WO2015115908A1 - Method for securing an electronic transaction - Google Patents

Method for securing an electronic transaction Download PDF

Info

Publication number
WO2015115908A1
WO2015115908A1 PCT/NO2015/050018 NO2015050018W WO2015115908A1 WO 2015115908 A1 WO2015115908 A1 WO 2015115908A1 NO 2015050018 W NO2015050018 W NO 2015050018W WO 2015115908 A1 WO2015115908 A1 WO 2015115908A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
phone
end user
audio
audio file
Prior art date
Application number
PCT/NO2015/050018
Other languages
French (fr)
Inventor
Trond Lemberg
Original Assignee
Protectoria As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Protectoria As filed Critical Protectoria As
Priority to EP15707823.9A priority Critical patent/EP3100220A1/en
Publication of WO2015115908A1 publication Critical patent/WO2015115908A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/305Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wired telephone networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/16Payments settled via telecommunication systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3272Short range or proximity payments by means of M-devices using an audio code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation

Definitions

  • the present invention regards a system and a method for securing an electronic transaction, and more particularly a system and a method for securing an electronic transaction between an application server and an end user.
  • Public Key Infrastructure would be a good technological candidate for protecting transactions, but the deployment rate in the market is relatively small due to large costs, cumbersome logistics and with a general lack of interoperability between heterogeneous deployments.
  • the system and method solves the above mentioned problems by securing an electronic transaction between an application server and an end user. This is done without sharing any secrets between any parties over insecure equipment, environments or networks.
  • the system and method enables the end user to verify an electronic transaction towards an application server, out of band of cyber criminals or other unauthorized parties, without requiring any other pre-requisite on the end user side than being able to take a phone call within the proximity of a computer with a working loudspeaker connected to a network.
  • An application server generates a transaction secret connected to this
  • the reason may be that the application has been trigged by a risk parameter, either within the application or provided by another source.
  • the application After generating the originating transaction secret, the application generates a proxy secret (PS) that correlates to the origin transaction secret, typically a random number or cryptographically made fingerprint, like a hash value of the transaction secret.
  • PS proxy secret
  • the application server is then generating and sending a Verification Order (VO) to the Transaction Verification Server (TVS).
  • VO Verification Order
  • TVS Transaction Verification Server
  • TVS is either directly or indirectly connected to at least one Telecom
  • the VO includes minimum a trustworthy phone number, order number, the PS, transaction details and a language indicator.
  • the VO may optionally include several control indicators (CI) and requirements for each of them, such as identification indicators (II) that shall be used as part of the transaction verification mechanism, call control indicators (CCI) or positioning indicators (PI) that shall be used before the transaction verification mechanism is being started.
  • CI control indicators
  • II identification indicators
  • CCI call control indicators
  • PI positioning indicators
  • Requirements for (II) may be using an integrated Voice Biometrics system, another type of biometrics system, PKI system, DTMF based authentication method e.g. from a phone banking system, or similar, where the end user already is enrolled.
  • Requirements for (CCI) may be denying transaction verification
  • Requirement for (PI) may be denying transaction verification service if the correlated geographical distance between web-IP of the end users computer and the end users mobile positioning parameter is outside an acceptable geographical distance stated in the VO.
  • the next step of the transaction verification mechanism is starting a process where TVS converts the relevant content delivered within the received VO into audio files with different purposes.
  • Audio file #1 comprises a synthetic voice of the ordered language reading the transaction details.
  • Audio file #2 comprises the (PS) as an instrumented audio message to be streamed as a sound circuit through the audio based equipment of the end user.
  • the audio file #2 is also equipped with error correction and redundancy mechanisms ensuring higher quality and efficiency of the subsequent audio transmission.
  • the next step of the process of the transaction verification mechanism is that TVS prepare for setting up the call to the user on the basis of the phone number retrieved from the VO.
  • the TVS is able to detect twin SIMs, call forwarding setup, conference call setup or other relevant issues from the telecom network depending of a peer agreement with the integrated Telecom Operator.
  • the TVS is able to detect the geographical positioning data for each of the end user devices -computer and mobile phone and if required in the VO providing a correlated distance between the devices.
  • TVS is setting up the call towards the end user.
  • TVS plays the audio file # 1 over the phone call presenting transactions details in the ordered language, upon optionally identifying the user by a specified method retrieved from the VO.
  • the end users identity validation task is provided from TVS to the integrated voice biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
  • the end users identity validation task is provided from TVS to the integrated biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification
  • the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
  • the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
  • the next step is that the TVS starts playing audio file #2, streaming the instrumented audio message through the users two devices verifying that the equipment is under both physical and logical control of the identified user.
  • the user By operating the physical movement of the phone, the user now verifies the transaction by letting the audio stream from the
  • loudspeaker of the computer be recorded by the microphone of the phone. a.
  • the user wants to cancel the transaction verification, the user only needs to hang up the phone call and thereby physically prohibit the transaction from being executed.
  • TVS is after decoding comparing the inbound audio with the outbound audio of audio file #2.
  • TVS analyse the bit stream and audio packets, adjust the inbound audio with error correction and redundancy measures of the TVS audio based protocol until perfect match possibly is achieved.

Abstract

A method for securing an electronic transaction between an application server and an end user, wherein said end user has access to a phone and a computer with a loudspeaker.

Description

Method for securing an electronic transaction Technical Field
The present invention regards a system and a method for securing an electronic transaction, and more particularly a system and a method for securing an electronic transaction between an application server and an end user.
Background of the invention
It has become evident that traditional security solutions are no longer able to protect transactions from being manipulated by unauthorized parties. Due to lack of efficient and strong session security mechanisms deployed in commonly used end user systems, Man-in-the Middle attacks has constantly become easier to execute, and are also being more and more sophisticated and scalable.
As a consequence, stealing money from banks and their customers by manipulating payment and money transfer transactions, manipulating electronic agreements and most likely also manipulating stock exchange transactions over insecure networks and devices, etc. has become a huge problem for people, businesses and even whole nations.
Theoretically, Public Key Infrastructure would be a good technological candidate for protecting transactions, but the deployment rate in the market is relatively small due to large costs, cumbersome logistics and with a general lack of interoperability between heterogeneous deployments.
Summary of the invention
It is therefore the purpose of the present invention, as it is stated in the set of claims, to solve the problems mentioned above.
The system and method solves the above mentioned problems by securing an electronic transaction between an application server and an end user. This is done without sharing any secrets between any parties over insecure equipment, environments or networks.
The system and method enables the end user to verify an electronic transaction towards an application server, out of band of cyber criminals or other unauthorized parties, without requiring any other pre-requisite on the end user side than being able to take a phone call within the proximity of a computer with a working loudspeaker connected to a network.
Detailed description
The mechanism of the invention works according to this description :
(1) An application server generates a transaction secret connected to this
transaction verification method. The reason may be that the application has been trigged by a risk parameter, either within the application or provided by another source. After generating the originating transaction secret, the application generates a proxy secret (PS) that correlates to the origin transaction secret, typically a random number or cryptographically made fingerprint, like a hash value of the transaction secret.
(2) The application server is then generating and sending a Verification Order (VO) to the Transaction Verification Server (TVS).
(3) TVS is either directly or indirectly connected to at least one Telecom
Operator (e.g. through a SIP trunk and possibly an ISUP interface) and connected to the application server and its IP network over a secured connection.
(4) The VO includes minimum a trustworthy phone number, order number, the PS, transaction details and a language indicator. In addition, the VO may optionally include several control indicators (CI) and requirements for each of them, such as identification indicators (II) that shall be used as part of the transaction verification mechanism, call control indicators (CCI) or positioning indicators (PI) that shall be used before the transaction verification mechanism is being started.
a. Requirements for (II) may be using an integrated Voice Biometrics system, another type of biometrics system, PKI system, DTMF based authentication method e.g. from a phone banking system, or similar, where the end user already is enrolled. As a sub-requirement for (II) there may be set quality parameters depending on a risk level of the particular transaction to be secured, e.g. for a medium risk transaction the Voice Biometrics system shall identify the end user by requiring the end user to only say its name or an agreed phrase as requested in the call from TVS, while for a high risk transaction the user is required to also repeat a unique random number retrieved from the VO and initially provided to the end user over synthetic voice generated by the TVS.
b. Requirements for (CCI) may be denying transaction verification
service if any twin SIM or call forwarding setup for the relevant end user is detected from the integrated telecom infrastructure. c. Requirement for (PI) may be denying transaction verification service if the correlated geographical distance between web-IP of the end users computer and the end users mobile positioning parameter is outside an acceptable geographical distance stated in the VO.
(5) The next step of the transaction verification mechanism is starting a process where TVS converts the relevant content delivered within the received VO into audio files with different purposes.
a. Audio file #1 comprises a synthetic voice of the ordered language reading the transaction details.
b. Audio file #2 comprises the (PS) as an instrumented audio message to be streamed as a sound circuit through the audio based equipment of the end user. The audio file #2 is also equipped with error correction and redundancy mechanisms ensuring higher quality and efficiency of the subsequent audio transmission.
c. In addition, there may be generated other audio files with synthetic voice, generated on the basis of (II) for Voice Biometrics.
(6) The next step of the process of the transaction verification mechanism is that TVS prepare for setting up the call to the user on the basis of the phone number retrieved from the VO.
a. In case the (CCI) is ordered, the TVS is able to detect twin SIMs, call forwarding setup, conference call setup or other relevant issues from the telecom network depending of a peer agreement with the integrated Telecom Operator.
b. In case the (PI) is ordered, the TVS is able to detect the geographical positioning data for each of the end user devices -computer and mobile phone and if required in the VO providing a correlated distance between the devices.
c. In case (CCI) or (PI) not meet requirement set in the VO, a negative receipt to application server is provided from TVS informing about reasons for not setting up the call to the end user.
(7) In case (CCI) and (PI) requirements are met the TVS is setting up the call towards the end user. (8) After the end user possibly has answered the call from the TVS, TVS plays the audio file # 1 over the phone call presenting transactions details in the ordered language, upon optionally identifying the user by a specified method retrieved from the VO.
a. In case of a voice biometrical based method of identification, using a voice biometric system integrated with the TVS, the end users identity validation task is provided from TVS to the integrated voice biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
b. In case of another biometrical based method of identification, using a biometric based system integrated with the TVS, the end users identity validation task is provided from TVS to the integrated biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification
E I Ic I l i S Sbj E 1.
c. In case of a DTMF based method of identification, requiring the end user to tap in a code of the phone, using DTMF sounds, using e.g. a phone banking system integrated with the TVS, the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism. d. In case of a PKI based method of identification, requiring the end user to a use a particular certificated based system, integrated with the TVS, the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
(9) In case the end user accepts transaction details presented towards the user over the synthetic voice from audio file # 1, the user is asked to bring the microphone of the phone against the loudspeaker of the computer.
(10) The next step is that the TVS starts playing audio file #2, streaming the instrumented audio message through the users two devices verifying that the equipment is under both physical and logical control of the identified user. By operating the physical movement of the phone, the user now verifies the transaction by letting the audio stream from the
loudspeaker of the computer be recorded by the microphone of the phone. a. In case the user wants to cancel the transaction verification, the user only needs to hang up the phone call and thereby physically prohibit the transaction from being executed.
(11) If the user wants to accept the transaction verification by allowing the audio stream to be fully executed, the recorded audio stream is
subsequently being delivered as an inbound audio stream over the current phone call to the TVS for decoding. TVS is after decoding comparing the inbound audio with the outbound audio of audio file #2.
a. In case the inbound audio compared with the outbound audio of audio file #2 differs, TVS analyse the bit stream and audio packets, adjust the inbound audio with error correction and redundancy measures of the TVS audio based protocol until perfect match possibly is achieved.
b. In case perfect match still not is achieved, the TVS analyse the
relevant packets and starts its adaptive retransmission property of its audio protocol for the relevant audio based packets, until these iterations of coding, retransmission, decoding and comparison provides a perfect match.
(12) In case TVS comparison of inbound and outbound (PS) within a time out setting gets a perfect match, a positive receipt with minimum the inbound decoded (PS) and the order number are sent back to the application server for processing. The application server can now both match (PS) sent with (PS) received and validate the received (PS) against the transaction secret. If this validation process gives a positive result, the application server will then accept the transaction.
a. In case TVS comparison of inbound and outbound (PS) within a time out setting never gets a perfect match, a negative receipt with minimum the inbound decoded (PS) and the order number are sent back to the application server for processing. The application server will then reject the transaction.

Claims

Claims
A method for securing an electronic transaction between an application server and an end user, wherein said end user has access to a phone and a computer with a loudspeaker and is further c h a r a c t e r i z e d b y that:
» the appiication server sends a verification order to a Transaction
Verification Server,
* the Transaction Verification Server converts the verification order into at least two audio flies,
* the Transaction Verification Server sets up a call to the end user and plays of the first audio file on the phone of the end user according to the parameters and transaction information stated in the verification order,
* if the end user accepts the transaction details presented as Synthetic voice in the relevant language over the phone call, the Transaction Verification Server plays of the second audio file as an outbound audio stream on the end users computer loudspeaker,
» the second audio file is recorded by the microphone on the end users phone,
* the recorded second audio file is transmitted from the microphone of the phone to the Transaction Verification Server over the actual phone call,
* the Transaction Verification Server compares the outbound streamed second audio file with the received second audio file, and
« if they match the Transaction Verification Server sends a positive receipt to the application server.
* A negative receipt is sent to the application server in case the end user don't accept the transaction details presented by the mechanism by hanging up the call or tapping a button on the phone, In case the Transaction Verification Server not are able to find a match between outbound streamed audio with the inbound received audio a negative receipt is sent to the appiication server.
Method according to ciaim 1 wherein said verification order includes at least a trustworthy phone number, an order number, a proxy secret, transaction details and a language indicator.
3, Method according to claim 2 wherein said verification server can also include an identification indicator, a call control indicator or a position indicator.
4. Method according to claim 1 wherein the first audio file comprises a synthetic voice on the ordered language reading the transaction details,
5, Method according to claim 1 wherein the second audio file comprises the proxy secret.
PCT/NO2015/050018 2014-01-28 2015-01-28 Method for securing an electronic transaction WO2015115908A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP15707823.9A EP3100220A1 (en) 2014-01-28 2015-01-28 Method for securing an electronic transaction

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20140098 2014-01-28
NO20140098A NO337813B1 (en) 2014-01-28 2014-01-28 Procedure for securing an electronic transaction

Publications (1)

Publication Number Publication Date
WO2015115908A1 true WO2015115908A1 (en) 2015-08-06

Family

ID=52598808

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2015/050018 WO2015115908A1 (en) 2014-01-28 2015-01-28 Method for securing an electronic transaction

Country Status (3)

Country Link
EP (1) EP3100220A1 (en)
NO (1) NO337813B1 (en)
WO (1) WO2015115908A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20070178883A1 (en) * 2006-02-02 2007-08-02 Lucent Technologies Inc. Authentication and verification services for third party vendors using mobile devices
EP1921578A1 (en) * 2006-11-13 2008-05-14 Yellow One Asset Management Ltd. Payment method and system between the buyer and seller by means of a third party
US20120203646A1 (en) * 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions
WO2013009191A1 (en) * 2011-07-13 2013-01-17 Trond Lemberg System and method for alternative distribution of a pin code

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6934858B2 (en) * 1999-12-15 2005-08-23 Authentify, Inc. System and method of using the public switched telephone network in providing authentication or authorization for online transactions
US7461258B2 (en) * 2002-05-24 2008-12-02 Authentify, Inc. Use of public switched telephone network for capturing electronic signatures in on-line transactions
GB2427286A (en) * 2005-06-11 2006-12-20 Harley Clark Financial transaction method
US20130204786A1 (en) * 2012-02-03 2013-08-08 Daniel Mattes Verification of Online Transactions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20070178883A1 (en) * 2006-02-02 2007-08-02 Lucent Technologies Inc. Authentication and verification services for third party vendors using mobile devices
EP1921578A1 (en) * 2006-11-13 2008-05-14 Yellow One Asset Management Ltd. Payment method and system between the buyer and seller by means of a third party
US20120203646A1 (en) * 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions
WO2013009191A1 (en) * 2011-07-13 2013-01-17 Trond Lemberg System and method for alternative distribution of a pin code

Also Published As

Publication number Publication date
EP3100220A1 (en) 2016-12-07
NO337813B1 (en) 2016-06-27
NO20140098A1 (en) 2015-07-29

Similar Documents

Publication Publication Date Title
US10764043B2 (en) Identity and content authentication for phone calls
US20090025075A1 (en) On-demand authentication of call session party information during a telephone call
CN101248613B (en) Authentic device admission scheme for a secure communication network, especially a secure ip telephony network
US8156335B2 (en) IP address secure multi-channel authentication for online transactions
US9077566B2 (en) Caller ID callback authenticationi for voice over internet protocol (“VoIP”) deployments
US8522344B2 (en) Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems
US7920680B2 (en) VoIP caller authentication by voice signature continuity
US8345871B2 (en) Fast authentication over slow channels
US8681783B2 (en) Prevention of call spoofing in a Voice over Internet Protocol (VoIP) network
US20090046839A1 (en) Verifying authenticity of called party in telephony networks
US20100095360A1 (en) Method and system for authentication
US11042613B2 (en) Enhanced user authentication based on device usage characteristics for interactions using blockchains
CN102802150B (en) phone number verification method, system and terminal
US8769623B2 (en) Grouping multiple network addresses of a subscriber into a single communication session
US8023654B2 (en) Securing multimedia network communication
US10893414B1 (en) Selective attestation of wireless communications
CN110839036B (en) Attack detection method and system for SDN (software defined network)
US10063699B1 (en) Method, apparatus and computer program product for verifying caller identification in voice communications
Du et al. {UCBlocker}: Unwanted call blocking using anonymous authentication
CN113194069B (en) Communication tracing method, communication tracing device and medium based on block chain
KR101216005B1 (en) System for protecting SIP internet phone attack under encrypted signal circumstance
EP3100220A1 (en) Method for securing an electronic transaction
CN112865975A (en) Message security interaction method and system, and signaling security gateway device
Chiang et al. An affordable solution for authenticated communications for enterprise and personal use
CN104202337B (en) A kind of data transmission system and method based on audio signal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15707823

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015707823

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015707823

Country of ref document: EP