WO1997017791A2 - User-authentification device using acoustic signals and a telephone set - Google Patents

User-authentification device using acoustic signals and a telephone set Download PDF

Info

Publication number
WO1997017791A2
WO1997017791A2 PCT/DE1996/001814 DE9601814W WO9717791A2 WO 1997017791 A2 WO1997017791 A2 WO 1997017791A2 DE 9601814 W DE9601814 W DE 9601814W WO 9717791 A2 WO9717791 A2 WO 9717791A2
Authority
WO
WIPO (PCT)
Prior art keywords
acoustic signals
user
pbx
telephone set
authentication
Prior art date
Application number
PCT/DE1996/001814
Other languages
German (de)
French (fr)
Other versions
WO1997017791A3 (en
Inventor
Michael Horn
Original Assignee
Siemens Aktiengesellschaft
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Aktiengesellschaft filed Critical Siemens Aktiengesellschaft
Publication of WO1997017791A2 publication Critical patent/WO1997017791A2/en
Publication of WO1997017791A3 publication Critical patent/WO1997017791A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42314Systems providing special services or facilities to subscribers in private branch exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/58Arrangements providing connection between main exchange and sub-exchange or satellite
    • H04Q3/62Arrangements providing connection between main exchange and sub-exchange or satellite for connecting to private branch exchanges
    • H04Q3/625Arrangements in the private branch exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13095PIN / Access code, authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13109Initializing, personal profile
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1322PBX
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13224Off-net subscriber, dial in to/out from network, teleworking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13282Call forward, follow-me, call diversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13378Speech recognition, speech analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13384Inter-PBX traffic, PBX networks, e.g. corporate networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13405Dual frequency signaling, DTMF

Definitions

  • Private telecommunications systems (Private Branch Exchanges, PBX) today offer a wide range of features that can normally only be used by end devices that are directly connected to the PBX. Access to these features from outside, ie via the public network, is often not possible or blocked.
  • this DISA functionality not only offers advantages, but it also entails the risk of unauthorized use, which can result in high damage.
  • the present invention is therefore based on the object of specifying technical means which enable external access to protected performance features of private telecommunications systems (for example via the public network) while largely respecting the legitimate security interests of the operator of such private telecommunications systems.
  • This object is achieved by a device for performing user authentication with the aid of acoustic signals in connection with a telephone terminal with features according to claim 1.
  • This device comprises means for activating the device by a user, means for generating acoustic signals suitable for user authentication after activation and means for outputting acoustic signals in a suitable for transmission by a telephone terminal Wise.
  • the present invention is not restricted to applications in connection with private telephone systems, but rather that the present invention is generally used to carry out user authentication using acoustic signals in connection with a telephone end ⁇ device can be used. Any device that can receive commands in the form of acoustic signals via telephone lines is a possible field of application of the present invention.
  • the invention in this application is essentially to be described using the example of private telecommunications systems be, especially since it is riding to the expert no problems be ⁇ to run from this example another application of the invention.
  • the invention described here provides a separate small terminal (the "SecureDialer") for access control to a PBX, which enables external access to the PBX.
  • the SecureDialer is constructed like an auto dialer - that is, a device for generating acoustic signals for carrying out a dialing process in private or public telecommunications networks - which can be held against the mouthpiece of a telephone handset and which is used for automatic dialing enables phone numbers in the DTMF procedure via a built-in loudspeaker.
  • the SecureDialer additionally contains a data storage unit, preferably also a data processing unit, e.g. a crypto chip for encrypting information and possibly (depending on the authentication method used) an additional microphone.
  • Suitable authentication algorithms are known in large numbers to the person skilled in the art from the extensive specialist literature.
  • the publication "Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using Symmetrie eneipherment algorithms" of the international standard ISO / IEC 9798-2: 1994 (E) is given here as an example, but not by way of limitation can serve the person skilled in the art as a possible source of information.
  • a remote station an authentication server, is required in the PBX to enable secure access to the PBX.
  • Access to the PBX is as follows: authentication is carried out between the external caller and the authentication server. To do this, the caller must first dial the number of the authentication server from any telephone. This can be done using both pulse and tone dialing. Depending on whether a (a) one-way or (b) two-way authentication method (see e.g. ISO / IEC 9798-2) is used, the further connection establishment preferably proceeds as follows:
  • the SecureDialer sends encrypted information (Token AB, see figure (2) in Appendix 2) in the DTMF process, which is decrypted and checked by the authentication server. If the token AB is correct, the calling subscriber is allowed to access the PBX features. He can now carry out the desired actions (e.g. dialing a phone number).
  • Token AB see figure (2) in Appendix 2
  • the authentication server After the authentication server has been selected, it sends a random number RB (see figure (3) in Appendix 2) to the SecureDialer via DTMF.
  • the SecureDialer which in this variant must have a microphone, calculates a value from RB, encrypts it to token AB and sends it to the authentication server. This decrypts and checks the token. If the token AB is correct, the calling subscriber is admitted for access to the PBX service features. He can now carry out the desired actions (e.g. dialing a phone number).

