EP1005753A1 - Card phones comprising an access programme to various facilities - Google Patents
Card phones comprising an access programme to various facilitiesInfo
- Publication number
- EP1005753A1 EP1005753A1 EP98941562A EP98941562A EP1005753A1 EP 1005753 A1 EP1005753 A1 EP 1005753A1 EP 98941562 A EP98941562 A EP 98941562A EP 98941562 A EP98941562 A EP 98941562A EP 1005753 A1 EP1005753 A1 EP 1005753A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- program
- card
- access
- telephone
- handset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/02—Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/28—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP with meter at substation or with calculation of charges at terminal
Definitions
- the present invention relates to a card telephone comprising a handset, a keypad and a programmable memory.
- the invention finds a particularly advantageous application in the field of card telephones placed in private sites whose owners wish to be able to access, in a confidential manner, certain programmed functions of the telephone.
- the invention provides a card telephone comprising a handset, a keypad and a programmable memory, remarkable in that said memory contains a program for access, by means of a confidential code, to a plurality of functionalities, access to said program being effected by lifting the handset while holding down a key of said keyboard.
- said functionalities include, in addition to exiting the program, at least one of the following functionalities: communication without card, display of counters, programming of speed dialing keys, change of confidential code.
- access to the communication functionality without a card causes the exit from the program.
- FIG. 1 is a flow diagram of the access to the program-owner of a telephone according to the invention.
- FIG. 2 is a flowchart of the program-owner of the telephone according to the invention.
- Figures 1 and 2 relate to a card telephone comprising a handset, a keypad and a programmable memory.
- the cards concerned can be just as well telephone cards, also called calling cards, bank cards, or electronic purses.
- Said telephone is in particular intended to equip a private site, open to the public, such as a restaurant for example. The customers of this private site can use the telephone made available to them by means of their card.
- dial your confidential code is then displayed on the phone screen. During entry, the code appears on the screen in encrypted form, replacing all characters with "*".
- the confidential code can be made up of four digits between 0 and 9.
- the code entered by the user, owner of the site in particular, is rejected if it does not correspond to that stored in the phone memory or if the user has taken too long to enter it.
- a number of attempts are made, three for example, to dial the correct PIN, after which the routine ends and the operation must be resumed from the start.
- the value of the maximum delay for entering the confidential code, and the number of authorized attempts are parameters configurable by the CSV.
- the program goes to the first proposed functionality, access to which is authorized by the CSV, according to a general procedure in which the various functionalities are successively offered to the user who chooses or not to execute them.
- the choice of a functionality is displayed on the screen giving the title of the functionality and the invitation to the user to type "1" if he chooses to execute the functionality, or "0" in the case opposite.
- the first feature offered is cardless communication which allows the site owner to call without a card, as he uses his personal phone.
- the man / machine interface for this type of call is the same as for a normal call. Note, however, that the cardless communication functionality causes the access program to exit, i.e. at the end of the call, the phone is in its idle state, waiting for an off-hook or card insertion.
- a second functionality accessible by the owner-program is the display of certain meters.
- the list of counters that can be viewed is a parameter downloadable by the CSV. Each counter has an identification number and the value associated with a given counter is displayed on the telephone screen, switching from one counter to the next is obtained by pressing the "*" key for example.
- the counters that can be viewed we can cite the number of calls, the total duration of calls, the number of taxes generated.
- a third feature available is the programming of quick programming keys.
- the program asks the user to choose the speed dial key he wishes to program. The user must then press the chosen key and enter the corresponding number.
- a fourth feature of the proprietary program concerns the change of confidential code.
- the entry of the new code is carried out in the same way as when accessing the owner-program, the characters typed by the operator being displayed on the screen progressively in encrypted form. Once the entry is complete, the user is asked to confirm his new code. If the code entered is correct, it is taken into account, and the program goes to the next functionality by saving the new confidential code. If the code is incorrect, the user is notified by the program.
- the output of the owner-program is proposed to the operator. If he wishes to exit the program he presses the "1" key (for yes), if not, he presses the "0" key (for no), the program then resumes after the step of entering the confidential code, it is that is to say the communication functionality without a card.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
- Facsimile Transmission Control (AREA)
Abstract
The invention concerns card phones comprising a handset, a keyboard and a programmable memory. The invention is characterised in that said memory contains a programme for accessing, by means of a confidential code, a plurality of facilities, access to said programme being obtained by lifting the handset while maintaining one key of said keyboard depressed. The invention is applicable to card phones located in private sites.
Description
TELEPHONE A CARTES COMPRENANT UN PROGRAMME D'ACCES CARD TELEPHONE INCLUDING AN ACCESS PROGRAM
A DIVERSES FONCTIONNALITESWITH VARIOUS FEATURES
La présente invention concerne un téléphone à cartes comportant un combiné, un clavier à touches et une mémoire programmable.The present invention relates to a card telephone comprising a handset, a keypad and a programmable memory.
L'invention trouve une application particulièrement avantageuse dans le domaine des téléphones à cartes placés dans des sites privés dont les propriétaires souhaitent pouvoir accéder, de manière confidentielle, à certaines fonctionnalités programmées du téléphone.The invention finds a particularly advantageous application in the field of card telephones placed in private sites whose owners wish to be able to access, in a confidential manner, certain programmed functions of the telephone.
Il existe des sites privés, tels bars ou restaurants, dans lesquels des propriétaires mettent à la disposition de leur clientèle un téléphone fonctionnant avec une carte à mémoire comme moyen de paiement, que ce soit une carte téléphonique, une carte bancaire ou un porte-monnaie électronique. Cependant, en plus de cet usage public, il peut être intéressant pour les propriétaires de ces sites de pouvoir disposer d'un programme particulier, appelé programme-propriétaire, dont l'accès sécurisé leur permettrait d'utiliser diverses fonctionnalités qui seraient réservées à leurs propres besoins.There are private sites, such as bars or restaurants, in which owners make available to their customers a telephone operating with a memory card as a means of payment, whether it is a telephone card, a bank card or a wallet. electronic. However, in addition to this public use, it may be interesting for the owners of these sites to be able to have a particular program, called program-owner, whose secure access would allow them to use various functionalities which would be reserved for their own needs.
A cet effet, l'invention propose un téléphone à cartes comportant un combiné, un clavier à touches et une mémoire programmable, remarquable en ce que ladite mémoire contient un programme d'accès, au moyen d'un code confidentiel, à une pluralité de fonctionnalités, l'accès audit programme s'effectuant en décrochant le combiné en maintenant enfoncée une touche dudit clavier.To this end, the invention provides a card telephone comprising a handset, a keypad and a programmable memory, remarkable in that said memory contains a program for access, by means of a confidential code, to a plurality of functionalities, access to said program being effected by lifting the handset while holding down a key of said keyboard.
Ainsi, l'accès aux fonctionnalités réservées au propriétaire du site se fait en deux étapes : d'une part, le décroché, une touche étant maintenue enfoncée, et d'autre part, saisie du code confidentiel. On comprend qu'une saisie directe du code confidentiel aurait posé un problème de confusion avec la composition d'un numéro d'appel.Thus, access to the functionalities reserved for the site owner is done in two stages: on the one hand, off-hook, a key being held down, and on the other hand, entering the confidential code. It is understood that a direct entry of the confidential code would have posed a problem of confusion with the composition of a telephone number.
Il est également prévu, selon l'invention, que lesdites fonctionnalités comprennent, outre la sortie du programme, au moins
une des fonctionnalités suivantes : communication sans carte, visualisation de compteurs, programmation de touches à numérotation rapide, changement de code confidentiel.It is also provided, according to the invention, that said functionalities include, in addition to exiting the program, at least one of the following functionalities: communication without card, display of counters, programming of speed dialing keys, change of confidential code.
Enfin, selon un mode de réalisation particulier de l'invention, l'accès à la fonctionnalité communication sans carte provoque la sortie du programme.Finally, according to a particular embodiment of the invention, access to the communication functionality without a card causes the exit from the program.
La description qui va suivre en regard des dessins annexés, donnés à titre d'exemples non limitatifs, fera bien comprendre en quoi consiste l'invention et comment elle peut être réalisée. La figure 1 est un organigramme de l'accès au programme- propriétaire d'un téléphone selon l'invention.The description which follows with reference to the appended drawings, given by way of nonlimiting examples, will make it clear what the invention consists of and how it can be implemented. FIG. 1 is a flow diagram of the access to the program-owner of a telephone according to the invention.
La figure 2 est un organigramme du déroulement du programme- propriétaire du téléphone selon l'invention.Figure 2 is a flowchart of the program-owner of the telephone according to the invention.
Les figures 1 et 2 se rapportent à un téléphone à cartes comprenant un combiné, un clavier à touches et une mémoire programmable. Les cartes concernées peuvent être tout aussi bien des cartes téléphoniques, appelées aussi télécartes, des cartes bancaires, ou des porte-monnaie électroniques. Ledit téléphone est notamment destiné à équiper un site privé, ouvert au public, comme un restaurant par exemple. Les clients de ce site privé peuvent utiliser le téléphone mis à leur disposition au moyen de leur carte.Figures 1 and 2 relate to a card telephone comprising a handset, a keypad and a programmable memory. The cards concerned can be just as well telephone cards, also called calling cards, bank cards, or electronic purses. Said telephone is in particular intended to equip a private site, open to the public, such as a restaurant for example. The customers of this private site can use the telephone made available to them by means of their card.
Toutefois, de manière à permettre au propriétaire du site d'accéder à des fonctionnalités qui lui sont réservées, on prévoit que la mémoire du téléphone contient un programme, dit programme-propriétaire, d'accès par code confidentiel aux dites fonctionnalités.However, in order to allow the owner of the site to access functions which are reserved for him, provision is made for the memory of the telephone to contain a program, called program-owner, for access by said code to said functions.
L'exécution du programme-propriétaire se déroule de la façon suivante.The execution of the owner-program proceeds as follows.
Ainsi que le montre la figure 1 , pour entrer dans ledit programme- propriétaire, il faut décrocher le combiné tout en maintenant enfoncée une touche du clavier, la touche "#" par exemple. Puis, si l'accès au
programme-propriétaire n'est pas interdit par le système permettant de configurer le téléphone à distance (CSV), un code confidentiel doit être saisi pour accéder aux fonctionnalités réservées. Un message du typeAs shown in FIG. 1, to enter said owner program, it is necessary to lift the handset while holding down a key on the keyboard, the "#" key for example. Then, if access to program-owner is not prohibited by the system allowing remote telephone configuration (CSV), a confidential code must be entered to access the reserved functions. A message like
"composez votre code confidentiel" s'affiche alors sur l'écran du téléphone. Au cours de la saisie, le code apparaît sur l'écran de façon cryptée, en remplaçant tous les caractères par "*". A titre d'exemple, le code confidentiel peut être composé de quatre chiffres compris entre 0 et 9."dial your confidential code" is then displayed on the phone screen. During entry, the code appears on the screen in encrypted form, replacing all characters with "*". For example, the confidential code can be made up of four digits between 0 and 9.
Le code saisi par l'utilisateur, propriétaire du site notamment, est rejeté s'il ne correspond pas à celui stocké dans la mémoire du téléphone ou si l'utilisateur a mis trop de temps pour le saisir. Il est prévu un certain nombre d'essais, trois par exemple, pour composer le bon code confidentiel, après quoi le sous-programme se termine et l'opération doit être reprise dès le début. La valeur du délai maximal pour saisir le code confidentiel, et le nombre d'essais autorisés sont des paramètres configurables par le CSV.The code entered by the user, owner of the site in particular, is rejected if it does not correspond to that stored in the phone memory or if the user has taken too long to enter it. A number of attempts are made, three for example, to dial the correct PIN, after which the routine ends and the operation must be resumed from the start. The value of the maximum delay for entering the confidential code, and the number of authorized attempts are parameters configurable by the CSV.
Si le code confidentiel est accepté, le programme passe à la première fonctionnalité proposée dont l'accès est autorisé par le CSV, selon un déroulement général dans lequel les différentes fonctionnalités sont successivement proposées à l'utilisateur qui choisit ou pas de les exécuter. Le choix d'une fonctionnalité s'affiche à l'écran en donnant le titre de la fonctionnalité et l'invitation à l'utilisateur de taper " 1" s'il choisit d'exécuter la fonctionnalité, ou "0" dans le cas contraire. La première fonctionnalité proposée est la communication sans carte qui permet au propriétaire du site de téléphoner sans carte, comme il utilise son téléphone personnel. L'interface homme/machine pour ce type d'appel est le même que pour un appel normal. Notons cependant que la fonctionnalité communication sans carte provoque la sortie du programme d'accès, c'est-à-dire qu'à la fin de l'appel, le
téléphone est dans son état de repos, en attente d'un décroché ou d'insertion carte.If the confidential code is accepted, the program goes to the first proposed functionality, access to which is authorized by the CSV, according to a general procedure in which the various functionalities are successively offered to the user who chooses or not to execute them. The choice of a functionality is displayed on the screen giving the title of the functionality and the invitation to the user to type "1" if he chooses to execute the functionality, or "0" in the case opposite. The first feature offered is cardless communication which allows the site owner to call without a card, as he uses his personal phone. The man / machine interface for this type of call is the same as for a normal call. Note, however, that the cardless communication functionality causes the access program to exit, i.e. at the end of the call, the phone is in its idle state, waiting for an off-hook or card insertion.
Une deuxième fonctionnalité accessible par le programme- propriétaire est la visualisation de certains compteurs. La liste des compteurs qui peuvent être visualisés est un paramètre téléchargeable par le CSV. Chaque compteur porte un numéro d'identification et la valeur associée à un compteur donné est affichée à l'écran du téléphone, le passage d'un compteur au suivant est obtenu en appuyant sur la touche "*" par exemple. Parmi les compteurs pouvant être visualisés, on peut citer le nombre d'appels, la durée totale des appels, le nombre de taxes générées.A second functionality accessible by the owner-program is the display of certain meters. The list of counters that can be viewed is a parameter downloadable by the CSV. Each counter has an identification number and the value associated with a given counter is displayed on the telephone screen, switching from one counter to the next is obtained by pressing the "*" key for example. Among the counters that can be viewed, we can cite the number of calls, the total duration of calls, the number of taxes generated.
Une troisième fonctionnalité disponible est la programmation de touches à programmation rapide. Dans cette application, le programme demande à l'utilisateur de choisir la touche de numérotation rapide qu'il désire programmer. L'utilisateur doit alors appuyer sur la touche choisie et saisir le numéro correspondant.A third feature available is the programming of quick programming keys. In this application, the program asks the user to choose the speed dial key he wishes to program. The user must then press the chosen key and enter the corresponding number.
Une quatrième fonctionnalité du programme-propriétaire concerne le changement de code confidentiel. La saisie du nouveau code s'effectue de la même manière que lors de l'accès au programme- propriétaire, les caractères tapés par l'opérateur étant affichés à l'écran au fur et à mesure de façon cryptée. Une fois la saisie terminée, l'utilisateur est invité à confirmer son nouveau code. Si le code saisi est correct, il est pris en compte, et le programme passe à la fonctionnalité suivante en sauvegardant le nouveau code confidentiel. Si le code est incorrect, l'utilisateur en est averti par le programme.A fourth feature of the proprietary program concerns the change of confidential code. The entry of the new code is carried out in the same way as when accessing the owner-program, the characters typed by the operator being displayed on the screen progressively in encrypted form. Once the entry is complete, the user is asked to confirm his new code. If the code entered is correct, it is taken into account, and the program goes to the next functionality by saving the new confidential code. If the code is incorrect, the user is notified by the program.
Après cette dernière fonctionnalité, la sortie du programme- propriétaire est proposée à l'opérateur. S'il désire quitter le programme il tape la touche " 1" (pour oui), sinon, il tape la touche "0" (pour non), le programme reprend alors après l'étape de saisie du code confidentiel, c'est-à-dire à la fonctionnalité communication sans carte.
After this last functionality, the output of the owner-program is proposed to the operator. If he wishes to exit the program he presses the "1" key (for yes), if not, he presses the "0" key (for no), the program then resumes after the step of entering the confidential code, it is that is to say the communication functionality without a card.
Claims
REVENDICATIONS
1 - Téléphone à cartes comportant un combiné, un clavier à touches et une mémoire programmable, caractérisé en ce que ladite mémoire contient un programme d'accès, au moyen d'un code confidentiel, à une pluralité de fonctionnalités, l'accès audit programme s'effectuant en décrochant le combiné en maintenant enfoncée une touche dudit clavier.1 - Card telephone comprising a handset, a keypad and a programmable memory, characterized in that said memory contains a program of access, by means of a confidential code, to a plurality of functionalities, access to said program This is done by lifting the handset while holding down a key on the keyboard.
2 - Téléphone à cartes selon la revendication 1 , caractérisé en ce que lesdites fonctionnalités comprennent, outre la sortie du programme, au moins une des fonctionnalités suivantes : communication sans carte, visualisation de compteurs, programmation de touches à numérotation rapide, changement de code confidentiel.2 - Card telephone according to claim 1, characterized in that said functionalities include, in addition to exiting the program, at least one of the following functionalities: communication without a card, display of counters, programming of speed dial keys, change of confidential code .
3 - Téléphone à cartes selon la revendication 2, caractérisé en ce que l'accès à la fonctionnalité communication sans carte provoque la sortie du programme.
3 - Card telephone according to claim 2, characterized in that access to the communication functionality without a card causes the exit from the program.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9710587A FR2767621B1 (en) | 1997-08-22 | 1997-08-22 | CARD TELEPHONE INCLUDING A PROGRAM OF ACCESS TO VARIOUS FEATURES |
FR9710587 | 1997-08-22 | ||
PCT/FR1998/001763 WO1999011052A1 (en) | 1997-08-22 | 1998-08-06 | Card phones comprising an access programme to various facilities |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1005753A1 true EP1005753A1 (en) | 2000-06-07 |
Family
ID=9510449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP98941562A Withdrawn EP1005753A1 (en) | 1997-08-22 | 1998-08-06 | Card phones comprising an access programme to various facilities |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1005753A1 (en) |
FR (1) | FR2767621B1 (en) |
WO (1) | WO1999011052A1 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2211695A (en) * | 1987-10-27 | 1989-07-05 | Gina Parmar | Security device for a telephone |
US4975942A (en) * | 1989-07-21 | 1990-12-04 | The Boston Communications Group | Credit/calling card pay telephone method and system employing telephone unit local card-checking and other intelligence cooperative with local personal host computer |
SG44871A1 (en) * | 1992-05-21 | 1997-12-19 | Alcatel Australia | Method and apparatus for controlled credit facility in telephone subset |
-
1997
- 1997-08-22 FR FR9710587A patent/FR2767621B1/en not_active Expired - Fee Related
-
1998
- 1998-08-06 WO PCT/FR1998/001763 patent/WO1999011052A1/en not_active Application Discontinuation
- 1998-08-06 EP EP98941562A patent/EP1005753A1/en not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO9911052A1 * |
Also Published As
Publication number | Publication date |
---|---|
FR2767621B1 (en) | 1999-10-08 |
WO1999011052A1 (en) | 1999-03-04 |
FR2767621A1 (en) | 1999-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FR2672456A1 (en) | METHOD FOR OPERATING A RADIOTELEPHONE AND ASSOCIATED DEVICE FOR CONTROLLING THE OPERATIONS OF A RADIOTELEPHONE | |
US6782279B2 (en) | Method for simplifying cellular phone menu selection | |
FR2693614A1 (en) | Portable telephone with limitations on display of sensitive numbers - has RAM storing telephone numbers and abbreviated numbers in groups, with information on access and display limitations of numbers in group | |
KR20000053543A (en) | Graphical voice response system and method therefor | |
FR2807538A1 (en) | DEVICE FOR ACCESSING AN INTERNET-LIKE SERVICE WITHOUT TAPPING THE FULL OR EXACT ADDRESS | |
EP0841801A1 (en) | Method for restricting the duration of a telephone communication and telephone apparatus using the same | |
FR2803161A1 (en) | METHOD FOR DOWNLOADING TELEPHONE NUMBERS TO A MOBILE TELEPHONE | |
WO2001078356A3 (en) | Information display apparatus and method | |
EP1005753A1 (en) | Card phones comprising an access programme to various facilities | |
EP0397164B1 (en) | Alphanumeric text entry device with display and keyboard, and application of said device to a telephone terminal | |
FR2810480A1 (en) | Electronic data processing in which data key is produced by combining a secret key with a random number | |
WO2003046730A2 (en) | Method for making secure access to a digital resource | |
WO2002035870A2 (en) | A cellular telephone and an emergency assistance system | |
EP1364349A1 (en) | Method for secure storing of personal data and for consulting same, chip card, terminal and server used to carry out said method | |
JP2006277467A (en) | Personal digital assistant | |
EP1402710A1 (en) | Method for automatically dialling a telephone number | |
KR100828323B1 (en) | Message index display method for mobile communication device | |
KR101034112B1 (en) | Mobile terminal and data search and data alignment method | |
KR100442371B1 (en) | Color character display method for mobile communication device | |
KR970024779A (en) | How to redial history on your phone | |
KR100681181B1 (en) | Method for Searching Data of Mobile Communication Device Wherein Phone Number Is Saved | |
EP0957650A1 (en) | Method and system for using simultaneously a mobile station in two modes, and its corresponding mobile station | |
KR980013202A (en) | Area code automatic dialing method of simple electronic exchanger | |
KR200422053Y1 (en) | Mobile phone | |
KR100638216B1 (en) | Dial number input method for mobile communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20000217 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): DE DK ES GB IT NL |
|
17Q | First examination report despatched |
Effective date: 20031205 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: AXALTO S.A. |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SCHLUMBERGER SYSTEMES |
|
18D | Application deemed to be withdrawn |
Effective date: 20040416 |