[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

NO313949B1 - Authentication in mobile networks - Google Patents

Authentication in mobile networks Download PDF

Info

Publication number
NO313949B1
NO313949B1 NO19992071A NO992071A NO313949B1 NO 313949 B1 NO313949 B1 NO 313949B1 NO 19992071 A NO19992071 A NO 19992071A NO 992071 A NO992071 A NO 992071A NO 313949 B1 NO313949 B1 NO 313949B1
Authority
NO
Norway
Prior art keywords
wml
user
voice
authentication
wireless
Prior art date
Application number
NO19992071A
Other languages
Norwegian (no)
Other versions
NO992071L (en
NO992071D0 (en
Inventor
Knut Brandrud
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Priority to NO19992071A priority Critical patent/NO313949B1/en
Publication of NO992071D0 publication Critical patent/NO992071D0/en
Priority to PCT/SE2000/000648 priority patent/WO2000067448A1/en
Priority to AU44432/00A priority patent/AU4443200A/en
Priority to ARP000102052A priority patent/AR023799A1/en
Publication of NO992071L publication Critical patent/NO992071L/en
Publication of NO313949B1 publication Critical patent/NO313949B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Multimedia (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Acoustics & Sound (AREA)
  • Human Computer Interaction (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Denne oppfinnelse vedrører et arrangement og en fremgangs- måte for å tilveiebringe autentisering av en bruker ved utførelse av trådløse elektroniske handelstransaksjoner ved å bruke en mobilenhet. Dette oppnås ved å kombinere en WML- (WAP Markup-språk) basert mikroleser på mobilenheten og talebasert autentisering i nettet.This invention relates to an arrangement and method for providing authentication of a user in performing wireless electronic commerce transactions using a mobile device. This is achieved by combining a WML (WAP Markup language) based micro-reader on the mobile device and voice-based authentication in the network.

Description

TEKNISK OMRÅDE TECHNICAL AREA

Denne oppfinnelse vedrører et arrangement og en fremgangsmåte for å tilveiebringe brukerautentisering ved utførelse av trådløse elektroniske handelstransaksjoner ved å bruke en mobilenhet. This invention relates to an arrangement and method for providing user authentication when performing wireless electronic commerce transactions using a mobile device.

KJENT TEKNIKK PRIOR ART

Problemet er å tilveiebringe et tilfredsstillende sikker-hetsnivå når noen utfører trådløse elektroniske handelstransaksjoner på en mobilenhet. Fra tidligere kjent teknikk er det kjent noen løsninger på dette problem, som inkluderer : 1. Å bruke SIM-kortbasert sikkerhet. Dette krever enten at mikroleseren er lokalisert på SIM-kortet, eller at det fin-nes standardløsninger for en mikroleser for telefon for å aksessere sikkerhetsfunksjonene på SIM-kortet. Løsningene ved SIM-kort er begrenset til GSM-systemer. En på SIM Application Toolkit- {verktøysett for SIM-applikasjon) basert leser (browser) har visse begrensninger på grunn av proprietær SIM-teknologi; begrenset funksjonalitet i SIM Toolkit-standardene og ingen understøttelse utenfor GSM. Det pågår en standardisering for å tilveiebringe SIM-/smartkortsikkerhet innen WAP, men standardene er ikke fer-dige . Derfor er det behov for mellomløsninger som benytter WAP 1.0-baserte løsninger, som ikke har løst sikkerhetsas-pektene . 2. Å bruke sikkerhetsfunksjoner på et smartkort som kan le-ses fra telefonen med en ekstra kortleser. The problem is to provide a satisfactory level of security when someone conducts wireless electronic commerce transactions on a mobile device. Some solutions to this problem are known from the prior art, which include: 1. Using SIM card-based security. This requires either that the microreader is located on the SIM card, or that there are standard solutions for a microreader for phones to access the security functions on the SIM card. SIM card solutions are limited to GSM systems. A SIM Application Toolkit-based browser has certain limitations due to proprietary SIM technology; limited functionality in the SIM Toolkit standards and no support outside of GSM. Standardization is underway to provide SIM/smart card security within WAP, but the standards are not finished. There is therefore a need for intermediate solutions that use WAP 1.0-based solutions, which have not solved the security aspects. 2. Using security features on a smart card that can be read from the phone with an additional card reader.

Begrensningen ved denne løsning er at det kreves en telefon med ekstra smartkortleser. Det er begrenset tilgjengelighet til disse telefoner, løsninger er ikke standardisert ennå, og telefonene blir lett større og mer kostbare. 3.Å bruke eksterne sikkerhetsinnretninger, slik som pass-ordkalkulatorer som genererer engangspassord og krever en personlig PIN-kode for å aktiveres. The limitation of this solution is that a phone with an additional smart card reader is required. Availability of these phones is limited, solutions are not standardized yet, and the phones easily become larger and more expensive. 3.Using external security devices, such as password calculators that generate one-time passwords and require a personal PIN to activate.

Det er ikke særlig hendig å bære med deg en passordkalkula-tor, og det tar tid å bruke den (skriv først inn PIN, skriv så inn generert passord på telefonen). Videre øker kostna-dene ved løsningen for sluttbrukeren. It is not very convenient to carry a password calculator with you, and it takes time to use it (first enter the PIN, then enter the generated password on the phone). Furthermore, the costs of the solution for the end user increase.

HENSIKTER MED OPPFINNELSEN OBJECTS OF THE INVENTION

Den foreliggende oppfinnelse har som sin hensikt å tilveiebringe sikker brukerautentisering ved utførelse av trådløse handelstransaksjoner på en mobilenhet uten sikkerhetsfunksjoner utover standard sikkerhet tilveiebrakt av nettver-ket. The purpose of the present invention is to provide secure user authentication when performing wireless business transactions on a mobile device without security functions beyond the standard security provided by the network.

Dette oppnås ved å kombinere en WML- {WAP Markup Language - WAP Markup-språk) basert mikroleser på mobilenheten og talebasert autentisering i nettet. This is achieved by combining a WML (WAP Markup Language) based microreader on the mobile device and voice-based authentication in the web.

Oppfinnelsen kan benyttes i trådløs elektronisk handel og andre Wireless Application Protocol- (WAP) baserte applikasjoner som krever brukerautentisering utover det som tilveiebringes av selve det trådløse nettverk. Oppfinnelsen kan benyttes i trådløse nett, slik som GSM, D-AMPS og CDMA. The invention can be used in wireless electronic commerce and other Wireless Application Protocol (WAP)-based applications that require user authentication beyond that provided by the wireless network itself. The invention can be used in wireless networks, such as GSM, D-AMPS and CDMA.

Det eksakte omfang av oppfinnelsen er som definert i de vedlagte patentkrav. The exact scope of the invention is as defined in the attached patent claims.

KORTFATTET BESKRIVELSE AV TEGNINGENE BRIEF DESCRIPTION OF THE DRAWINGS

Figur 1 er et skjematisk diagram som viser forskjellige enheter (objekter/entiteter) i en transaksjon som bruker den foreliggende oppfinnelse. Figur 2 viser et eksempel på en nettverksarkitektur for systemer som benytter oppfinnelsen. Figur 3 viser et eksempel på meldingsflyt for en transaksjon som benytter oppfinnelsen. Figure 1 is a schematic diagram showing different entities (objects/entities) in a transaction using the present invention. Figure 2 shows an example of a network architecture for systems that use the invention. Figure 3 shows an example of message flow for a transaction that uses the invention.

DETALJERT BESKRIVELSE AV OPPFINNELSEN DETAILED DESCRIPTION OF THE INVENTION

Figur 1 viser de forskjellige enheter involvert når en bruker ønsker å aksessere en WML-basert applikasjon (trådløs e-handel. Intranett-aksessnettport, tilgang til bonustje-neste og så videre), 4, via en mobilenhet, og ved å bruke en fremgangsmåte og et system ifølge den foreliggende oppfinnelse. Brukeren starter en WML-basert dialog som invol-verer WML-basert leser, 1, en mikroleser med evnen til å vise frem Wireless Markup Language (WML). Leseren kan være lokalisert i en telefon eller annen type trådløs enhet, slik som en personlig digital assistent (PDA). For enklere trådløse enheter kan deler av leseren være implementert i en server. Et eksempel på dette er en GSM-telefon som bruker USSD-egenskapene ved GSM fase 2 sammen med en proksyserver som konverterer WML-innhold til USSD-tekststrenger som vises frem på telefonen. Alternativt kan det benyttes SMS eller GPRS som bærer. Figure 1 shows the different devices involved when a user wants to access a WML-based application (wireless e-commerce. Intranet access portal, access to bonus service and so on), 4, via a mobile device, and using a method and a system according to the present invention. The user initiates a WML-based dialog involving the WML-based reader, 1, a microreader with the ability to display Wireless Markup Language (WML). The reader may be located in a telephone or other type of wireless device, such as a personal digital assistant (PDA). For simpler wireless devices, parts of the reader can be implemented in a server. An example of this is a GSM phone that uses the USSD capabilities of GSM phase 2 together with a proxy server that converts WML content into USSD text strings that are displayed on the phone. Alternatively, SMS or GPRS can be used as the carrier.

Mobilenheten er tilknyttet et trådløst nettverk, 2, som inkluderer en WAP-nettport. Denne enhet (entitet) består av alle trådløse svitsjekomponenter, slik som basestasjon-system (BSS) og mobilsvitsjesenter (MSC). I tillegg til dette inneholder den WAP-nettporten. WAP-nettporten konverterer mellom WAP-protokollen og bærertjenestene på radiosiden, og Internett-protokoller på Internett-siden. Brukeren aksesserer den WML-baserte applikasjon, 4. Denne enhet er en applikasjon som bruker den WAP-definerte Wireless Markup -sp råk (WML) for dialog med en bruker. På et bestemt trinn i dialogen kreves det en autentisering. Applikasjonen, 4, bruker en enhet, 3, som håndterer talepassord, for autentisering av brukeren. Denne enhet er en nettverkskom-ponent som håndterer talegjenkjenning og talebasert dialog med brukeren. Den vil også håndtere passordet og mekanismer for personlig taledetektering. Denne enhet vil typisk være basert på et integrert taleresponssystem (IVR - Integrated Voice Response). Autentiseringen kan utføres ved å presentere WML-kort (side) til brukeren som inkluderer et meny-valg som initierer et taleanrop til et IVR-basert autenti-seringssenter ved å bruke basal trådløs funksjonalitet ved telefoniapplikasjon (evnen til å utføre et telefonanrop ved å velge en post i WAP-basert meny). Autentiseringen utføres ved å bruke et talebasert passord som kan tilveiebringe både et brukerpassord og verifisering av brukerens tale. Resultatet av autentiseringen returneres til den WML-baserte applikasjon, som fortsetter eller avslutter transaksjonen. The mobile device is connected to a wireless network, 2, which includes a WAP web port. This unit (entity) consists of all wireless switching components, such as base station system (BSS) and mobile switching center (MSC). In addition to this, it contains the WAP web portal. The WAP gateway converts between the WAP protocol and bearer services on the radio side, and Internet protocols on the Internet side. The user accesses the WML-based application, 4. This device is an application that uses the WAP-defined Wireless Markup Language (WML) for dialogue with a user. At a certain step in the dialog, an authentication is required. The application, 4, uses a device, 3, which handles voice passwords, for authenticating the user. This device is a network component that handles speech recognition and speech-based dialogue with the user. It will also handle the password and personal voice detection mechanisms. This device will typically be based on an integrated voice response system (IVR - Integrated Voice Response). The authentication can be performed by presenting a WML card (page) to the user that includes a menu selection that initiates a voice call to an IVR-based authentication center using basic wireless telephony functionality (the ability to make a phone call by selecting an entry in the WAP-based menu). The authentication is performed using a voice-based password that can provide both a user password and verification of the user's speech. The result of the authentication is returned to the WML-based application, which continues or terminates the transaction.

Hvis leseren ikke understøtter denne menyegenskap (klikk for anrop), kan enheten som håndterer talepassord i stedet initiere et anrop til brukeren, etter at WML-dialogen er avsluttet, for å utføre autentiseringen. Enheten for å håndtere talepassord kan identifisere bruken som skal au-tentiseres ved hans/hennes anropende ID (telefonnummer). I tilfelle av flere brukere koblet til det samme telefonnummer, eller i tilfelle av en telefon som ikke eies av brukeren, er ekstra identifikasjon av brukeren påkrevd for enheten som håndterer talepassordet. Dette kan oppnås ved å bruke et B-nummer som gir ekstra informasjon, eller ved å informere enheten som håndterer talepassord på forhånd om at en autentisering av en spesifikk bruker vil skje fra det gitte telefonnummer. If the browser does not support this menu property (click to call), the voice password handler may instead initiate a call to the user, after the WML dialog has ended, to perform the authentication. The device for handling voice passwords can identify the user to be authenticated by his/her caller ID (phone number). In the case of several users connected to the same telephone number, or in the case of a telephone not owned by the user, additional identification of the user is required for the device handling the voice password. This can be achieved by using a B-number that provides additional information, or by informing the device handling voice passwords in advance that an authentication of a specific user will take place from the given telephone number.

