CA2324240A1 - Procedure and system for reliable and safe identification of a contracting party - Google Patents

Procedure and system for reliable and safe identification of a contracting party Download PDF

Info

Publication number
CA2324240A1
CA2324240A1 CA002324240A CA2324240A CA2324240A1 CA 2324240 A1 CA2324240 A1 CA 2324240A1 CA 002324240 A CA002324240 A CA 002324240A CA 2324240 A CA2324240 A CA 2324240A CA 2324240 A1 CA2324240 A1 CA 2324240A1
Authority
CA
Canada
Prior art keywords
party
verification
contracting
identification
reliable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002324240A
Other languages
French (fr)
Inventor
Harri Vatanen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sonera Smarttrust Oy
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2324240A1 publication Critical patent/CA2324240A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a procedure and system for reliable and safe identification of contracting parties via a telecommunication network.
According to the invention, the contracting parties are authenticated e.g. by means of an electronic signature, whereupon a request for verification of the identity of the parties is sent to a reliable third party. The reliable third party sends a confirmation to the counterpart of each contracting party, the identities of the parties being thus verified. In addition, the reliable third party writes a record to a storage database about the verification and the matter it is related to. Thus, a "notarial service" can be a flexibly implemented e.g. using mobile stations.

Description

PROCEDURE AND SYSTEM FOR RELIABLE AND SAFE
IDENTIFICATION OF A CONTRACTING PARTY
FIELD OF THE INVENTION
The present invention relates to a procedure as defined in the preamble of claim 1 and to a system as defined in the preamble of claim 7 for reliable and safe identification of a contracting party in various contracts, deeds, offers, and deals requiring authen-tication by a notary and in other corresponding appli-cations.
BACKGROUND OF THE INVENTION
In the making of certain agreements between two juridical persons, it is necessary to ascertain the identity of the contracting parties. In real es-tate deals, offers and various other agreements re-quiring authentication by a notary, the parties are identified by a notary public, notary or other author-ised person. For this, it is generally necessary for the contracting parties to be simultaneously present at a meeting with a third person in order to be iden-tified by the latter. This involves practical problems because either the contracting parties have to go e.g.
to a notary themselves or a notary must visit the con-tracting parties. In any case, confirming an agreement by this method is difficult and time consuming.
In other words, a notariate, notary public or a corresponding functionary verifies that the con tracting party really is the person he/she purports to be and in whose name he/she is signing the agreement.
There is no known identification method based on an electronic signature. However, identifying a person on the basis of an electronic signature would make things considerably easier because in this case the elec-tronic signature could be sent over a telecommunica-tion network to a notariate, a notary public or a re-liable third party for verification.
BRIEF DESCRIPTION OF THE INVENTION
S The object of the present invention is to eliminate or at least to significantly reduce the problems described above.
A specific object of the present invention is to disclose a new type of method and procedure for re liable and safe identification of contracting parties.
A further object of the invention is to disclose a system for reliably and acceptably implementing the identification of contracting parties as stipulated by law by making use of a telecommunication network.
As for the features characteristic of the in-vention, reference is made to the claims.
In the procedure of the invention for reli-able and safe identification of contracting parties via a telecommunication network, the telecommunication network used may be a mobile communication network, public telephone network, data network or a combina-tion of these. Correspondingly, the terminals used in the procedure may be any terminal devices compatible with the telecommunication network.
According to the invention, a first contract-ing party is authenticated by means of a first termi-nal. The authentication may be accomplished using any method. The essential point is that the authentication is implemented in conformity with the standards apply-ing to electronic signature. After authentication, a verification request is sent to a reliable third party for verification of the identity of the first con-tracting party. The verification request is preferably sent via the first terminal, which is also used for the authentication. Finally, the identity of the first party is confirmed for a second party by sending the second party an identification message given by the reliable third party.
The invention makes it possible to implement a service corresponding to a notarial service in a flexible and advantageous manner.
Moreover, the invention allows easy introduc-tion of electronic signature in conjunction with the use of mobile telephones and other suitable terminal devices. This makes it possible to use a mobile tele-phone as an instrument of payment, as a credit card or equivalent.
The second party, e.g. in the case of a real estate deal, is identified in the same way as the first party. The second party is also authenticated by means of a second terminal. However, if desirable, in some cases the second party may use the first party's first terminal for his/her own identification. In this case, the second party uses his/her own subscription or other information individualising the second party in conjunction with the first terminal. Another possi-bility is to establish separate service points pro-vided with terminal equipment for subscriber identifi-cation, which is utilised by both contracting parties for giving an electronic sample signature and for identification of the other party.
In a preferred embodiment, the second con-tracting party is identified after the second party has received an identification and verification mes-sage concerning the first contracting party. Identify-ing the second party is useless unless the first party can be reliably identified.
To allow the contract to be confirmed and the identification inquiries regarding the parties to be verified and traced, the verification request is saved to a verification database. This verification database may be a database server managed by a reliable party, such as a public authority. The record in question preferably contains information indicating the party who sent the verification request, the party to whom the verification and identification message is sent, the matter or contract to which the verification is related and the point of time of the event. The same information is preferably comprised in the verifica-tion requests sent by the first and second contracting parties.
The system of the invention for reliable and safe identification of contracting parties comprises a telecommunication network and a terminal device con-nected to it and compatible with it. The telecommuni-cation network may be a combination of a mobile commu-nication network and a telephone network and the ter-urinal device may be a mobile telephone. The telecommu-nication network may also be a data network, in which case the terminal device is preferably a computer or other terminal compatible with the data network. Ac-cording to the invention, the system comprises means connected to a first terminal for authentication of a first contracting party. The system also comprises a reliable database apparatus or a corresponding appli-cation server, to which the verification request of the first contracting party is sent. This server or database may be under the management of a third party known to be reliable, and it may be connected e.g. via a data-secure link to the telecommunication network used for the operations. The database or server in question preferably comprises means for sending a verification and identification message to the second contracting party on the basis of identification by the reliable third party.
Correspondingly, the system can be used to identify and verify the second contracting party's identity for the first contracting party. It is also possible for each contracting party to be identified by a different reliable third party. This may be pos-sible in cases where the contracting parties are citi-zens of different countries or otherwise have estab-lished their identification data with different third parties.
5 As to the advantages of the system of the in-vention, reference is made to the advantages of the procedure of the invention.
In a preferred embodiment of the present in vention, the system comprises a verification database l0 server connected to an identification database server of a reliable third party. In this case, a record con-cerning the verification request and verification can be saved by the identification database server to al-low examination and tracing at a later time.
In the following, the invention will be desc-ribed by the aid of a few examples of its preferred embodiments with reference to the attached drawing, wherein BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 represents a preferred system accord-ing to the present invention; and Fig. 2 presents a block diagram representing an embodiment of the procedure of the invention.
DETAILED DESCRIPTION THE DRAWINGS
The system presented in Fig. 1 comprises a telecommunication network 1, which in this example is a combination of a mobile telephone network and the public telephone network. In addition, the system in-volves the use of two terminals TE1, TE2, which are mobile stations and connected to a mobile communica-tion network GSM and further to the public telephone network PSTN. The mobile stations are consistent with the current GSM standard, but, as is obvious to the skilled person, other applicable mobile stations can also be used. Furthermore, connected to the telecommu-nication network 1 is an identification and verifica-tion system TTP of a reliable third party. This iden-tification and verification system comprises a first verification server TTP1 and a second verification server TTP2. These servers are connected via a suit-able link to the telecommunication network, over which they communicate with the terminals TE1, TE2. Moreo-ver, the verification servers TTP1 and TTP2 are con-nected to a central storage server TTP3, to which the verification servers write records concerning the verification and identification actions they have car-ried out.
Next, referring to Fig. 2, a preferred em-bodiment of the procedure of the invention will be de-scribed. In this example, a first and a second con-tracting party are making a deal which requires veri-fication of the identity of the contracting parties by a notary public. In the procedure of the invention, the first contracting party is first authenticated us-ing his/her electronic signature, which may consist of e.g. a PIN code in a mobile station. The PIN code must be entered when the mobile station TE1 is activated.
Therefore, upon receiving the correct PIN code, a mo-bile station belonging to a subscriber can send an electronic signature message to an address selected by the subscriber. Authentication is represented by block 21. Next, the first contracting party sends a verifi-cation request to a verification server TTP1, block 22. The verification server receives the subscriber's request and checks the validity of the electronic sig-nature supplied by the subscriber by comparing it with its own information about the subscriber, block 23.
When the verification server discovers the sub-scriber's identity and finds that the identification was successful, it sends an identification and verifi-cation message to the second contracting party to a subscriber number or terminal device indicated by the first contracting party in his/her verification re-quest message. If it is detected in block 23 that the subscriber's electronic signature is wrong or the sub-s scriber is not identified, the procedure goes on to block 24 and the identification process is ended. Af ter the verification and identification message, block 25, has been sent to the other party, a record of the identification event is saved to a storage database TTP3, block 26.
Once the second contracting party has re-ceived a confirmation of the identity of the first contracting party, a verification procedure for estab-lishing the identity of the second contracting party is started. First, the second party is authenticated, whereupon he/she sends a confirmation and verification request to his/her own reliable third party, in this example to verification server TTP2, block 27. Next, verification server TTP2 verifies the identity of the second contracting party, block 28, and if the iden-tity is found to be right, then an identification mes-sage is sent to the first contracting party, block 29.
If the identification of the second contracting party in block 28 fails, then the procedure goes on to block 29 and the identification process is ended. After the identification message has been sent to the first con-tracting party, a record concerning the identification of the second party is added to the storage database, block 30. Both parties have now been reliably identi-fied, and both parties are informed about the fact. In addition, stored in the storage database is informa-tion regarding the identification of the parties and generally also information regarding the event to which the identification is related. This makes it possible to verify and ascertain the identity of the parties at a later time, and also to ascertain that it has been verified in conjunction with the signing of the deed.
The invention is not restricted to the embodi-ments described above, but many variations are possi-ble within the scope of protection of the claims.

Claims (9)

9
1. Procedure for reliable and safe identification of contracting parties via a telecommunication network, the method comprising the steps of:
a first contracting party is authenticated by means of a first terminal;
a verification request is sent to a third party for verification of the identity of the first contracting party by means of the first terminal;
a confirmation of the identity of the first contracting party is sent to a second party on the basis of identification by the third party, characterised in that the method comprising the steps of:
the second contracting party is authenticated by means of a second terminal;
a verification request is sent to a third party for verification of the identity of the second contracting party by means of the second terminal; and a confirmation of the identity of the second contracting party is sent to the first contracting party on the basis of identification by the third party.
2. Procedure as defined in claim 1, characterised in that a procedure for identification of the second party is started after the second party has received the confirmation of the identity of the first party.
3. Procedure as defined in claim 1 or 2, characterised in that, after a confirmation message regarding the identity of a contracting party has been sent, a record is written to a verification database.
4. Procedure as defined in any one of claims 1 - 3 , characterised in that the verification request sent by a contracting party to a third party contains information indicating the party to whom the identification message is sent, the matter or contract to which the verification is related and the point of time of the verification.
5. Procedure as defined in any one of claims 1 - 4, characterised in that the record written to the verification database, which is managed by a reliable third party, contains information indicating the party to whom the verification message has been sent, the matter or contract to which the verification is related and the point of time of the verification.
6. System for reliable and safe identification of contracting parties in a telecommunication network comprising a mobile communication network, a public telephone or data network and at least one terminal device (TE1), characterised in that the system comprises means for authentication of a first contracting party;
a verification database (TTP1) which is managed by a third party and by means of which the identity of the first contracting party is verified; and that the verification database comprises means for sending a verification message to a second contracting party on the basis of identification by the third party.
7. System as defined in claim 6, characterised in that the system comprises a second verification database (TTP2) managed by the third party for verification of the identity of the second contracting party.
8. System as defined in claim 6 or 7, characterised in that the system comprises a storage database (TTP3), which is connected to the first and second verification databases (TTP1, TTP2) to receive verification records and which is managed by a reliable third party.
9. System as defined in any one of claims 6 -8 , characterised in that the first and second verification databases (TTP1, TTP2) are managed by a reliable third party.
CA002324240A 1998-03-17 1999-03-17 Procedure and system for reliable and safe identification of a contracting party Abandoned CA2324240A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FI980591 1998-03-17
FI980591A FI980591A (en) 1998-03-17 1998-03-17 Procedure and system for reliable and secure identification of a contracting party
PCT/FI1999/000208 WO1999048242A1 (en) 1998-03-17 1999-03-17 Procedure and system for reliable and safe identification of a contracting party

Publications (1)

Publication Number Publication Date
CA2324240A1 true CA2324240A1 (en) 1999-09-23

Family

ID=8551296

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002324240A Abandoned CA2324240A1 (en) 1998-03-17 1999-03-17 Procedure and system for reliable and safe identification of a contracting party

Country Status (7)

Country Link
EP (1) EP1064753A1 (en)
JP (1) JP2002507812A (en)
CN (1) CN1297636A (en)
AU (1) AU751923B2 (en)
CA (1) CA2324240A1 (en)
FI (1) FI980591A (en)
WO (1) WO1999048242A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001071971A1 (en) * 2000-03-21 2001-09-27 Smarttrust Systems Oy Digital contract
GB0028729D0 (en) * 2000-11-24 2001-01-10 Nokia Oy Ab Improvement in and relating to transaction security
GB2381633A (en) * 2001-11-02 2003-05-07 Nokia Corp Controlling transactions
JP2003345988A (en) * 2002-05-24 2003-12-05 Aioi Insurance Co Ltd Insurance agreement supporting system
CN1455340A (en) * 2002-12-31 2003-11-12 魏建青 System and method of safety access of mesh network data
CN101645776B (en) * 2009-08-28 2011-09-21 西安西电捷通无线网络通信股份有限公司 Method for distinguishing entities introducing on-line third party
CN106572064B (en) * 2015-10-10 2019-10-29 西安西电捷通无线网络通信股份有限公司 A kind of entity identities validation verification method and device that more TTP are participated in
CN106572066B (en) * 2015-10-10 2019-11-22 西安西电捷通无线网络通信股份有限公司 A kind of entity identities validation verification method and device thereof
CN106572065B (en) 2015-10-10 2019-11-22 西安西电捷通无线网络通信股份有限公司 A kind of entity identities validation verification method and device that more TTP are participated in
CN112165597B (en) * 2020-09-28 2023-05-02 平安普惠企业管理有限公司 Data approval method and device based on multiparty video

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU698454B2 (en) * 1994-07-19 1998-10-29 Certco Llc Method for securely using digital signatures in a commercial cryptographic system
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5553145A (en) * 1995-03-21 1996-09-03 Micali; Silvia Simultaneous electronic transactions with visible trusted parties
AU6489296A (en) * 1995-07-18 1997-02-18 Marshall A. Sloo On-line contract negotiating apparatus and method
US5748740A (en) * 1995-09-29 1998-05-05 Dallas Semiconductor Corporation Method, apparatus, system and firmware for secure transactions

Also Published As

Publication number Publication date
WO1999048242A1 (en) 1999-09-23
EP1064753A1 (en) 2001-01-03
FI980591A0 (en) 1998-03-17
FI980591A (en) 2000-01-03
AU751923B2 (en) 2002-08-29
JP2002507812A (en) 2002-03-12
CN1297636A (en) 2001-05-30
AU2838599A (en) 1999-10-11

Similar Documents

Publication Publication Date Title
AU755054B2 (en) Method, arrangement and apparatus for authentication through a communications network
US4531023A (en) Computer security system for a time shared computer accessed over telephone lines
US6711400B1 (en) Authentication method
EP1615097B1 (en) Dual-path-pre-approval authentication method
EP1249095B1 (en) Method for issuing an electronic identity
EP0993662B1 (en) Procedure for the control of applications stored in a subscriber identity module
CN109089264A (en) A kind of mobile terminal exempts from the method and system of close login
CA2013374C (en) Authenticated communications access service
US7689204B2 (en) Method of unlocking a mobile telephone type wireless communication terminal
US20040266395A1 (en) Process for securing a mobile terminal and applications of the process for executing applications requiring a high degree of security
JP2009515403A (en) Remote activation of user accounts in telecommunications networks
RU96102840A (en) METHOD FOR CHECKING THE FITNESS OF A COMMUNICATION LINK
JPH11507451A (en) System for detecting unauthorized account access
CN101183932A (en) Security identification system of wireless application service and login and entry method thereof
CN108174377B (en) Method and system for opening number
EP0749618B1 (en) Method to identify clients and method for using a teleterminal device
US6993666B1 (en) Method and apparatus for remotely accessing a password-protected service in a data communication system
CA2324240A1 (en) Procedure and system for reliable and safe identification of a contracting party
CN113487321A (en) Identity identification and verification method and system based on block chain wallet
CN115982694A (en) Resource access method, device, equipment and medium
EP0645688A1 (en) Method for the identification of users of telematics servers
CN110516427A (en) Auth method, device, storage medium and the computer equipment of terminal user
US20030074557A1 (en) Method and system for management of properties
CN108540460A (en) The account generating means independently identified based on user
KR20070088646A (en) Mobile telephone camera system

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued
FZDE Discontinued

Effective date: 20060317