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Devices For Supply Of Signal Current (AREA)

Abstract

The device proposed includes means for activating the device by a user, means for generating acoustic signals suitable for user-authentification purposes following activation and means for emitting acoustic signals in a way suitable for transmission by a telephone set.

Description

Beschreibungdescription
Vorrichtung zur Durchführung einer Benutzerauthentifikation mit Hilfe akustischer Signale in Verbindung mit einem Tele- fonendgerätDevice for performing user authentication with the aid of acoustic signals in connection with a telephone terminal
Private Telekommunikationsanlagen (Private Branch Exchanges, PBX) bieten heute eine Vielzahl von Leistungsmerkmalen, die normalerweise nur von Endgeräten, die direkt mit der PBX ver- bunden sind, genutzt werden können. Der Zugang zu diesen Lei- stungsmerkmalen von extern, also über das öffentliche Netz, ist häufig nicht möglich oder gesperrt.Private telecommunications systems (Private Branch Exchanges, PBX) today offer a wide range of features that can normally only be used by end devices that are directly connected to the PBX. Access to these features from outside, ie via the public network, is often not possible or blocked.
Gerade in letzter Zeit wächst aber die Forderung nach einem externen Zugang zu PBX-Leistungsmerkmalen, da immer mehr Men¬ schen mobil tätig sind, beispielsweise als Außendienstmitar¬ beiter oder als Geschäftsreisender. Dieser externe Zugang, auch als DISA-Funktionalität (Direct Inward System Access) bezeichnet, bietet diesen mobil Tätigen interessante Möglich- keiten. So können beispielsweise Leistungsmerkmale wie "An¬ rufweiterschaltung" von extern administriert werden oder es kann durch die Nutzung von Leitungen eines Corporate Networks kostengünstiger telefoniert werden.Recently, however, the demand for external access to PBX performance features has been growing, since more and more people are active on the move, for example as sales representatives or as business travelers. This external access, also known as DISA functionality (Direct Inward System Access), offers these mobile workers interesting options. For example, features such as "call forwarding" can be administered externally or it is possible to make calls more cheaply by using lines from a corporate network.
Nun bietet diese DISA-Funktionalität nicht nur Vorteile, son¬ dern sie birgt auch die Gefahr der unbefugten Benutzung in sich, wodurch hohe Schäden entstehen können. So wurde gerade in letzter Zeit häufiger von Fällen berichtet, in denen sich unberechtigte Personen in eine PBX eingewählt und so durch kriminelle Benutzungshandlungen den Betreiber durch Telefon¬ gebühren in beträchtlicher Höhe geschädigt hatten. In den meisten Fällen mußten dazu - wenn überhaupt - nur sehr einfa¬ che Sicherheitsvorkehrungen überwunden werden, durch welche die DISA-Funktionalität eigentlich geschützt werden sollte. So war der externe Zugang zur PBX bisher oft überhaupt nicht (d.h. die Kenntnis einer bestimmten PBX-Nummer war ausrei¬ chend) oder nur durch Codes, also spezielle Zahlenkombinatio- nen (incl. Stern- und Raute-Taste) geschützt. Diese Umstände und das kriminelle Verhalten einzelner haben letztendlich dazu geführt, daß viele Besitzer von Nebenstellenanlagen die Möglichkeit des externen Zugangs zur Nebenstellenanlage ganz gesperrt haben.Now this DISA functionality not only offers advantages, but it also entails the risk of unauthorized use, which can result in high damage. Recently, there have been reports of cases in which unauthorized persons dialed into a PBX and, as a result of criminal acts of use, had caused considerable damage to the operator through telephone charges. In most cases, only very simple security measures had to be overcome, if at all, by which the DISA functionality was supposed to be protected. So far, the external access to the PBX has often not been at all (ie knowledge of a specific PBX number was sufficient) or only through codes, i.e. special number combinations. protected (incl. star and hash key). These circumstances and the criminal behavior of individuals ultimately led to many private branch exchange owners completely blocking the possibility of external access to the private branch exchange.
Der vorliegenden Erfindung liegt daher die Aufgabe zugrunde, technische Mittel anzugeben, die den externen Zugang zu ge¬ schützten Leistungsmerkmalen von privaten Telekommunikations- anlagen (z.B. über das öffentliche Netz) unter weitgehendster Wahrung der legitimen Sicherheitsinteresεen des Betreibers solcher privaten Telekommunikationsanlagen zu ermöglichen. Diese Aufgabe wird durch eine Vorrichtung zur Durchführung einer Benutzerauthentifikation mit Hilfe akustischer Signale in Verbindung mit einem Telefonendgerät mit Merkmalen nach Anspruch 1 gelöst.The present invention is therefore based on the object of specifying technical means which enable external access to protected performance features of private telecommunications systems (for example via the public network) while largely respecting the legitimate security interests of the operator of such private telecommunications systems. This object is achieved by a device for performing user authentication with the aid of acoustic signals in connection with a telephone terminal with features according to claim 1.
Diese erfindungsgemäße Vorrichtung umfaßt Mittel zur Aktivie¬ rung der Vorrichtung durch einen Benutzer, Mittel zur Erzeu- gung von zu einer Benutzerauthentifikation geeigneten akusti¬ schen Signalen nach erfolgter Aktivierung und Mittel zur Aus¬ gabe von akustischen Signalen in einer für die Übertragung durch ein Telefonendgerät geeigneten Weise.This device according to the invention comprises means for activating the device by a user, means for generating acoustic signals suitable for user authentication after activation and means for outputting acoustic signals in a suitable for transmission by a telephone terminal Wise.
Der Fachmann erkennt anhand der vorliegenden Beschreibung der Erfindung sofort, daß die vorliegenden Erfindung nicht auf Anwendungen im Zusamenhang mit privaten Telefonanlagen be¬ schränkt ist, sondern daß die vorliegende Erfindung ganz all¬ gemein zur Durchführung einer Benutzerauthentifikation mit Hilfe akustischer Signale in Verbindung mit einem Telefonend¬ gerät verwendet werden kann. Jede Einrichtung, die Befehle in Form akustischer Signale über Telefonleitungen entgegegnehmen kann, ist ein mögliches Anwendungsfeld der vorliegenden Er¬ findung. Um die Darstellung der Erfindung im Rahmen der vor- liegenden Beschreibung nicht unnötig abstrakt zu gestalten, soll die Erfindung in dieser Anmeldung im wesentlichen am Beispiel der privaten Telekommunikationsanlagen beschrieben werden, zumal es dem Fachmann keinerlei Schwierigkeiten be¬ reitet, anhand dieses Beispiels andere Anwendungsbeispiele der Erfindung auszuführen.The person skilled in the art will immediately recognize from the present description of the invention that the present invention is not restricted to applications in connection with private telephone systems, but rather that the present invention is generally used to carry out user authentication using acoustic signals in connection with a telephone end ¬ device can be used. Any device that can receive commands in the form of acoustic signals via telephone lines is a possible field of application of the present invention. In order not to make the presentation of the invention unnecessarily abstract in the context of the present description, the invention in this application is essentially to be described using the example of private telecommunications systems be, especially since it is riding to the expert no problems be ¬ to run from this example another application of the invention.
Vorteilhafte Weiterbildungen und bevorzugte Ausführungsformen der Erfindung sind Gegenstand von Unteransprüchen.Advantageous further developments and preferred embodiments of the invention are the subject of dependent claims.
Im folgenden wird die Erfindung anhand bevorzugter Ausfüh¬ rungsbeispiele näher beschrieben.The invention is described in more detail below on the basis of preferred exemplary embodiments.
Die hier beschriebene Erfindung sieht für die Zugangskon¬ trolle zu einer PBX ein eigenes kleines Endgerät (den "Secu- reDialer") vor, der den Zugang zur PBX von extern ermöglicht. Der SecureDialer ist dabei wie ein Auto-Dialer - also ein Ge- rät zur Erzeugung von akustischen Signalen zur Durchführung eines Anwahlvorgangs in privaten oder öffentlichen Telekommu¬ nikationsnetzen - aufgebaut, den man an die Sprechmuschel ei¬ nes Telefonhörers halten kann und der das automatische Wählen von Rufnummern im DTMF-Verfahren über einen eingebauten Laut- Sprecher ermöglicht. Gegenüber einem Auto-Dialer enthält der SecureDialer zusätzlich eine Datenspeichereinheit, vorzugs¬ weise auch eine Datenverarbeitungseinheit, z.B. einen Kryp- thochip zum Verschlüsseln von Informationen und ggf. (je nach dem verwendeten Authentifikationsverfahren) zusätzlich ein Mikrofon.The invention described here provides a separate small terminal (the "SecureDialer") for access control to a PBX, which enables external access to the PBX. The SecureDialer is constructed like an auto dialer - that is, a device for generating acoustic signals for carrying out a dialing process in private or public telecommunications networks - which can be held against the mouthpiece of a telephone handset and which is used for automatic dialing enables phone numbers in the DTMF procedure via a built-in loudspeaker. Compared to an auto dialer, the SecureDialer additionally contains a data storage unit, preferably also a data processing unit, e.g. a crypto chip for encrypting information and possibly (depending on the authentication method used) an additional microphone.
Geeignete Authentifikationsalgorithmen sind dem Fachmann aus der umfangreichen Fachliteratur in großer Zahl geläufig. Bei¬ spielhaft aber nicht beschränkend sei hier die Veröffentli- chung "Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using Symmetrie eneipher- ment algorithms" des internationalen Standards ISO/IEC 9798- 2 : 1994 (E) angegeben, die dem Fachmann als mögliche Informa¬ tionsquelle dienen kann. Neben dem SecureDialer wird in der PBX eine Gegenstelle, ein Authentifikations-Server benötigt, um einen sicheren Zugang zur PBX zu ermöglichen.Suitable authentication algorithms are known in large numbers to the person skilled in the art from the extensive specialist literature. The publication "Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using Symmetrie eneipherment algorithms" of the international standard ISO / IEC 9798-2: 1994 (E) is given here as an example, but not by way of limitation can serve the person skilled in the art as a possible source of information. In addition to the SecureDialer, a remote station, an authentication server, is required in the PBX to enable secure access to the PBX.
Der Zugang zur PBX erfolgt folgendermaßen: zwischen dem ex¬ ternen Anrufer und dem Authentifikations-Server wird eine Au¬ thentifikation durchgeführt. Dazu muß der Anrufer zunächst einmal von einem beliebigen Telefon aus die Rufnummer des Au¬ thentifikations-Servers anwählen. Dies kann sowohl im Puls- als auch im Tonwahlverfahren geschehen. Je nachdem ob ein (a) Einweg- oder (b) Zweiweg- Authentifikations-Verfahren (siehe hierzu z.B. ISO/IEC 9798-2) angewendet wird, läuft der wei¬ tere Verbindungsaufbau vorzugsweise folgendermaßen ab:Access to the PBX is as follows: authentication is carried out between the external caller and the authentication server. To do this, the caller must first dial the number of the authentication server from any telephone. This can be done using both pulse and tone dialing. Depending on whether a (a) one-way or (b) two-way authentication method (see e.g. ISO / IEC 9798-2) is used, the further connection establishment preferably proceeds as follows:
(a) Nachdem der Authentifikations-Server angewählt ist, sen¬ det der SecureDialer im DTMF-Verfahren eine verschlüsselte Information (Token AB, siehe Bild (2) in Anlage 2) ab, die vom Authentifikations-Server entschlüsselt und geprüft wird. Wenn der Token AB korrekt ist, wird der anrufende Teilnehmer für den Zugang zu den PBX-Leistungsmerkmalen zugelassen. Er kann nun die gewünschten Aktionen (z.B. Wählen einer Rufnum¬ mer) durchführen.(a) After the authentication server has been selected, the SecureDialer sends encrypted information (Token AB, see figure (2) in Appendix 2) in the DTMF process, which is decrypted and checked by the authentication server. If the token AB is correct, the calling subscriber is allowed to access the PBX features. He can now carry out the desired actions (e.g. dialing a phone number).
(b) Nachdem der Authentifikation-Server angewählt wurde, sen- det dieser per DTMF eine Zufallsnummer RB (siehe Bild (3) in Anlage 2) an den SecureDialer. Der SecureDialer, der bei die¬ ser Variante über ein Mikrofon verfügen muß berechnet aus RB einen Wert, verschlüsselt diesen zu Token AB und sendet die¬ sen an den Authentifikations-Server. Dieser entschlüsselt und prüft den Token. Wenn der Token AB korrekt ist, wird der an¬ rufende Teilnehmer für den Zugang zu den PBX-Leistungsmerkma¬ len zugelassen. Er kann nun die gewünschten Aktionen (z.B. Wählen einer Rufnummer) durchführen.(b) After the authentication server has been selected, it sends a random number RB (see figure (3) in Appendix 2) to the SecureDialer via DTMF. The SecureDialer, which in this variant must have a microphone, calculates a value from RB, encrypts it to token AB and sends it to the authentication server. This decrypts and checks the token. If the token AB is correct, the calling subscriber is admitted for access to the PBX service features. He can now carry out the desired actions (e.g. dialing a phone number).
Somit kann also sichergestellt werden, daß nur Besitzer eines SecureDialers Zugang zur PBX haben. Da der SecureDialer ver¬ loren gehen bzw. gestohlen werden kann, sollte er durch eine PIN geschützt werden und mittels einer Art Geräteidentifika- tions-Nummer auch vom Zugangsverfahren gesperrt werden kön¬ nen.This ensures that only owners of a SecureDialer have access to the PBX. Since the SecureDialer can get lost or stolen, it should be replaced by a PIN are protected and can also be blocked by the access procedure by means of a kind of device identification number.
In der vorliegenden Patentanmeldung wurden die nachstehenden Veröffentlichungen zitiert:The following publications are cited in the present patent application:
"Information technology - Security techniques - Entity au- thentication - Part 2: Mechanisms using Symmetrie eneipher- ment algorithms" des internationalen Standards ISO/IEC 9798- 2: 1994 (E) "Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using Symmetrie eneipherment algorithms" of the international standard ISO / IEC 9798-2: 1994 (E)

Claims

Patentansprüche claims
1. Vorrichtung zur Durchführung einer Benutzerauthentifika¬ tion mit Hilfe akustischer Signale in Verbindung mit einem Telefonendgerät mit folgenden Merkmalen: a) Mittel zur Aktivierung der Vorrichtung durch einen Benut¬ zer; b) Mittel zur Erzeugung von zu einer Benutzerauthentifikation geeigneten akustischen Signalen nach erfolgter Aktivie- rung,- c) Mittel zur Ausgabe von akustischen Signalen in einer für die Übertragung durch ein Telefonendgerät geeigneten Weise.1. Device for performing user authentication using acoustic signals in connection with a telephone terminal with the following features: a) means for activating the device by a user; b) means for generating acoustic signals suitable for user authentication after activation, - c) means for outputting acoustic signals in a manner suitable for transmission by a telephone terminal.
2. Vorrichtung nach Anspruch 2 mit Mitteln zur Auswahl einer anwendungsspezifischen Benutzerauthentifikation.2. Device according to claim 2 with means for selecting an application-specific user authentication.
3. Vorrichtung nach einem der vorhergehenden Ansprüche mit a) Mitteln zur Aufnahme akustischer Signale und b) Mitteln zur Berechnung einer zu den aufgenommenen Signalen passenden Benutzeridentifikation.3. Device according to one of the preceding claims with a) means for recording acoustic signals and b) means for calculating a user identification that matches the recorded signals.
4. Vorrichtung nach einem der vorhergehenden Ansprüche mit a) Mitteln, die einem Benutzer die Eingabe von Benutzeriden- tifikationsdaten ermöglichen und b) Mitteln zur Prüfung eingegebener Benutzeridentifikations¬ daten.4. Device according to one of the preceding claims with a) means which enable a user to enter user identification data and b) means for checking entered user identification data.
5. Vorrichtung nach einem der vorhergehenden Ansprüche mit Mitteln zur Ausgabe akustischer Signale, die eine Identifika¬ tion und gegebenenfalls die Sperrung dieser Vorrichtung durch eine diese akustischen Signale empfangende Vorrichtung ermög¬ lichen. 5. Device according to one of the preceding claims with means for outputting acoustic signals, which enable identification and, if appropriate, the blocking of this device by a device receiving these acoustic signals.
PCT/DE1996/001814 1995-11-03 1996-09-25 User-authentification device using acoustic signals and a telephone set WO1997017791A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19541073.4 1995-11-03
DE19541073 1995-11-03

Publications (2)

Publication Number Publication Date
WO1997017791A2 true WO1997017791A2 (en) 1997-05-15
WO1997017791A3 WO1997017791A3 (en) 2001-09-13

Family

ID=7776580

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE1996/001814 WO1997017791A2 (en) 1995-11-03 1996-09-25 User-authentification device using acoustic signals and a telephone set

Country Status (1)

Country Link
WO (1) WO1997017791A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014002207A1 (en) 2014-02-20 2015-08-20 Friedrich Kisters Method and device for identifying or authenticating a person and / or an object by dynamic acoustic security information

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4348554A (en) * 1980-03-21 1982-09-07 Bell Telephone Laboratories, Incorporated Method of providing virtual private network telephone service
US4679236A (en) * 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
US5157717A (en) * 1989-11-03 1992-10-20 National Transaction Network, Inc. Portable automated teller machine
DE4218124A1 (en) * 1992-06-02 1993-12-09 Tadicom Deutschland Gmbh Programmable multifrequency audio signal or sequence generator - produces security coded signal from memory in response to keying for acoustic transmission on telephone subscriber line
WO1994012973A1 (en) * 1992-11-25 1994-06-09 Vcs Industries, Inc. Doing Business As Voice Control Systems Telephone network voice recognition and verification using selectively-adjustable signal thresholds
US5452352A (en) * 1990-03-20 1995-09-19 Talton; David Automatic dialing system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4348554A (en) * 1980-03-21 1982-09-07 Bell Telephone Laboratories, Incorporated Method of providing virtual private network telephone service
US4679236A (en) * 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
US5157717A (en) * 1989-11-03 1992-10-20 National Transaction Network, Inc. Portable automated teller machine
US5452352A (en) * 1990-03-20 1995-09-19 Talton; David Automatic dialing system
DE4218124A1 (en) * 1992-06-02 1993-12-09 Tadicom Deutschland Gmbh Programmable multifrequency audio signal or sequence generator - produces security coded signal from memory in response to keying for acoustic transmission on telephone subscriber line
WO1994012973A1 (en) * 1992-11-25 1994-06-09 Vcs Industries, Inc. Doing Business As Voice Control Systems Telephone network voice recognition and verification using selectively-adjustable signal thresholds

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TELESIS, Bd. 15, Nr. 3, 1988, Seiten 23-25, 28 - 31, XP000007730 DAVIS M ET AL: "EVOLUTION IN BUSINESS NETWORKING" *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014002207A1 (en) 2014-02-20 2015-08-20 Friedrich Kisters Method and device for identifying or authenticating a person and / or an object by dynamic acoustic security information
WO2015124696A1 (en) * 2014-02-20 2015-08-27 Friedrich Kisters Method and device for identifying or authenticating a person and/or an object using dynamic acoustic security information
KR20160133463A (en) * 2014-02-20 2016-11-22 프리드리히 키스터스 Method and device for identifying or authenticating a person and/or an object using dynamic acoustic security information

Also Published As

Publication number Publication date
WO1997017791A3 (en) 2001-09-13

Similar Documents

Publication Publication Date Title
EP1112567B1 (en) Method for checking access authorisation for voice telephony at a fixed network or mobile telephone connection and corresponding communications network
DE69926977T2 (en) Caller identification authentication and routing in response
US5351290A (en) Telecommunications fraud prevention system and method
EP0689368B1 (en) Message transmission arrangement in a mobile communication system
EP0944992B1 (en) Method and device for the remote operation and remote control of systems and apparatus via a telephone network
DE69730240T2 (en) AUTHENTICATION PROCEDURE FOR ACCESS CONTROL SYSTEM AND / OR PAYMENT SYSTEM
DE69736394T2 (en) METHOD AND SYSTEM FOR PROTECTING THE SERVICES OF TELECOMMUNICATIONS OPERATORS
DE69723882T2 (en) METHOD AND DEVICE FOR SECURING THE SERVICES OFFERED VIA AN INTERNET TYPE COMPUTER NETWORK
EP1763949B1 (en) Method for remote inquiry of information stored in a telecommunications device and a telecommunications device provided with a function for stored information remote inquiry
WO1997017791A2 (en) User-authentification device using acoustic signals and a telephone set
WO1999045690A1 (en) Method and device for universal access to telephone networks
DE102008035763A1 (en) Access management for connection-accompanying data of telecommunication connections
EP1044560A1 (en) Method and communications network for billing call charges for voice telephony by voice recognition
DE60026316T2 (en) SYSTEM AND METHOD FOR PROCESSING TELEPHONE CALLS
DE10204436B4 (en) Continuous speaker verification using voice input
DE102005003208A1 (en) End device user authenticating method for e.g. mobile network, involves transmitting authentication data to authentication server by communication network for purpose of authentication of user, where authentication is executed by server
EP1163559B1 (en) Method for securing access to a data processing device and appropriate device
DE19542781C2 (en) Authentication of subscriber lines
DE4408976C2 (en) Telecommunication terminal
EP0923220A2 (en) Method for managing subscriber indIvidual data of a telecommunication terminal
DE10047177A1 (en) Authentication method for a telecommunications subscriber and telecommunications system
DE3410936C2 (en) Method for recognizing the unauthorized use of an identification assigned to a mobile radio station in a radio transmission system
EP0915610A2 (en) Method, telephone network and terminal for transferring billing informations in individual connections
WO1996022647A1 (en) Method and device for ensuring reliable collection of data relating to the use of a communications system
DE10254620B4 (en) Multiple registration in telephone systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 97517731

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase
AK Designated states

Kind code of ref document: A3

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE