EP1410616A2 - Secure public telephony system - Google Patents
Secure public telephony systemInfo
- Publication number
- EP1410616A2 EP1410616A2 EP02700507A EP02700507A EP1410616A2 EP 1410616 A2 EP1410616 A2 EP 1410616A2 EP 02700507 A EP02700507 A EP 02700507A EP 02700507 A EP02700507 A EP 02700507A EP 1410616 A2 EP1410616 A2 EP 1410616A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- telephone
- server
- public telephone
- secure public
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/28—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP with meter at substation or with calculation of charges at terminal
- H04M15/30—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP with meter at substation or with calculation of charges at terminal the meter or calculation of charges not being controlled from an exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/47—Fraud detection or prevention means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/48—Secure or trusted billing, e.g. trusted elements or encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/56—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for VoIP communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/02—Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/02—Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
- H04M17/023—Circuit arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/609—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0148—Fraud detection or prevention means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0156—Secure and trusted billing, e.g. trusted elements, encryption, digital signature, codes or double check mechanisms to secure billing calculation and information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/20—Technology dependant metering
- H04M2215/202—VoIP; Packet switched telephony
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/92—Autonomous calculations of charges in terminal, i.e. meter not controlled from exchange
Definitions
- the present invention relates to the field of telecommunications and in particular that of public telephone networks.
- the present invention relates more specifically to a secure public telephone system.
- the present invention therefore relates to a telephone installation for the transmission of information over a telephone line comprising a telephone set of the type without subscription and connectable to said telephone line and a security server associated with said telephone set.
- Public telephone sets allow users, by payment (by coins, tokens or cards), to communicate information, such as voice or data, through a telephone line.
- Telephone charging is done by counting charging pulses sent to a telephone exchange or even directly by the electronic circuits of the telephone set, the latter then having its own table for charging telephone communications.
- the telephone set has a particular structure and circuits which allow the exchange between the control module and the telephone set of authentication information which is compared to verify that the telephone set is authorized to be used.
- the present invention proposes to perfect such tools by using a securing device which is at the same time particularly efficient, simple and inexpensive to implement.
- the secure public telephone system according to the invention is therefore of the type comprising at least one public telephone connected to a telecommunications network and a security device capable of supervising the exchange of information between this public telephone and at least part of the numbers called.
- the secure public telephone system is characterized in that the security device is formed by a remote server, this server being able to be connected to said public telephone by means of said telecommunications network and being adapted to transit the information exchanged between the public telephone and the numbers called.
- the public telephone comprises means for transmitting communications to the server in the form of coded digital data.
- the public telephone is equipped with the IP communication protocol and in that the information exchange sessions between the public telephone and the server use this IP protocol, the voice being coded in VoIP.
- the telephone comprises selection means capable of directing part of the calls to the server, the calls directed to the server being selected according to predetermined criteria.
- the criteria for selecting calls directed to said server include the cost of communications.
- the public telephone is connected to the telecommunications network by means of a telephone exchange and this exchange includes means capable of refusing any direct communication with a telephone number. call meeting the predetermined selection criteria according to which this communication must pass through the server.
- the public telephone addresses calls that do not meet the criteria predetermined selection, without any particular processing and in particular without digital coding of the channel.
- the server comprises means capable of synchronizing and regulating the sessions for exchanging information between the public telephone and the numbers called passing through the server.
- the server comprises means capable of authenticating the sessions for exchanging information between the public telephone and the numbers called passing through the server.
- the server comprises appropriate means for transferring data to the public telephone in parallel with the information exchange sessions between said telephone and the numbers called passing through the server, these data concerning in particular the taxation of sessions and information related to the operation of said telephone
- FIG. 1 is a simplified view showing the secure public telephone system according to the invention
- FIG. 2 is a block diagram detailing the operation of the secure public telephone system according to the invention.
- Figure 1 appears shown a telephone referenced 10 which belongs to a public telephone network.
- Such a network generally comprises between several tens to several thousand telephones, or even several tens of thousands, depending on its territorial coverage.
- the telephone 10 is conventionally intended to be used in self-service by users, who, for a fee, can make telephone communications to subscriber stations 5, consult Audiotel-type services 3, or even access the Web and the Internet or information servers residing on private networks.
- the telephone set 10 comprises, in known manner, a box 101 provided with a keyboard 102 for dialing a call number, a display device 103, for example with liquid crystal, and a telephone handset 104.
- the telephone set 10 further comprises a memory card reading / writing device, the insertion slot 105 of which can be seen.
- the telephone set can be equipped with a coin cashing system in addition to or in replacement of the card reading / writing device payment.
- the telephone 10 is connected to a communication network 1 which, in the example illustrated in FIG. 1, is the public switched telephone network PSTN or PSTN (acronym for Public Switching Telephone Network).
- PSTN public switched telephone network
- PSTN Public Switching Telephone Network
- connection of the telephone 10 to the PSTN network 1 is carried out by means of a wired link 2 (with two wires) which leads into a telephone exchange 4 which is either a local exchange center CLR or a center with autonomous routing CAA.
- This network 1 could also be constituted by a network of digital type ISDN (Integrated Services Digital Network).
- the public telephone 10 includes hardware and software resources allowing its operation and in particular to debit the users of the amounts corresponding to the costs of the communications or services used, the users being able to pay either by means of payment cards, telephone or bank cards. , or by means of coins.
- the telephone 10 includes an electronic command and control unit formed by a microprocessor or microcontroller, not shown, conventionally comprising a central unit (UC) of the input / output interfaces (I / O) and of various types of memories. (RAM, ROM, EPROM, ).
- This microcontroller is therefore able to control and supervise the operation of the telephone apparatus 10 according to appropriate programs.
- the slot 105 cooperates with non-illustrated guide means which brings the card into a processing position where the external electrical contact pads of the card are connected to the connection elements of the read / write head also not shown.
- a processing circuit controlled by the microcontroller controls the reading or writing of new information in the memory of the card.
- a first memory area contains identification information and a second memory area contains the successive balances of the card.
- the card memory is PROM type
- the card contains a certain number of memory points which are initially blank (state 0). Each memory point corresponds to a unit amount.
- the balance is modified by irreversibly passing from state 0 to state 1 an integer number of points corresponding to the amount to be debited associated with the charging pulse sent by the microcontroller. The transition from state 0 to state 1 is obtained by applying a write voltage to the memory points considered.
- the telephone 10 is equipped with the IP communication protocol (Internet Protocol) as well as TCP or UDP protocols in accordance with the technical recommendations of the IETF ("internet Engineering Task Force").
- IP communication protocol Internet Protocol
- TCP or UDP protocols in accordance with the technical recommendations of the IETF ("internet Engineering Task Force").
- the physical layer of the telephone 10 is produced by analog (or digital depending on the nature of the network 1) modems.
- connection of the telephone 10 to the PSTN network 1 is subject to restrictions of use defined with the operator of this network. These restrictions will be specified below. These restrictions are implemented in the central office 4 of the PSTN network 1 using appropriate programs controlling the various materials used. These materials and this type of program are known and therefore do not require further details.
- the server 20 is arranged in a location which is not accessible to users, for example on the premises of the operator of the public telephone network.
- the connection of the server 20 to the PSTN network 1 is carried out by means of an appropriate secure link, allowing including handling multiple communications simultaneously.
- This server 20 is responsible, as will be detailed below, for establishing reliable and authenticated information exchange sessions which consists, for example, in certain identification of the telephones 10 during an information exchange or even in encrypt data to secure communication when needed.
- This server 20 is formed by a computer, for example of the PC type operating under Windows NT (registered trademark). Any call arrives at an input port of the server which is not shown, which is listened to continuously, then analyzed by an appropriate software application for example in Java language (registered trademark) and then routed to the requested recipient: subscriber or server delivering a service.
- Windows NT registered trademark
- This ban can relate to all calls made by telephone 10 or even relate only to part of the calls.
- the security method therefore consists in differentiating the calls into two groups, that of the calls to be secured and that of the calls for which security is not necessary and to apply appropriate treatment to each type of call.
- the criteria for securing a call can be diverse and varied and adapted in particular by the operator of the public telephone network to his specific needs.
- a criterion can for example be the cost of the communication, as soon as the cost of the communication to a subscriber or to a server exceeds a certain amount then the communication is secure.
- the telephone 10 is suitable for paying access to subscribers or to services.
- the price paid by the user for these services is obviously defined by the public telephone operator according to their cost price.
- the price of a local call will not be the same as that of a national call or international, the same for services.
- the numbering plan for services and telephone subscribers follows a set of rules established by the standardization bodies ETSI, ECTRA and ITU (cf. recommendations E.164, E.213 and X.121).
- the first step of the method therefore consists in detecting the line seizure when the handset 104 is lifted and the numbering which follows.
- the off-hook signal is perceived by appropriate means which inform the microprocessor thereof by sending a signal characteristic, it then initiates the progress of the line securing program according to the invention.
- the system for implementing the method according to the invention records this number formed, in the case of a voice frequency telephone set, by a series of DTMF signals according to the recommendation F.23 from FUIT (International Telecommunication Union) and converts them into binary code to be processed by the microcontroller.
- the microcontroller then operates the analysis of the called number and determines, from appropriate tables stored in an appropriate memory (EPROM or non-volatile RAM), it is a call to be secured because it belongs for example to the group high cost communications (national or international calls, servers ...) or if it is a call that may not be secure because of low cost (local call, emergency number, etc.) .
- the telephone number entered by the user on the keypad of the telephone set is sent to the CLR / CAA telephone exchange. so that the latter establishes through its switches, a line with the telephone number called and sends the latter a ring signal.
- the microcontroller supervises the line to determine whether the called party has picked up and that communication has been established. If this is the case, then price pulses are regularly sent to the collection system, whether it is to the card reader to toast the corresponding units of a prepaid telephone card or to the coin selector of change to cash coins. These tariff pulses are produced by the microcontroller from tariff tables stored in an appropriate memory of the telephone or even by the telephone exchange 4 and received on the line parallel to the communication in progress.
- the call having been identified as having to be secured (national or international call, Audiotel server, etc.), the microcontroller then triggers appropriate processing of the call.
- This processing consists in passing the exchange of information with the telephone number, whether voice or data, through the GATEWAY 20 server.
- the information transmitted by the user in non-digital form such as voice is digitized by an appropriate signal processing algorithm of the CODEC type, then coded and compressed according to the recommendations G.723.1 (linked to H.323) in MP-MLQ / ACELP at 5.3 and 6.3 kbit / s or G.728 in LD-CELP at 16 kbit / s or G.729 in CS-ACELP at 8 kbit / s.
- G.723.1 linked to H.323
- MP-MLQ / ACELP at 5.3 and 6.3 kbit / s or G.728 in LD-CELP at 16 kbit / s or G.729 in CS-ACELP at 8 kbit / s.
- these ITU standards are for reference only.
- the information thus coded is sent in packets to the server 20 via a modem and the PSTN network, through a session using the IP and UDP protocols, with the responsibility for this server of directing them to
- VoIP Voice over Frame Relay
- VToA Voice Telephony over ATM
- the GATEWAY server 20 When the GATEWAY server 20 receives the call from the telephone 10 it processes the request by an appropriate application allowing the control and the establishment of a session in the protocol sense of the term. A standard interface (“socket") is then opened and the request is re-sent to the number called after processing adapted to it. In particular, if the station called is a subscriber number with only a conventional telephone station, the server proceeds via conversion cards to the reverse processing of that operated by the telephone and sends a signal to this station. decoded voice.
- the information originating from the number called also passes through the server 20 and is therefore the subject of a processing symmetrical to that of the data received by this number, they are coded by the server 20 and on their arrival decoded by the public telephone 10 .
- the server 20 therefore has a certain number of functions provided by appropriate hardware and software means.
- a first function consists in directing the information received from the telephone 10 towards the requested call number, this is a call re-routing function.
- the server 20 can choose to operate the most suitable telecommunication network for re-routing, this may be the PSTN network 1 or even any other network to which the server 20 may have access, such as the Internet network for example.
- Another function consists, when necessary, in translating the data transmitted in the format of the subscriber stations or servers called. Another function is to synchronize and regulate the information exchange sessions between the public telephone and the numbers called. Another function is still to establish reliable information exchange sessions and authenticated or to encrypt all or part of the data exchanged.
- the telephone 10 and the server 20 send security data which can be encrypted by appropriate algorithms such as SSL (Socket Secure Layer) and which guarantee that the session processed by the GATEWAY server 20 is well established with the public telephone 10 and not with a telephone connected directly to the connection line 2.
- SSL Socket Secure Layer
- the server 20 can also provide information useful for the operation of the telephone 10 such as for example the charging pulses for the call in progress, thus the telephone 10 no longer has to manage rate tables for all secure calls.
- the microcontroller of the telephone proceeds as previously with respect to a local call, namely that it supervises the communication and addresses regularly tariff pulses to the card or coin cashing system and this, depending on the cost of the communication determined from a tariff table suitable for the call, tariff table stored in an appropriate memory of the public telephone or else from the tariff information provided by the server 20 and communicated to the telephone 10.
- connection of the telephone 10 to the PSTN network 1 is subject to restrictions of use defined with the operator of this network.
- restriction is that that all calls that must be secured and therefore must pass through the server 20, cannot be taken into account and therefore routed by the exchange 4. Thus if a fraudster accesses the connection line 2, he can only access one limited number of telephone numbers.
- Another example of restriction consists in redirecting any call received by the central office from line 2 and concerning a number to be secured to the server 20, which if it detects a call not coming from the telephone 10 is then able to trigger an appropriate alert.
- the present invention is not limited to the single embodiment illustrated, which has been given only by way of example.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0102532A FR2821227B1 (en) | 2001-02-22 | 2001-02-22 | SECURE PUBLIC TELEPHONY SYSTEM |
FR0102532 | 2001-02-22 | ||
PCT/IB2002/000502 WO2002067564A2 (en) | 2001-02-22 | 2002-02-20 | Secure public telephony system |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1410616A2 true EP1410616A2 (en) | 2004-04-21 |
Family
ID=8860403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02700507A Withdrawn EP1410616A2 (en) | 2001-02-22 | 2002-02-20 | Secure public telephony system |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1410616A2 (en) |
CA (1) | CA2437586A1 (en) |
FR (1) | FR2821227B1 (en) |
WO (1) | WO2002067564A2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2853174B1 (en) * | 2003-03-27 | 2005-07-08 | Schlumberger Systems & Service | SECURE TELEPHONE SYSTEM |
CA2546743C (en) * | 2003-12-15 | 2011-04-26 | Bce Inc. | Adapter for secure voip communications |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5812650A (en) * | 1992-07-09 | 1998-09-22 | Gammino; John R. | Method and apparatus for intercepting potentially fraudulent |
US5875236A (en) * | 1995-11-21 | 1999-02-23 | At&T Corp | Call handling method for credit and fraud management |
US5805686A (en) * | 1995-12-22 | 1998-09-08 | Mci Corporation | Telephone fraud detection system |
-
2001
- 2001-02-22 FR FR0102532A patent/FR2821227B1/en not_active Expired - Fee Related
-
2002
- 2002-02-20 EP EP02700507A patent/EP1410616A2/en not_active Withdrawn
- 2002-02-20 CA CA002437586A patent/CA2437586A1/en not_active Abandoned
- 2002-02-20 WO PCT/IB2002/000502 patent/WO2002067564A2/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of WO02067564A3 * |
Also Published As
Publication number | Publication date |
---|---|
WO2002067564A3 (en) | 2002-10-10 |
WO2002067564A2 (en) | 2002-08-29 |
FR2821227B1 (en) | 2003-05-16 |
CA2437586A1 (en) | 2002-08-29 |
FR2821227A1 (en) | 2002-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0463384B1 (en) | Method of access to a cordless telephone service | |
US5351290A (en) | Telecommunications fraud prevention system and method | |
MXPA06014682A (en) | Centralized biometric authentication. | |
HU224267B1 (en) | Procedure and system for providing a telecommunication service | |
AU2018217101B2 (en) | Detection and prevention of unwanted calls in a telecommunications system | |
CA2564463A1 (en) | Voice over ip based biometric authentication | |
EP0424495A1 (en) | Voice messaging for pay phone telephone systems. | |
US7099652B2 (en) | Originating a billed transaction for an origin telephony device | |
WO2006136733A1 (en) | Ip telephony securing | |
US20020168962A1 (en) | Customized service providing scheme | |
CN1848874B (en) | Anonymous calling method in next generation network | |
WO2002067564A2 (en) | Secure public telephony system | |
US7525950B1 (en) | Calling card system for voice and data transmission over a public network | |
FR2853174A1 (en) | SECURE TELEPHONE SYSTEM | |
EP0827359B1 (en) | Low-cost, automatic and transparent acces method and protocol for a telecommunication provider in ISDN | |
KR20070032782A (en) | Communication terminal and method | |
EP1489826A1 (en) | Method for authentication in a terminal by the access to the content of a SIM card in a mobile telephone | |
CN1111329C (en) | Communication method for intelligent public telephone system | |
FR2678459A1 (en) | Method of authenticating a subscriber making a call, for telephone billing | |
CN101485183A (en) | Method and apparatus for providing and using a telephone calling card | |
WO2003085555A2 (en) | System for automatically controlling display of information pages | |
WO2004093427A1 (en) | Wireless public internet access system | |
FI122518B (en) | Variable payment in service number | |
WO2001017224A2 (en) | Device for transmitting attempts at fraud to a monitoring system of a public telephone network | |
CN101490699A (en) | Method and apparatus for authorizing a calling card telephone call |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030917 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SCHLUMBERGER MALCO, INC. Owner name: AXALTO S.A. |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SCHLUMBERGER MALCO, INC. Owner name: SCHLUMBERGER SYSTEMES |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SCHLUMBERGER MALCO, INC. Owner name: SCHLUMBERGER PAYPHONES S.A.S |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SCHLUMBERGER MALCO, INC. Owner name: SPT PUBLICOM |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20070829 |