-nummer som gir ekstra informasjon, eller ved å informere enheten som håndterer talepassord på forhånd om at en autentisering av en spesifikk bruker vil skje fra det gitte telefonnummer. If the browser does not support this menu property (click to call), the voice password handler may instead initiate a call to the user, after the WML dialog has ended, to perform the authentication. The device for handling voice passwords can identify the user to be authenticated by his/her caller ID (phone number). In the case of several users connected to the same telephone number, or in the case of a telephone not owned by the user, additional identification of the user is required for the device handling the voice password. This can be achieved by using a B-number that provides additional information, or by informing the device handling voice passwords in advance that an authentication of a specific user will take place from the given telephone number.
Den faktiske algoritme benyttet av enheten, som håndterer talepassordet for å utføre autentiseringen, kan avvike for forskjellige implementeringer av en enhet som håndterer talepassord. Et eksempel på en algoritme er å benytte personlig PIN-kode kombinert med gjenkjenning av personlig tale. Enheten som håndterer talepassord vil be om hele PIN-koden eller alternativt et tilfeldig siffer innen PIN-koden. Det siste vil sikre at hele PIN-koden aldri leveres samtidig. Personlig talegjenkjenning vil tilveiebringe en verifika-sjon av en spesifikk persons egen tale innen et akseptabelt nøyaktighetsnivå. The actual algorithm used by the device handling the voice password to perform the authentication may differ for different implementations of a device handling the voice password. An example of an algorithm is to use a personal PIN code combined with recognition of personal speech. The device that handles voice passwords will ask for the full PIN code or alternatively a random digit within the PIN code. The latter will ensure that the entire PIN code is never delivered at the same time. Personal speech recognition will provide a verification of a specific person's own speech within an acceptable level of accuracy.
Enheten for å håndtere talepassord leverer informasjon om resultatet av autentiseringen ved å bruke en sikret link mot den WML-baserte applikasjon. The device for handling voice passwords delivers information about the result of the authentication using a secured link to the WML-based application.
I figur 1 betegner bokstavene A-D grensesnittene mellom de forskjellige enheter, hvilke grensesnitt er: a) Grensesnittet mellom innretningen inneholdende den WML-baserte leser det trådløse nettverk. b) En forbindelse med evnen til å transportere digitalt ko-det tale. Dette kan være en 56/64 kbits/s krets som bruker In Figure 1, the letters A-D denote the interfaces between the different devices, which interfaces are: a) The interface between the device containing the WML-based reader and the wireless network. b) A connection with the ability to transport digitally coded speech. This can be a 56/64 kbits/s circuit that uses
et signaleringsskjerna som signaleringssystem #7 eller benytter ISDN. a signaling core such as signaling system #7 or uses ISDN.
c) Et grensesnitt som overfører WML-innhold. Dette er nor-malt et IP-basert grensesnitt. Protokollen som overfører c) An interface that transfers WML content. This is normally an IP-based interface. The protocol that transmits
WML kan være WAP-stakken, HTTP eller HTTPS. WML can be the WAP stack, HTTP or HTTPS.
d) Dette kan være enhver type åpent eller proprietært grensesnitt mellom de to enheter. De to enheter kan være knyt-tet sammen direkte eller via en sikker nettverks-forbindelse . d) This can be any type of open or proprietary interface between the two devices. The two devices can be linked together directly or via a secure network connection.
En eksempelvis fysisk utførelse av et arrangement ifølge oppfinnelsen er vist i figur 2 som en nettverksarkitektur. I dette eksempel aksesserer brukeren en applikasjon av in-teresse lokalisert på en trådløs e-handelsserver fra en mo-biltelefon med en mikroleser installert. Den trådløse e-handelsserver er koblet til en IVR-server som utfører autentiseringen. Av sikkerhetsgrunner bruker forbindelsen en proprietær link. Grensesnittene involvert er som definert ovenfor. An exemplary physical embodiment of an arrangement according to the invention is shown in Figure 2 as a network architecture. In this example, the user accesses an application of interest located on a wireless e-commerce server from a mobile phone with a micro reader installed. The wireless e-commerce server is connected to an IVR server that performs the authentication. For security reasons, the connection uses a proprietary link. The interfaces involved are as defined above.
I skjemaet for meldingsflyt i figur 3 er prosedyren for å etablere WAP-sesjonen vist som en melding sendt fra bruker-terminalen til applikasjonen. Denne melding trigger av en melding fra applikasjonen til enheten som håndterer talepassordet. Denne initierer i sin tur en utveksling av mel-dinger om anropskontroll mellom leseren (på bruker-terminalen) og enheten som håndterer talepassord (på IRV-serveren). Hvis resultatet av autentiseringsprosessen er tilfredsstillende, sender enheten som håndterer talepassord en autentisering OK-melding til applikasjonen. Applikasjonen kan da fullføre transaksjonen. In the message flow form in Figure 3, the procedure for establishing the WAP session is shown as a message sent from the user terminal to the application. This message is triggered by a message from the application to the device that handles the voice password. This in turn initiates an exchange of call control messages between the reader (on the user terminal) and the device that handles voice passwords (on the IRV server). If the result of the authentication process is satisfactory, the device that handles voice passwords sends an authentication OK message to the application. The application can then complete the transaction.