Den faktiske algoritme benyttet av enheten, som håndterer talepassordet for å utføre autentiseringen, kan avvike for forskjellige implementeringer av en enhet som håndterer talepassord. Et eksempel på en algoritme er å benytte personlig PIN-kode kombinert med gjenkjenning av personlig tale. Enheten som håndterer talepassord vil be om hele PIN-koden eller alternativt et tilfeldig siffer innen PIN-koden. Det siste vil sikre at hele PIN-koden aldri leveres samtidig. Personlig talegjenkjenning vil tilveiebringe en verifika-sjon av en spesifikk persons egen tale innen et akseptabelt nøyaktighetsnivå. The actual algorithm used by the device handling the voice password to perform the authentication may differ for different implementations of a device handling the voice password. An example of an algorithm is to use a personal PIN code combined with recognition of personal speech. The device that handles voice passwords will ask for the full PIN code or alternatively a random digit within the PIN code. The latter will ensure that the entire PIN code is never delivered at the same time. Personal speech recognition will provide a verification of a specific person's own speech within an acceptable level of accuracy.

Enheten for å håndtere talepassord leverer informasjon om resultatet av autentiseringen ved å bruke en sikret link mot den WML-baserte applikasjon. The device for handling voice passwords delivers information about the result of the authentication using a secured link to the WML-based application.

I figur 1 betegner bokstavene A-D grensesnittene mellom de forskjellige enheter, hvilke grensesnitt er: a) Grensesnittet mellom innretningen inneholdende den WML-baserte leser det trådløse nettverk. b) En forbindelse med evnen til å transportere digitalt ko-det tale. Dette kan være en 56/64 kbits/s krets som bruker In Figure 1, the letters A-D denote the interfaces between the different devices, which interfaces are: a) The interface between the device containing the WML-based reader and the wireless network. b) A connection with the ability to transport digitally coded speech. This can be a 56/64 kbits/s circuit that uses

et signaleringsskjerna som signaleringssystem #7 eller benytter ISDN. a signaling core such as signaling system #7 or uses ISDN.

c) Et grensesnitt som overfører WML-innhold. Dette er nor-malt et IP-basert grensesnitt. Protokollen som overfører c) An interface that transfers WML content. This is normally an IP-based interface. The protocol that transmits

WML kan være WAP-stakken, HTTP eller HTTPS. WML can be the WAP stack, HTTP or HTTPS.

d) Dette kan være enhver type åpent eller proprietært grensesnitt mellom de to enheter. De to enheter kan være knyt-tet sammen direkte eller via en sikker nettverks-forbindelse . d) This can be any type of open or proprietary interface between the two devices. The two devices can be linked together directly or via a secure network connection.

En eksempelvis fysisk utførelse av et arrangement ifølge oppfinnelsen er vist i figur 2 som en nettverksarkitektur. I dette eksempel aksesserer brukeren en applikasjon av in-teresse lokalisert på en trådløs e-handelsserver fra en mo-biltelefon med en mikroleser installert. Den trådløse e-handelsserver er koblet til en IVR-server som utfører autentiseringen. Av sikkerhetsgrunner bruker forbindelsen en proprietær link. Grensesnittene involvert er som definert ovenfor. An exemplary physical embodiment of an arrangement according to the invention is shown in Figure 2 as a network architecture. In this example, the user accesses an application of interest located on a wireless e-commerce server from a mobile phone with a micro reader installed. The wireless e-commerce server is connected to an IVR server that performs the authentication. For security reasons, the connection uses a proprietary link. The interfaces involved are as defined above.

I skjemaet for meldingsflyt i figur 3 er prosedyren for å etablere WAP-sesjonen vist som en melding sendt fra bruker-terminalen til applikasjonen. Denne melding trigger av en melding fra applikasjonen til enheten som håndterer talepassordet. Denne initierer i sin tur en utveksling av mel-dinger om anropskontroll mellom leseren (på bruker-terminalen) og enheten som håndterer talepassord (på IRV-serveren). Hvis resultatet av autentiseringsprosessen er tilfredsstillende, sender enheten som håndterer talepassord en autentisering OK-melding til applikasjonen. Applikasjonen kan da fullføre transaksjonen. In the message flow form in Figure 3, the procedure for establishing the WAP session is shown as a message sent from the user terminal to the application. This message is triggered by a message from the application to the device that handles the voice password. This in turn initiates an exchange of call control messages between the reader (on the user terminal) and the device that handles voice passwords (on the IRV server). If the result of the authentication process is satisfactory, the device that handles voice passwords sends an authentication OK message to the application. The application can then complete the transaction.

Fordelen med det inventive arrangement og den inventive fremgangsmåte er at den tilveiebringer utvidede egenskaper ved brukerautentisering på første fase WAP-/WML-baserte innretninger. Sikkerhetsløsninger basert på talepassord implementeres for eksempel i banksystemer, det vil si denne løsning vil oppfylle krav fra finansinstitusjoner til sikkerhet ved brukerautentisering. Ved å bruke "klikk for anrop" -egenskapen til WAP, vil denne funksjon være enkel å bruke for sluttbrukeren. The advantage of the inventive arrangement and the inventive method is that it provides extended features for user authentication on first stage WAP/WML based devices. Security solutions based on voice passwords are implemented, for example, in banking systems, that is, this solution will meet requirements from financial institutions for security during user authentication. Using the "click to call" feature of WAP, this feature will be easy to use for the end user.

Oppfinnelsen kan brukes for enhver type WML-baserte transaksjoner som krever autentiseringssikkerhet over det som tilveiebringes av basal WAP og det celledelte nettverk. Dette kan være tilgang til hjemmebank, tilgang til fortro-lig informasjon (for eksempel bedriftsinformasjon), en ekstra sikkerhet for å passere en Internett-brannvegg for WAP-tilgang og så videre. The invention can be used for any type of WML-based transaction that requires authentication security beyond that provided by the basic WAP and the cell-shared network. This could be access to home banking, access to confidential information (for example company information), an additional security to pass an Internet firewall for WAP access and so on.

DEFINISJONER OG FORKORTELSER DEFINITIONS AND ABBREVIATIONS

GSM (Global System for Mobile Communications) - globalt system for mobil kommunikasjon GSM (Global System for Mobile Communications) - global system for mobile communications

En digital celledelt telefonteknologi basert på TDMA som er vidt utbredt i Europa og over hele verden. A digital cellular telephone technology based on TDMA that is widely used in Europe and throughout the world.

Nettport Web portal

En nettport (gateway) er et nettverkspunkt som virker som en inngang til et annet nett. I et bedriftsnett virker en proksyserver som en nettport mellom det interne nett og Internett. En nettport kan også være enhver innretning som leverer pakker fra ett nett til et annet på deres vei over Internett. A network port (gateway) is a network point that acts as an entrance to another network. In a corporate network, a proxy server acts as a gateway between the internal network and the Internet. A gateway can also be any device that delivers packets from one network to another on their way across the Internet.

HTTP - Hypertext Transfer Protocol HTTP - Hypertext Transfer Protocol

HTTP er settet av regler for å utveksle filer (tekst, gra-fiske bilder, lyd, video og andre multimediafiler) på ver-densveven. I forhold til TCP-/IP-suiten av protokoller (som er basis for informasjonsutveksling på Internett), er HTTP en applikasjonsprotokoll. HTTP is the set of rules for exchanging files (text, graphic images, sound, video and other multimedia files) on the World Wide Web. Compared to the TCP/IP suite of protocols (which is the basis for information exchange on the Internet), HTTP is an application protocol.

HTTPS HTTPS

Secure Hypertext Transfer Protocol er en Web-protokoll byg-get inn i en leser som krypterer og dekrypterer brukerside-anmodninger, så vel som sidene som returneres av Web-server. HTTPS er i realiteten bare bruken av sikkerhetspro-tokoll (SSL - Secure Socket Layer) som et sublag under dets vanlige HTTP-applikasjonslag. Secure Hypertext Transfer Protocol is a Web protocol built into a browser that encrypts and decrypts user page requests, as well as the pages returned by the Web server. HTTPS is really just the use of security protocol (SSL - Secure Socket Layer) as a sub-layer under the normal HTTP application layer.

IVR - Interactive Voice Response, det vil si interaktiv talerespons IVR - Interactive Voice Response, i.e. interactive voice response

Et automatisert telefonsvarersystem som reagerer med en ta-lemeny og tillater brukeren å utføre valg og gi inn informasjon via tastaturfeltet. IVR-systemer brukes mye i an-ropssentre, så vel som en erstatning for menneskelige sent-ralbordoperatører. Systemet kan også integrere databasetil-gang og faksrespons. An automated answering system that responds with a call menu and allows the user to make selections and enter information via the keypad field. IVR systems are widely used in call centers as well as a replacement for human switchboard operators. The system can also integrate database access and fax response.

Hikroleser Hicro reader

En slankere variant av en www-leser skreddersydd for tynne klienter med små skjermer og kommunikasjon med liten bånd-bredde. Eksempler på en mikroleser er leseren på en WAP-klient, for eksempel en WAP-klargjort telefon. A slimmer variant of a www-reader tailored for thin clients with small screens and communication with low bandwidth. Examples of a microreader are the reader on a WAP client, for example a WAP-enabled telephone.

Passord Password

I sammenheng med oppfinnelsen, tilveiebringer et hemmelig mønster delt mellom brukeren og enheten autorisasjon. Passordet kan være et talt ord eller for eksempel en PINkode bestående av et antall sifre. In the context of the invention, a secret pattern shared between the user and the device provides authorization. The password can be a spoken word or, for example, a PIN code consisting of a number of digits.

PIN (Personal Identification Number) - personlig identifi-kasjonsnummer PIN (Personal Identification Number) - personal identification number

Et personlig passord benyttet for identifikasjonsformål A personal password used for identification purposes

SIM - Subscriber Identity Module, det vil si modul for abonnent i dent i t e t SIM - Subscriber Identity Module, i.e. module for subscriber in dent i t e t

SIM-kortet er et spesiell type smartkart som brukes for sikkerhet, abonnementsdata og lagring i en GSM-telefon. SIM Application Toolkit-standarden i GSM gjør det mulig også for enkle applikasjoner å lagres og utføres på SIM-kortet. The SIM card is a special type of smart card used for security, subscription data and storage in a GSM phone. The SIM Application Toolkit standard in GSM makes it possible also for simple applications to be stored and executed on the SIM card.

USSD - Unstruetured Supplementary Service Data USSD - Untrue Supplementary Service Data

En GSM-protokoll for å levere tjenestedata via kontrollpla-net til GSM-protokollen. Mange tilleggstjenester bruker USSD for signalering (for eksempel format av type <*>123#) A GSM protocol for delivering service data via the control plane of the GSM protocol. Many additional services use USSD for signaling (for example format of type <*>123#)

WAP - Wireless Application Protocol WAP - Wireless Application Protocol

A trådløs standard opprinnelig foreslått av Motorola, Ericsson og Nokia for å gi små trådløse innretninger, slik som telefoner og PDA-er tilgang til Internett-type innhold. WAP bruker Wireless Markup-språk (WML) for å presentere Internett -innhold. A wireless standard originally proposed by Motorola, Ericsson and Nokia to allow small wireless devices such as telephones and PDAs access to Internet-type content. WAP uses Wireless Markup Language (WML) to present Internet content.

WTA - Wireless Telephony Application WTA - Wireless Telephony Application

WTA tilveiebringer telefonfunksjoner som kan brukes i sammenheng med WAP. I denne oppfinnelse krever WTA-funksjonalitet evnen til å utføre et telefonanrop for å velge en post i en WAP-basert meny. WTA provides telephone functions that can be used in conjunction with WAP. In this invention, WTA functionality requires the ability to make a phone call to select an entry in a WAP-based menu.

Claims (6)

1. Arrangement for å tilveiebringe sikker brukerautentisering ved utførelse av trådløs elektronisk handel ever et celledelt trådløst nett, ved å bruke en mobilenhet utstyrt med en WML-{Wireless Markup Language) basert leser (1), i kommunikasjon med en trådløs e-handelsserver som kjører en WML-basert applikasjon (4) for å utføre transaksjoner ved trådløs elektronisk handel, via en WAP-{Wireless Application Protocol) nettport (2) som forbinder WAP-protokollen og bærertjenesten på radiosiden og Internett-protokoller på den andre siden, karakterisert ved at arrangementet omfatter en server for autentisering av brukeren, hvor serveren omfatter en enhet (3) basert på et IVR-system (Integrated Voice Response - integrert talerespons) som håndterer gjenkjenning og verifisering av brukeren ved tale- og talepass-ordautentisering.1. Arrangement for providing secure user authentication when conducting wireless electronic commerce over a cellular wireless network, using a mobile device equipped with a WML-{Wireless Markup Language) based reader (1), in communication with a wireless e-commerce server that running a WML-based application (4) to perform wireless electronic commerce transactions, via a WAP {Wireless Application Protocol) gateway (2) connecting the WAP protocol and bearer service on the radio side and Internet protocols on the other side, characterized in that the arrangement includes a server for authentication of the user, where the server includes a device (3) based on an IVR system (Integrated Voice Response) which handles recognition and verification of the user by voice and voice password authentication. 2. Arrangement ifølge krav 1, karakterisert ved at nevnte WML-baserte leser er en mikroleser.2. Arrangement according to claim 1, characterized in that said WML-based reader is a microreader. 3. Arrangement ifølge krav 1 eller 2, karakterisert ved at nevnte WML-baserte leser implementeres i en proksyserver som konverterer WML-innhold til USSD-(Unstructured Supplementary Service Data) tekststrenger som fremvises på nevnte mobilenhet.3. Arrangement according to claim 1 or 2, characterized in that said WML-based reader is implemented in a proxy server that converts WML content into USSD (Unstructured Supplementary Service Data) text strings that are displayed on said mobile device. 4. Arrangement ifølge ett av de foregående krav, karakterisert ved at kommunikasjon mellom nevnte WML-baserte applikasjon og nevnte enhet som håndterer talepassord skjer over en proprietær sikker link.4. Arrangement according to one of the preceding claims, characterized in that communication between said WML-based application and said device that handles voice passwords takes place over a proprietary secure link. 5. Fremgangsmåte for å utføre trådløse elektroniske handelstransaksjoner ved å bruke en mobilenhet, idet frem-gangsmåten omfatter de følgende trinn: • å initiere en WML-basert leser på mobilenheten • å aksessere en WML-basert applikasjon (4), som omfatter applikasjonen for elektronisk handel, og derved initierer en første dialog, karakterisert ved at på et bestemt trinn i den første dialog, • adresserer den WML-baserte applikasjon (4) en enhet (3) for håndtering av talepassord for autentisering av brukeren • nevnte enhet (3) for talepassord er innrettet til å håndtere talegjenkjenning og initiere en andre talebasert dialog med brukeren, og håndterer også mekanismer for passord og detektering av personlig tale • resultater av autentiseringsprosessen leveres til den WML-baserte applikasjon (4) • hvorpå den WML-baserte applikasjon (4) fullfører den første dialog med brukeren5. Method for performing wireless electronic commerce transactions using a mobile device, the method comprising the following steps: • initiating a WML-based reader on the mobile device • accessing a WML-based application (4), which includes the application for electronic commerce, thereby initiating a first dialogue, characterized in that at a specific step in the first dialogue, • the WML-based application (4) addresses a device (3) for handling voice passwords for authenticating the user • said device (3) for voice passwords is adapted to handle speech recognition and initiate a second speech-based dialogue with the user, and also handle mechanisms for passwords and personal speech detection • results of the authentication process are delivered to the WML-based application (4) • after which the WML-based application (4) completes the first dialogue with the user 6. Fremgangsmåte ifølge krav 5, karakterisert ved at den WML-baserte applikasjon (4) kommuniserer med enheten (3) for håndtering av talepassord over en proprietær sikker link.6. Method according to claim 5, characterized in that the WML-based application (4) communicates with the device (3) for handling voice passwords over a proprietary secure link.
NO19992071A 1999-04-29 1999-04-29 Authentication in mobile networks NO313949B1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
NO19992071A NO313949B1 (en) 1999-04-29 1999-04-29 Authentication in mobile networks
PCT/SE2000/000648 WO2000067448A1 (en) 1999-04-29 2000-04-25 Secure wap transactions using voice based authentication
AU44432/00A AU4443200A (en) 1999-04-29 2000-04-25 Secure wap transactions using voice based authentication
ARP000102052A AR023799A1 (en) 1999-04-29 2000-04-28 PROVISION TO PROVIDE USER AUTHENTICATION SECURITY

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NO19992071A NO313949B1 (en) 1999-04-29 1999-04-29 Authentication in mobile networks

Publications (3)

Publication Number Publication Date
NO992071D0 NO992071D0 (en) 1999-04-29
NO992071L NO992071L (en) 2000-10-30
NO313949B1 true NO313949B1 (en) 2002-12-30

Family

ID=19903265

Family Applications (1)

Application Number Title Priority Date Filing Date
NO19992071A NO313949B1 (en) 1999-04-29 1999-04-29 Authentication in mobile networks

Country Status (4)

Country Link
AR (1) AR023799A1 (en)
AU (1) AU4443200A (en)
NO (1) NO313949B1 (en)
WO (1) WO2000067448A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2367975B (en) * 2000-06-12 2004-10-27 Ac Properties Bv Mobile commerce
JP2002157632A (en) * 2000-11-22 2002-05-31 Fujitsu Ltd Network shopping method and system and automatic transfer machine
FR2820854A1 (en) * 2001-02-13 2002-08-16 Sagem METHOD OF ELECTRONICALLY ORDERING PRODUCTS FROM A SALES CENTER
FR2824688B1 (en) * 2001-05-14 2004-07-02 Device Inc E USE OF THE WML PROTOCOL IN A TCP / IP ENVIRONMENT BY A METHOD, COMPONENT, EQUIPMENT AND SYSTEM
US20100022270A1 (en) * 2001-06-27 2010-01-28 John Mikkelsen Mobile dialogue system and mobile content delivery solutions
EP1302917A3 (en) * 2001-08-16 2004-01-02 Siemens Aktiengesellschaft Method and apparatus for electronic payment of goods and services, in particular for an application on a data network
CA2356420A1 (en) * 2001-08-30 2003-02-28 Wmode Inc. Authentication and non-repudiation of a subscriber on a public network
WO2003047208A1 (en) * 2001-11-29 2003-06-05 Mobile Commerce Limited Credit card payment by mobile phone
WO2004107285A1 (en) * 2003-05-12 2004-12-09 Briza Technologies, Inc. Credit card sms portal transmission system and process
CA2526246A1 (en) * 2003-05-30 2004-12-09 Koninklijke Kpn N.V. Method and system for recovery of an electronic voucher and content received using an electronic voucher
EP1708172A1 (en) * 2005-03-30 2006-10-04 Top Digital Co., Ltd. Voiceprint identification system for E-commerce
CN101110980B (en) * 2006-07-18 2010-12-29 中兴通讯股份有限公司 System and method for implementing access voice interactive business
CN101330401B (en) * 2007-06-22 2010-12-08 华为技术有限公司 Method, apparatus and system for estimating safety state
CN101267456B (en) * 2008-03-31 2011-04-13 中国联合网络通信集团有限公司 Method and system for preventing CP subscription simulation
US20130204784A1 (en) * 2012-02-07 2013-08-08 Voice Commerce Group Technologies Limited System and method for processing transactions

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5897616A (en) * 1997-06-11 1999-04-27 International Business Machines Corporation Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases

Also Published As

Publication number Publication date
AR023799A1 (en) 2002-09-04
NO992071L (en) 2000-10-30
WO2000067448A1 (en) 2000-11-09
NO992071D0 (en) 1999-04-29
AU4443200A (en) 2000-11-17

Similar Documents

Publication Publication Date Title
US6915124B1 (en) Method and apparatus for executing secure data transfer in a wireless network
US6647260B2 (en) Method and system facilitating web based provisioning of two-way mobile communications devices
US8265600B2 (en) System and method for authenticating remote server access
NO313949B1 (en) Authentication in mobile networks
EP1121794B1 (en) Accessing a server computer
US20030055738A1 (en) Method and system for effecting an electronic transaction
US20070220275A1 (en) WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION
US20060074685A1 (en) Destination device initiated caller identification
US7865719B2 (en) Method for establishing the authenticity of the identity of a service user and device for carrying out the method
US6795924B1 (en) Sat back channel security solution
US20190075458A1 (en) A method and a server for authenticating a user with a mobile device
US12130897B2 (en) Systems and methods for initiating an authenticated session
US20060068756A1 (en) Mobile user authentication in connection with access to mobile services
KR101701676B1 (en) Certification Request and Agent Method using Voice Feature
EP2356619A1 (en) Data communication method and system for providing a financial transaction
KR101072930B1 (en) Method for approving the telephone number change request
WO2012041781A1 (en) Fraud prevention system and method using unstructured supplementary service data (ussd)
Kehr et al. Mobile security for Internet applications
CA3092511A1 (en) Systems and methods for initiating an authenticated session
US20090137232A1 (en) Method and a system for providing information from a customer&#39;s bank account to his mobile phone
KR20080010367A (en) Method for prviding information
KR100626485B1 (en) System and Method for Operating Community in Mobile, Recording Medium
CN117459941A (en) Overseas fraud recognition method, device, equipment and readable storage medium
KR20080016706A (en) System for providing information
KR20080010081A (en) System and method for providing information by using mobile internet and program recording medium