GB2148569A - Method of determining authorization of the user of a subscriber set - Google Patents
Method of determining authorization of the user of a subscriber set Download PDFInfo
- Publication number
- GB2148569A GB2148569A GB08426640A GB8426640A GB2148569A GB 2148569 A GB2148569 A GB 2148569A GB 08426640 A GB08426640 A GB 08426640A GB 8426640 A GB8426640 A GB 8426640A GB 2148569 A GB2148569 A GB 2148569A
- Authority
- GB
- United Kingdom
- Prior art keywords
- user
- characteristic
- stored
- subscriber set
- entered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
The authorization of the user of a portable personal automatic telephone is partly determined by comparing the voice characteristic of the user with that of the authorized person and is further determined by comparing the fingerprint pattern of the user with the fingerprint pattern of the authorized person. The arrangement includes a processor (5) which compares stored characteristics (ROM 1, 3) with user entered characteristics (RAM 2, 4). The switch (10) can be operated in response to correlations between one or both of the characteristics depending on the use to which the set is to be put. <IMAGE>
Description
SPECIFICATION
Determining the user authorization of a subscriber set for signal transmission
The invention relates a method of determining whether a user is authorized to use a subscriber set for signal transmission and to a subscriber set for signal transmission including user authorization determining means.
Such a method and such a subscriber set are disclosed in European Patent Specification
No. EP-B1-O 027 596.
Generally, it is useful to provide a subscriber set for signal transmission, such as, for example, a telephone set with a protection against unauthorized use, as the use of the subscriber set is always charged to the subscriber. With the present-day development of mobile subscriber sets (for example the socalled automatic personal telephone, as described in the article "The cellular telephone goes on line", published in the periodical "Electronics" of 22nd September 1983, pages 121-129), special account must be taken of the risk of non-authorized use. These portable sets may be found abandoned more frequently than wired sets, for example in the event of loss or theft.
It is already known to protect the subscriber set from unauthorized use by providing it with a lock to prevent unauthorized use. The authorized user identifies himself by using the appropriate key. The subscriber set may alternatively be arranged such that it is capable of recognizing a code on an identification card of the authorized person. These known manners of protection have the disadvantage that a physical identification device (key or card) is always necessary which may get lost.
From the above-mentioned European Patent
Sepcification it is known to determine the user authorization of a telephone set by comparing the voice characteristic of the user with the voice characteristic of the authorized person.
The human voice is an individual, unambiguous characteristic. With this personal characteristic it is possible to try to identify the owner of the voice unambiguously, so that in this way of determining the user authorization no physical identification device is required.
Several methods of identifying a person by means of his voice pattern are known. In all these methods the error probability, (i.e. the probability that a speaker is erroneously identified as non-authorized or a non-authorized speaker is erroneously identified as authorized) depends on the available computer and memory capacities and on the available computing time. If a great deal of memory capacity is available the speech samples can be stored in amore extensive form, which requires more computing time, such as described in, for example, the article "Talking with computers: Synthesis and Rocognition of
Speech by Machines"; IEEE Transactions on
Biomedical Engineering, Vol. BME-29, No. 4,
April 1982, Pages 223-232, more specifically page 230, paragraph Ill-F.
When determining the user authorization of a subscriber set for signal transmission it is undesirable for time necessary to arrive at a decision whether the set will be enabled or not, to be longer than a few seconds, as this would be annoying for the user. With a prescribed processing rate of the data such a fast decision can be relaized by limiting the number and size of the recorded speech samples, but this increases the error probability. More extensive recording of the speech samples implies a larger storage capacity and higher processing rates which, for reasons of cost and volume, is undesirable, especially with portable subscriber's sets such as used in said system of automatic personal telephones.
It is an object of the invention to provide a method of determining whether a user is authorized to use a subscriber set in which the error probability is reduced without significantly increasing the decision time, and which is suitable for portable subscriber sets of the automatic personal telephone system. It is a further object of the invention to provide a subscriber set for signal transmission including user authorization means in which the error probability is reduced without significantly increasing the decision time.
The invention provides a method of determining whether a user is authorized to use a subscriber set for signal transmission and enabling the subscriber set if authorization is determined, said method comprising the steps of: comparing a representation of a first characteristic of the authorized user, which characteristic is stored within an authorization determining means, with a corresponding representation of the first characteristic entered by the user to the authorisation determining means; producing a first decision signal indicating whether a sufficient correlation between the stored and entered representations of the first characteristic exists to imply that the user is the authorised user; comparing a representation of a second characteristic of the authorised user, which characteristic is stored within the authorisation determining means, with a corresponding representation of the second characteristic entered by the user into the authorisation determining means; producing a second decision signal indicating whether a sufficient correlation between the stored and entered representations of the second characteristic exists to imply that the user is the authorised user; and enabling the subscriber set if the first and/or second decision signals indicate correlation between the stored and entered representations of the user characteristic.
The invention further provides a subscriber set for signal transmission including user au thorisation determining means, said user authorisation determining means comprising means for storing a representation of a first characteristic of an authorised user; means for entering the first characteristic of a potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the first characteristic and producing a first decision signal which indicates whether a sufficient correlation exists between the representations of the stored and entered first characteristics to imply that both were produced by the same person; means for storing a representation of a second charateristic of an authorised user; means for entering the second characteristic of the potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the second characteristic and producing a second decision signal which indicates whether a sufficient correlation exists between the representation of the stored and entered second characteristics to imply that both were produced by the same person; means for applying the first and second decision signals to a subscriber set enabling means for producing an enabling signal when the first and/or second decision signals indicate correlation between the stored and entered characteristic(s).
As the second personal characteristic is independent of the first personal characteristic, the occurrence of incorrect decisions because of mutually dependent error causes is obviated. These mutually dependent error causes might, for example, be present if, to reduce the error probability, the other personal characteristic of the same type as the first personal characteristic, for example the voice characteristic, were chosen. In that case it is possible that because of, for example, the fact that the speaker has caught a cold or of permanent interfering background noise an incorrect decision as regards the user authorization of the speaker would continuously be taken.
With an embodiment of a method and a subscriber set which are suitable for simple and fast recognition the first personal characteristic may be formed by the voice characteristic and the second personal characteristic may be a finger of thumb print. Since using a subscriber set for signal transmission always implies that is touched by the user this touch can also be used for entering the finger print so that no additional manipulations of the user are- required for this purpose.
An embodiment of the invention and its advantages will now be described, by way of example with reference to the accompanying drawing, in which the sole Figure shows by means of a block schematic diagram an arrangement of a subscriber set for signal transmission including user authorization determining means.
The arrangement shown in the Fig. 2 comprises four memories 1, 2, 3 and 4, a processing unit 5, two converters 6 and 7, supply means 8 and 9, an authorizatici circuit 10 and a mode selector 12. The arrangement is connected via the authorization circuit 10 to the further circuits of the subscriber set, shown schematically in the Figure by the set function circuit 11.
Memory 1 is a read-only memory, intended to store a representation of the voice characteristic of the authorized user. The term "readonly memory" must be understood to mean that the content of memory 1, and also the content, of the read-only memory 3 still to be described, is not erased as part of the procedure for determining the user authorization. It is indeed possible that the read-only memories 1 and 3 are given a new content as part of a procedure for writing a characteristic of an authorized user into the memories. It is alternatively possible for the read-only memories 1 and 3 to be in the form of plug-in modules which are programmed outside the subscriber set.
The representation of the voice characteristic may assume different forms, as known from the prior art. For speaker recognition the representation of the voice characteristic may correspond to the representation for word identification, as described in the afore-mentioned IEEE-Article. The manner of storing a representation for word recognition is known per se, for example from the periodical "Mini
Micro Syems", June 1983. pages 242, 244 and 246, or from the periodical "Telecommunication Journal", Vol. 48, December 1981, pages 734 and 735.
Memory 2 is an erasable memory, intended to store a representation of the voice characteristic of a person wanting to use the subscriber set, called user hereinafter, which representation corresponds to that stored in the read-only memory 1.
Under the control of processing unit 5, prior to the use for communication purposes, the voice of the user is converted by converter 6 formed by a microphone 6-1 and an analogue-to-digital converter 6-2- into a representation of the voice characteristic, for example into a set of digital code words each representing a sample of the speech signal.
The set of digital code words can be read directly into memory 2 under the control of processing unit 5 or can be processed first by processing unit 5 to form a different representation before being stored in memory 2. After the representation of the voice characteristic of the user has been stored in memory 2 it is compared to the representation of the voice characteristic of the authorized person. This manner of comparing is known per se and is described in, for example, said periodical "Mini-Micro Systems", page 244. If both voice representations show sufficient correla tion between each other, that is to say they are within a predetermined margin of each other, then the processing unit generates a first decision signal which indicates that the two representations are sufficiently similar to be assumed to emanate from the same person.
Speaker recognition on the basis of the voice characteristic has an error probability in the order of some percents. From said IEEEarticle a value of 10% can be derived for the eror probability (page 230, paragraph Ill-F).
From the above-mentioned periodical "Mini
Micro Systems", pages 244 and 246 a value of 1 % for the error probability for word recognition can be derived, but this value holds for uptimun circumstances and may be considerably more in actual use. As for word recognition a method is followed which corresponds to the method of speaker recognition, it may be assumed that in both cases the error probability is of the same order of magnitude.
In order to reduce the number of times that the authorized user is not recognized as such, or that an unauthorized person is identified as authorized, as the case may be, the identity of the user is checked against a second individual characteristic which is independent of the first individual characteristic. In this embodiment the second characteristic is the finger print pattern.
In the read-only memory 3 a representation of the finger print pattern of the authorized user is stored. The manner of forming a representation of the pattern of a finger print is known per se, for example, from United
States Patent No. 4,210,899 and from the article "Reducing Storaged Requirements of
Digitized Fingerprint Images", 1 982 Carnahan Conference on Security Technology, University of Kentucky, 12-14 May 1982.
Memory 4 is an erasable memory intended to store the representation of the fingerprint pattern of the user. Entering the fingerprint pattern of the user into 4 the memory is effected in parallel with entering the voice characteristic of the user into the memory 2.
To this end the subscriber set is provided in a suitable place with a window 7-1 on which the relevant finger is placed.
Window 7-1 forms part of a converter 7 for converting the fingerprint pattern into a representation suitable for storage and/or processing. In addition, converter 7 comprises a lighting element 7-4, for example a small incandescent lamp, a camera 7-2 and an analogue-to-digital converter 7-3. Camera 7-2 is a television pick-up element which is known per se, for example a CTD (Charge
Transfer Device3 clement. Such a television pick-up element is, for example, the Philips
RGS-4 solid-state image sensor. In response to the pressure of the finger on the window 7-1 the lighting element 7-4 is switched on and camera 7-2 produces a signal representative of the fingerprint pattern.Under the control of processing unit 5 the camera signal is converted by anlogue-to-digital converter 7-3 into a set of digital code words which is either directly stored in memory 4 or is first processed by processing unit 5 and then stored in memory 4.
After the representation of the fingerprint pattern of the user has been stored in memory 4 a comparison is made with the representation of the fingerprint pattern of the authorized user. The manner in which this comparison is effected is known per se from the prior art, such as, for example, said United States
Patent Specification and from said article of the "Carnahan Conference". If these two representations show sufficient correlation between each other, that is they are within a predetermined margin of each other, then the processing unit generates a second decision signal which indicates that the two representations of the finger-print patterns are sufficiently similar to be assumed to be produced by the same person.
With the first decision signal which relates to correlation of the voice characteristics, and the second decision signal which relates to the correlation of the fingerprints the subscriber set can now be enabled for communication. It is possible to enable the subscriber set if at least one of the decision signals indicates correlation; it is alternatively possible to only enable the set when both decision signals indicate correlation.
In the first case the probalility of nonrecognition of the authorized user is small, but it is possible that an unauthorized person may be erroneously identified as being authorized.
In the second case the probability of nonauthorized use is small, but the probability of non-recognition of an authorized user is increased. It is also possible to differentiate the enabling criteria on the basis of the intended use of the subscriber set. So it is, for example, possible that for expensive international connection both decision signals indicating correlation are required, whilst only one decision signal indicating correlation is required for the less expensive national connections.
Entering the personal characteristics of the authorized user can be effected outside the subscriber set. It is alternatively possible for the authorized person to enter his personal characteristics himself, after he has adjusted the subscriber set to a suitable state for that purpose, for example with the aid of a key, a magnetic identification card or with the aid of a nummerical code which is entered via a number selection unit.
When the personal characteristics are entered by the authorized user himself, the subscriber set is adjusted with the aid of mode selector 1 2 in one of the above-described ways to the state suitable for storing the personal characteristics of the authorized user.
In this state the supply means 8 and 9 only transfer the information from the converters 6 and 7 to the memories 1 and 3, respectively.
After the personal characteristics of the authorized user have been stored, the subscriber set is readjusted to the normal mode of usage by removing the key or the identification card or by applying an appropriated nummerical code.
Claims (10)
1. A method of determining whether a user is authorized to use a subscriber set for signal transmission and enabling the subscriber set if authorization is determined, said method comprising the steps of:
comparing a representation of a first characteristic of the authorized user, which characteristic is stored within an authorization determining means, with a corresponding representation of the first characteristic entered by the user to the authorization determining means;
producing a first decision signal indicating whether a sufficient correlation between the stored and entered representations of the first characteristic exists to imply that the user is the authorized user;;
comparing a representation of a second characteristic of the authorized user, which characteristic is stored within the authorization determining means, with a corresponding representation of the second characteristic entered by the user into the authorization determining means;
producing a second decision signal indicating whether a sufficient correlation between the stored and entered representations of the second characteristic exists to imply that the user is the authorized user;
and enabling the subscriber set if the first and/or second decision signals indicate correlation between the stored and entered representations of the user characteristic.
2. A method according to Claim 1 in which the first characteristic is a voice characteristic.
3. A method according to Claim 1 or 2, in which the second characteristic is a finger or thumb point.
4. A method of determining whether a user is authorized to use a subscriber set for signal transmission and enabling the subscriber set if authorization is determined, the method being substantially as described herein with reference to the accompanying drawing.
5. A subscriber set for signal transmission including user authorization determining means, said user authorization determining means comprising means for storing a representation of a first characteristic of an authorized user; means for entering the first characteristic of a potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the first characteristic and producing a first decision signal which indicates whether a sufficient correlation exists between the representations of the stored and entered first characteristics to imply that both were produced by the same person, means for storing a representation of a second characteristic of an authorized user; means for entering the second characteristic of the potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the second characteristic and producing a second decision signal which indicates whether a sufficient correlation exists between the representation of the stored and entered second characteristics to imply that both were produced by the same person; means for applying the first and second decision signals to a subscriber set enabling means for producing an enabling signal when the first and/or second decision signals indicate correlation between the stored and entered characteristic(s).
6. A subscriber set as claimed in Claim 5, in which the representations of the first and/or second characteristics of the authorized user are stored in one or more non-volatile memories which is/are programmed outside the subscriber set.
7. A subscriber set as claimed in Claim 5, in which the user authorization determining means comprises a first transducer for converting the first characteristic of the user into an electrical signal, a second transducer for converting the second characteristic of the user into an electrical signal, means for temporarily storing the electrical signals corresponding to the first and second characteristics of the user, and means for comparing the stored authorized user representations and the temporarily stored user representations.
8. A subscriber set as claimed in any of
Claims 5, 6 or 7, comprising means for enabling the authorized user characteristics to be entered into one or more memories under the control of a switching arrangement actuated by the user.
9. A subscriber set as claimed in Claim 7, in which the switching arrangement is actuated under the control of a key.
10. A subscriber set for signal transmission substantially as described herein with reference to the accompanying drawing.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL8303649A NL8303649A (en) | 1983-10-24 | 1983-10-24 | METHOD FOR DETERMINING THE USE OF A USER OF A SUBSCRIBER FOR SIGNAL TRANSMISSION. |
Publications (2)
Publication Number | Publication Date |
---|---|
GB8426640D0 GB8426640D0 (en) | 1984-11-28 |
GB2148569A true GB2148569A (en) | 1985-05-30 |
Family
ID=19842601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB08426640A Withdrawn GB2148569A (en) | 1983-10-24 | 1984-10-22 | Method of determining authorization of the user of a subscriber set |
Country Status (9)
Country | Link |
---|---|
JP (1) | JPS60116263A (en) |
AU (1) | AU3463984A (en) |
BE (1) | BE900869A (en) |
DE (1) | DE3438106A1 (en) |
FR (1) | FR2553955A1 (en) |
GB (1) | GB2148569A (en) |
IT (1) | IT1175881B (en) |
NL (1) | NL8303649A (en) |
SE (1) | SE8405271L (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634570A1 (en) * | 1988-07-22 | 1990-01-26 | Reitter Renaud | Multi-biometric authentication system |
GB2229844A (en) * | 1989-01-16 | 1990-10-03 | Nat Res Dev | Individual identification |
GB2243934A (en) * | 1990-05-09 | 1991-11-13 | Shorrock Ltd | Access control |
GB2260670A (en) * | 1991-10-18 | 1993-04-21 | * Norm Pacific Automation Corporation | Multi-functional telephone system with speech recognition and control device |
AU698612B2 (en) * | 1993-12-21 | 1998-11-05 | Telia Ab | Method and arrangement in calls from mobile stations |
GB2334864A (en) * | 1998-01-16 | 1999-09-01 | Nec Corp | Mobile phone has vector coded password protection |
WO1999056482A1 (en) * | 1998-04-23 | 1999-11-04 | Siemens Aktiengesellschaft | Radio equipment with enhanced user authentication possibilities |
GB2342744A (en) * | 1998-10-14 | 2000-04-19 | Toshiba Kk | User confirmation using biometrics |
EP1039770A1 (en) * | 1999-03-24 | 2000-09-27 | Robert Bosch Gmbh | A method and apparatus for getting access to a mobile communication apparatus, particularly digital mobile phone |
GB2360166A (en) * | 2000-03-07 | 2001-09-12 | Mitel Corp | Telephone call blocking using voice recognition |
EP1156697A1 (en) * | 2000-05-11 | 2001-11-21 | Semiconductor Energy Laboratory Co., Ltd. | Biometrical authentication in a communication system |
US6496571B1 (en) * | 1998-08-28 | 2002-12-17 | Lucent Technologies Inc. | Telecommunication system, method and telephone with personal caller identification capability |
US6792287B1 (en) * | 1998-07-02 | 2004-09-14 | Nokia Mobile Phone Limited | Electronic apparatus |
US7333798B2 (en) * | 2002-08-08 | 2008-02-19 | Value Added Communications, Inc. | Telecommunication call management and monitoring system |
KR100854395B1 (en) * | 2002-07-16 | 2008-08-26 | 엘지전자 주식회사 | Method for controlling public telephone system using a finger print management function |
US9521250B2 (en) | 2002-08-08 | 2016-12-13 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4439068C2 (en) * | 1994-11-02 | 1999-12-09 | Deutsche Telekom Ag | Method and device for protection against unauthorized use of communication connections |
DE19515123C1 (en) * | 1995-04-25 | 1996-08-22 | Orga Kartensysteme Gmbh | Smart card access control security protection system |
DE19629687A1 (en) * | 1996-07-23 | 1998-01-29 | Bernd Laichinger | Personal identity security device e.g. for cash cards |
DE19645937B4 (en) * | 1996-11-07 | 2007-10-04 | Deutsche Telekom Ag | Method and system for person-dependent control of a telecommunications terminal |
DE19645936A1 (en) * | 1996-11-07 | 1998-05-14 | Deutsche Telekom Ag | Authorised user control method for telecommunications device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1304555A (en) * | 1969-11-20 | 1973-01-24 | ||
GB1403765A (en) * | 1971-11-04 | 1975-08-28 | Rothfjell Rolf Eric | Identification of individuals |
EP0010611A1 (en) * | 1978-10-19 | 1980-05-14 | Siemens Aktiengesellschaft | Identity card |
EP0082304A1 (en) * | 1981-11-20 | 1983-06-29 | Siemens Aktiengesellschaft | Method of identifying a person by speech and face recognition, and device for carrying out the method |