Fordelen med det inventive arrangement og den inventive fremgangsmåte er at den tilveiebringer utvidede egenskaper ved brukerautentisering på første fase WAP-/WML-baserte innretninger. Sikkerhetsløsninger basert på talepassord implementeres for eksempel i banksystemer, det vil si denne løsning vil oppfylle krav fra finansinstitusjoner til sikkerhet ved brukerautentisering. Ved å bruke "klikk for anrop" -egenskapen til WAP, vil denne funksjon være enkel å bruke for sluttbrukeren. The advantage of the inventive arrangement and the inventive method is that it provides extended features for user authentication on first stage WAP/WML based devices. Security solutions based on voice passwords are implemented, for example, in banking systems, that is, this solution will meet requirements from financial institutions for security during user authentication. Using the "click to call" feature of WAP, this feature will be easy to use for the end user.
Oppfinnelsen kan brukes for enhver type WML-baserte transaksjoner som krever autentiseringssikkerhet over det som tilveiebringes av basal WAP og det celledelte nettverk. Dette kan være tilgang til hjemmebank, tilgang til fortro-lig informasjon (for eksempel bedriftsinformasjon), en ekstra sikkerhet for å passere en Internett-brannvegg for WAP-tilgang og så videre. The invention can be used for any type of WML-based transaction that requires authentication security beyond that provided by the basic WAP and the cell-shared network. This could be access to home banking, access to confidential information (for example company information), an additional security to pass an Internet firewall for WAP access and so on.
DEFINISJONER OG FORKORTELSER DEFINITIONS AND ABBREVIATIONS
GSM (Global System for Mobile Communications) - globalt system for mobil kommunikasjon GSM (Global System for Mobile Communications) - global system for mobile communications
En digital celledelt telefonteknologi basert på TDMA som er vidt utbredt i Europa og over hele verden. A digital cellular telephone technology based on TDMA that is widely used in Europe and throughout the world.
Nettport Web portal
En nettport (gateway) er et nettverkspunkt som virker som en inngang til et annet nett. I et bedriftsnett virker en proksyserver som en nettport mellom det interne nett og Internett. En nettport kan også være enhver innretning som leverer pakker fra ett nett til et annet på deres vei over Internett. A network port (gateway) is a network point that acts as an entrance to another network. In a corporate network, a proxy server acts as a gateway between the internal network and the Internet. A gateway can also be any device that delivers packets from one network to another on their way across the Internet.
HTTP - Hypertext Transfer Protocol HTTP - Hypertext Transfer Protocol
HTTP er settet av regler for å utveksle filer (tekst, gra-fiske bilder, lyd, video og andre multimediafiler) på ver-densveven. I forhold til TCP-/IP-suiten av protokoller (som er basis for informasjonsutveksling på Internett), er HTTP en applikasjonsprotokoll. HTTP is the set of rules for exchanging files (text, graphic images, sound, video and other multimedia files) on the World Wide Web. Compared to the TCP/IP suite of protocols (which is the basis for information exchange on the Internet), HTTP is an application protocol.
HTTPS HTTPS
Secure Hypertext Transfer Protocol er en Web-protokoll byg-get inn i en leser som krypterer og dekrypterer brukerside-anmodninger, så vel som sidene som returneres av Web-server. HTTPS er i realiteten bare bruken av sikkerhetspro-tokoll (SSL - Secure Socket Layer) som et sublag under dets vanlige HTTP-applikasjonslag. Secure Hypertext Transfer Protocol is a Web protocol built into a browser that encrypts and decrypts user page requests, as well as the pages returned by the Web server. HTTPS is really just the use of security protocol (SSL - Secure Socket Layer) as a sub-layer under the normal HTTP application layer.
IVR - Interactive Voice Response, det vil si interaktiv talerespons IVR - Interactive Voice Response, i.e. interactive voice response
Et automatisert telefonsvarersystem som reagerer med en ta-lemeny og tillater brukeren å utføre valg og gi inn informasjon via tastaturfeltet. IVR-systemer brukes mye i an-ropssentre, så vel som en erstatning for menneskelige sent-ralbordoperatører. Systemet kan også integrere databasetil-gang og faksrespons. An automated answering system that responds with a call menu and allows the user to make selections and enter information via the keypad field. IVR systems are widely used in call centers as well as a replacement for human switchboard operators. The system can also integrate database access and fax response.
Hikroleser Hicro reader
En slankere variant av en www-leser skreddersydd for tynne klienter med små skjermer og kommunikasjon med liten bånd-bredde. Eksempler på en mikroleser er leseren på en WAP-klient, for eksempel en WAP-klargjort telefon. A slimmer variant of a www-reader tailored for thin clients with small screens and communication with low bandwidth. Examples of a microreader are the reader on a WAP client, for example a WAP-enabled telephone.
Passord Password
I sammenheng med oppfinnelsen, tilveiebringer et hemmelig mønster delt mellom brukeren og enheten autorisasjon. Passordet kan være et talt ord eller for eksempel en PINkode bestående av et antall sifre. In the context of the invention, a secret pattern shared between the user and the device provides authorization. The password can be a spoken word or, for example, a PIN code consisting of a number of digits.
PIN (Personal Identification Number) - personlig identifi-kasjonsnummer PIN (Personal Identification Number) - personal identification number
Et personlig passord benyttet for identifikasjonsformål A personal password used for identification purposes
SIM - Subscriber Identity Module, det vil si modul for abonnent i dent i t e t SIM - Subscriber Identity Module, i.e. module for subscriber in dent i t e t
SIM-kortet er et spesiell type smartkart som brukes for sikkerhet, abonnementsdata og lagring i en GSM-telefon. SIM Application Toolkit-standarden i GSM gjør det mulig også for enkle applikasjoner å lagres og utføres på SIM-kortet. The SIM card is a special type of smart card used for security, subscription data and storage in a GSM phone. The SIM Application Toolkit standard in GSM makes it possible also for simple applications to be stored and executed on the SIM card.
USSD - Unstruetured Supplementary Service Data USSD - Untrue Supplementary Service Data
En GSM-protokoll for å levere tjenestedata via kontrollpla-net til GSM-protokollen. Mange tilleggstjenester bruker USSD for signalering (for eksempel format av type <*>123#) A GSM protocol for delivering service data via the control plane of the GSM protocol. Many additional services use USSD for signaling (for example format of type <*>123#)
WAP - Wireless Application Protocol WAP - Wireless Application Protocol
A trådløs standard opprinnelig foreslått av Motorola, Ericsson og Nokia for å gi små trådløse innretninger, slik som telefoner og PDA-er tilgang til Internett-type innhold. WAP bruker Wireless Markup-språk (WML) for å presentere Internett -innhold. A wireless standard originally proposed by Motorola, Ericsson and Nokia to allow small wireless devices such as telephones and PDAs access to Internet-type content. WAP uses Wireless Markup Language (WML) to present Internet content.
WTA - Wireless Telephony Application WTA - Wireless Telephony Application
WTA tilveiebringer telefonfunksjoner som kan brukes i sammenheng med WAP. I denne oppfinnelse krever WTA-funksjonalitet evnen til å utføre et telefonanrop for å velge en post i en WAP-basert meny. WTA provides telephone functions that can be used in conjunction with WAP. In this invention, WTA functionality requires the ability to make a phone call to select an entry in a WAP-based menu.
Claims (6)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO19992071A NO313949B1 (en) | 1999-04-29 | 1999-04-29 | Authentication in mobile networks |
PCT/SE2000/000648 WO2000067448A1 (en) | 1999-04-29 | 2000-04-25 | Secure wap transactions using voice based authentication |
AU44432/00A AU4443200A (en) | 1999-04-29 | 2000-04-25 | Secure wap transactions using voice based authentication |
ARP000102052A AR023799A1 (en) | 1999-04-29 | 2000-04-28 | PROVISION TO PROVIDE USER AUTHENTICATION SECURITY |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO19992071A NO313949B1 (en) | 1999-04-29 | 1999-04-29 | Authentication in mobile networks |
Publications (3)
Publication Number | Publication Date |
---|---|
NO992071D0 NO992071D0 (en) | 1999-04-29 |
NO992071L NO992071L (en) | 2000-10-30 |
NO313949B1 true NO313949B1 (en) | 2002-12-30 |
Family
ID=19903265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NO19992071A NO313949B1 (en) | 1999-04-29 | 1999-04-29 | Authentication in mobile networks |
Country Status (4)
Country | Link |
---|---|
AR (1) | AR023799A1 (en) |
AU (1) | AU4443200A (en) |
NO (1) | NO313949B1 (en) |
WO (1) | WO2000067448A1 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2367975B (en) * | 2000-06-12 | 2004-10-27 | Ac Properties Bv | Mobile commerce |
JP2002157632A (en) * | 2000-11-22 | 2002-05-31 | Fujitsu Ltd | Network shopping method and system and automatic transfer machine |
FR2820854A1 (en) * | 2001-02-13 | 2002-08-16 | Sagem | METHOD OF ELECTRONICALLY ORDERING PRODUCTS FROM A SALES CENTER |
FR2824688B1 (en) * | 2001-05-14 | 2004-07-02 | Device Inc E | USE OF THE WML PROTOCOL IN A TCP / IP ENVIRONMENT BY A METHOD, COMPONENT, EQUIPMENT AND SYSTEM |
US20100022270A1 (en) * | 2001-06-27 | 2010-01-28 | John Mikkelsen | Mobile dialogue system and mobile content delivery solutions |
EP1302917A3 (en) * | 2001-08-16 | 2004-01-02 | Siemens Aktiengesellschaft | Method and apparatus for electronic payment of goods and services, in particular for an application on a data network |
CA2356420A1 (en) * | 2001-08-30 | 2003-02-28 | Wmode Inc. | Authentication and non-repudiation of a subscriber on a public network |
WO2003047208A1 (en) * | 2001-11-29 | 2003-06-05 | Mobile Commerce Limited | Credit card payment by mobile phone |
WO2004107285A1 (en) * | 2003-05-12 | 2004-12-09 | Briza Technologies, Inc. | Credit card sms portal transmission system and process |
CA2526246A1 (en) * | 2003-05-30 | 2004-12-09 | Koninklijke Kpn N.V. | Method and system for recovery of an electronic voucher and content received using an electronic voucher |
EP1708172A1 (en) * | 2005-03-30 | 2006-10-04 | Top Digital Co., Ltd. | Voiceprint identification system for E-commerce |
CN101110980B (en) * | 2006-07-18 | 2010-12-29 | 中兴通讯股份有限公司 | System and method for implementing access voice interactive business |
CN101330401B (en) * | 2007-06-22 | 2010-12-08 | 华为技术有限公司 | Method, apparatus and system for estimating safety state |
CN101267456B (en) * | 2008-03-31 | 2011-04-13 | 中国联合网络通信集团有限公司 | Method and system for preventing CP subscription simulation |
US20130204784A1 (en) * | 2012-02-07 | 2013-08-08 | Voice Commerce Group Technologies Limited | System and method for processing transactions |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US5897616A (en) * | 1997-06-11 | 1999-04-27 | International Business Machines Corporation | Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases |
-
1999
- 1999-04-29 NO NO19992071A patent/NO313949B1/en unknown
-
2000
- 2000-04-25 AU AU44432/00A patent/AU4443200A/en not_active Abandoned
- 2000-04-25 WO PCT/SE2000/000648 patent/WO2000067448A1/en active Application Filing
- 2000-04-28 AR ARP000102052A patent/AR023799A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
AR023799A1 (en) | 2002-09-04 |
NO992071L (en) | 2000-10-30 |
WO2000067448A1 (en) | 2000-11-09 |
NO992071D0 (en) | 1999-04-29 |
AU4443200A (en) | 2000-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6915124B1 (en) | Method and apparatus for executing secure data transfer in a wireless network | |
US6647260B2 (en) | Method and system facilitating web based provisioning of two-way mobile communications devices | |
US8265600B2 (en) | System and method for authenticating remote server access | |
NO313949B1 (en) | Authentication in mobile networks | |
EP1121794B1 (en) | Accessing a server computer | |
US20030055738A1 (en) | Method and system for effecting an electronic transaction | |
US20070220275A1 (en) | WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION | |
US20060074685A1 (en) | Destination device initiated caller identification | |
US7865719B2 (en) | Method for establishing the authenticity of the identity of a service user and device for carrying out the method | |
US6795924B1 (en) | Sat back channel security solution | |
US20190075458A1 (en) | A method and a server for authenticating a user with a mobile device | |
US12130897B2 (en) | Systems and methods for initiating an authenticated session | |
US20060068756A1 (en) | Mobile user authentication in connection with access to mobile services | |
KR101701676B1 (en) | Certification Request and Agent Method using Voice Feature | |
EP2356619A1 (en) | Data communication method and system for providing a financial transaction | |
KR101072930B1 (en) | Method for approving the telephone number change request | |
WO2012041781A1 (en) | Fraud prevention system and method using unstructured supplementary service data (ussd) | |
Kehr et al. | Mobile security for Internet applications | |
CA3092511A1 (en) | Systems and methods for initiating an authenticated session | |
US20090137232A1 (en) | Method and a system for providing information from a customer's bank account to his mobile phone | |
KR20080010367A (en) | Method for prviding information | |
KR100626485B1 (en) | System and Method for Operating Community in Mobile, Recording Medium | |
CN117459941A (en) | Overseas fraud recognition method, device, equipment and readable storage medium | |
KR20080016706A (en) | System for providing information | |
KR20080010081A (en) | System and method for providing information by using mobile internet and program recording medium |