EP0086064A1 (en) * | 1982-01-29 | 1983-08-17 | Kabushiki Kaisha Toshiba | Individual verification apparatus |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2941928C2 (en) * | 1979-10-17 | 1986-04-10 | Telefonbau Und Normalzeit Gmbh, 6000 Frankfurt | Circuit arrangement for a telephone subscriber station |
JPS57136238A (en) * | 1981-02-16 | 1982-08-23 | Nec Corp | Information processor |
-
1983
- 1983-10-24 NL NL8303649A patent/NL8303649A/en not_active Application Discontinuation
-
1984
- 1984-10-18 DE DE19843438106 patent/DE3438106A1/en not_active Withdrawn
- 1984-10-19 FR FR8416070A patent/FR2553955A1/en not_active Withdrawn
- 1984-10-19 IT IT23254/84A patent/IT1175881B/en active
- 1984-10-22 BE BE0/213870A patent/BE900869A/en not_active IP Right Cessation
- 1984-10-22 SE SE8405271A patent/SE8405271L/en not_active Application Discontinuation
- 1984-10-22 GB GB08426640A patent/GB2148569A/en not_active Withdrawn
- 1984-10-24 AU AU34639/84A patent/AU3463984A/en not_active Abandoned
- 1984-10-24 JP JP59222297A patent/JPS60116263A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1304555A (en) * | 1969-11-20 | 1973-01-24 | ||
GB1403765A (en) * | 1971-11-04 | 1975-08-28 | Rothfjell Rolf Eric | Identification of individuals |
EP0010611A1 (en) * | 1978-10-19 | 1980-05-14 | Siemens Aktiengesellschaft | Identity card |
EP0082304A1 (en) * | 1981-11-20 | 1983-06-29 | Siemens Aktiengesellschaft | Method of identifying a person by speech and face recognition, and device for carrying out the method |
EP0086064A1 (en) * | 1982-01-29 | 1983-08-17 | Kabushiki Kaisha Toshiba | Individual verification apparatus |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634570A1 (en) * | 1988-07-22 | 1990-01-26 | Reitter Renaud | Multi-biometric authentication system |
GB2229844A (en) * | 1989-01-16 | 1990-10-03 | Nat Res Dev | Individual identification |
GB2243934A (en) * | 1990-05-09 | 1991-11-13 | Shorrock Ltd | Access control |
GB2260670A (en) * | 1991-10-18 | 1993-04-21 | * Norm Pacific Automation Corporation | Multi-functional telephone system with speech recognition and control device |
AU698612B2 (en) * | 1993-12-21 | 1998-11-05 | Telia Ab | Method and arrangement in calls from mobile stations |
US6249759B1 (en) | 1998-01-16 | 2001-06-19 | Nec Corporation | Communication apparatus using speech vector comparison and recognition |
GB2334864A (en) * | 1998-01-16 | 1999-09-01 | Nec Corp | Mobile phone has vector coded password protection |
GB2334864B (en) * | 1998-01-16 | 2000-03-15 | Nec Corp | Communication apparatus |
AU747731B2 (en) * | 1998-01-16 | 2002-05-23 | Nec Corporation | Communication apparatus using speech recognition |
WO1999056482A1 (en) * | 1998-04-23 | 1999-11-04 | Siemens Aktiengesellschaft | Radio equipment with enhanced user authentication possibilities |
US6466781B1 (en) * | 1998-04-23 | 2002-10-15 | Siemens Aktiengesellschaft | Biometric authentication technology for wireless transceiver activation |
US6792287B1 (en) * | 1998-07-02 | 2004-09-14 | Nokia Mobile Phone Limited | Electronic apparatus |
US6496571B1 (en) * | 1998-08-28 | 2002-12-17 | Lucent Technologies Inc. | Telecommunication system, method and telephone with personal caller identification capability |
GB2342744A (en) * | 1998-10-14 | 2000-04-19 | Toshiba Kk | User confirmation using biometrics |
GB2342744B (en) * | 1998-10-14 | 2000-10-25 | Toshiba Kk | User confirmation system using biometrics and storage medium |
EP1039770A1 (en) * | 1999-03-24 | 2000-09-27 | Robert Bosch Gmbh | A method and apparatus for getting access to a mobile communication apparatus, particularly digital mobile phone |
GB2360166A (en) * | 2000-03-07 | 2001-09-12 | Mitel Corp | Telephone call blocking using voice recognition |
EP1507431A1 (en) * | 2000-05-11 | 2005-02-16 | Semiconductor Energy Laboratory Co., Ltd. | Biometrical authentication in a communication system |
US8601009B2 (en) | 2000-05-11 | 2013-12-03 | Semiconductor Energy Laboratory Co., Ltd. | Communication system |
EP1156697A1 (en) * | 2000-05-11 | 2001-11-21 | Semiconductor Energy Laboratory Co., Ltd. | Biometrical authentication in a communication system |
KR100854395B1 (en) * | 2002-07-16 | 2008-08-26 | 엘지전자 주식회사 | Method for controlling public telephone system using a finger print management function |
US9699303B2 (en) | 2002-08-08 | 2017-07-04 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US9888112B1 (en) | 2002-08-08 | 2018-02-06 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US9521250B2 (en) | 2002-08-08 | 2016-12-13 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US9560194B2 (en) | 2002-08-08 | 2017-01-31 | Global Tel*Link Corp. | Telecommunication call management and monitoring system with voiceprint verification |
US9686402B2 (en) | 2002-08-08 | 2017-06-20 | Global Tel*Link Corp. | Telecommunication call management and monitoring system with voiceprint verification |
US7333798B2 (en) * | 2002-08-08 | 2008-02-19 | Value Added Communications, Inc. | Telecommunication call management and monitoring system |
US9843668B2 (en) | 2002-08-08 | 2017-12-12 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US8948350B2 (en) | 2002-08-08 | 2015-02-03 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US9930172B2 (en) | 2002-08-08 | 2018-03-27 | Global Tel*Link Corporation | Telecommunication call management and monitoring system using wearable device with radio frequency identification (RFID) |
US10069967B2 (en) | 2002-08-08 | 2018-09-04 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US10091351B2 (en) | 2002-08-08 | 2018-10-02 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US10135972B2 (en) | 2002-08-08 | 2018-11-20 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US10230838B2 (en) | 2002-08-08 | 2019-03-12 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US10721351B2 (en) | 2002-08-08 | 2020-07-21 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US10944861B2 (en) | 2002-08-08 | 2021-03-09 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
US11496621B2 (en) | 2002-08-08 | 2022-11-08 | Global Tel*Link Corporation | Telecommunication call management and monitoring system with voiceprint verification |
Also Published As
Publication number | Publication date |
---|---|
SE8405271D0 (en) | 1984-10-22 |
SE8405271L (en) | 1985-04-25 |
JPS60116263A (en) | 1985-06-22 |
IT8423254A0 (en) | 1984-10-19 |
FR2553955A1 (en) | 1985-04-26 |
NL8303649A (en) | 1985-05-17 |
IT8423254A1 (en) | 1986-04-19 |
BE900869A (en) | 1985-04-22 |
IT1175881B (en) | 1987-07-15 |
GB8426640D0 (en) | 1984-11-28 |
DE3438106A1 (en) | 1985-05-02 |
AU3463984A (en) | 1985-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2148569A (en) | Method of determining authorization of the user of a subscriber set | |
US6466781B1 (en) | Biometric authentication technology for wireless transceiver activation | |
US5144680A (en) | Individual identification recognition system | |
US4827518A (en) | Speaker verification system using integrated circuit cards | |
US6084967A (en) | Radio telecommunication device and method of authenticating a user with a voice authentication token | |
US4716593A (en) | Identity verification system | |
US6076055A (en) | Speaker verification method | |
US20060156395A1 (en) | Security device and terminal and method for their communication | |
US20040139333A1 (en) | Information storing apparatus | |
CN101494690A (en) | Mobile terminal and unlocking method thereof | |
EP1423821A1 (en) | Method and apparatus for checking a person's identity, where a system of coordinates, constant to the fingerprint, is the reference | |
US20020130764A1 (en) | User authentication system using biometric information | |
JP2004506253A (en) | Biometric identity check | |
WO2001023982A1 (en) | User configurable levels of security for a speaker verification system | |
JPS6269297A (en) | Speaker checking terminal | |
CA2104850C (en) | Speech password system | |
US8032380B2 (en) | Method of accessing a dial-up service | |
CN108985035B (en) | Control method and device for user operation authority, storage medium and electronic equipment | |
JPH09171547A (en) | Ic card with finger print reading function | |
US6931110B2 (en) | System and method for implementing calling card security and secured calling card | |
EP1454286B1 (en) | Method and device for matching fingerprints | |
KR100337141B1 (en) | security system for permitting/nonpermitting to come in and go out security region by distinguish authorized/unauthorized person and method for distinguishing the same | |
US20050015630A1 (en) | Personal authentication processing device, locking/unlocking management apparatus, and locking/unlocking management system | |
Manabe et al. | Security evaluation of biometrics authentications for cellular phones | |
JP3592415B2 (en) | Speaker recognition system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |