EP1410616A2 - Secure public telephony system - Google Patents

Secure public telephony system

Info

Publication number
EP1410616A2
EP1410616A2 EP02700507A EP02700507A EP1410616A2 EP 1410616 A2 EP1410616 A2 EP 1410616A2 EP 02700507 A EP02700507 A EP 02700507A EP 02700507 A EP02700507 A EP 02700507A EP 1410616 A2 EP1410616 A2 EP 1410616A2
Authority
EP
European Patent Office
Prior art keywords
telephone
server
public telephone
secure public
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP02700507A
Other languages
German (de)
French (fr)
Inventor
Jean-Paul Mengus
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SPT PUBLICOM
Axalto Inc
Original Assignee
Schlumberger Systemes SA
Schlumberger Malco Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Systemes SA, Schlumberger Malco Inc filed Critical Schlumberger Systemes SA
Publication of EP1410616A2 publication Critical patent/EP1410616A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/28Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP with meter at substation or with calculation of charges at terminal
    • H04M15/30Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP with meter at substation or with calculation of charges at terminal the meter or calculation of charges not being controlled from an exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/47Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/48Secure or trusted billing, e.g. trusted elements or encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/56Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for VoIP communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/02Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/02Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
    • H04M17/023Circuit arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/609Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0148Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0156Secure and trusted billing, e.g. trusted elements, encryption, digital signature, codes or double check mechanisms to secure billing calculation and information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/20Technology dependant metering
    • H04M2215/202VoIP; Packet switched telephony
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/92Autonomous calculations of charges in terminal, i.e. meter not controlled from exchange

Definitions

  • the present invention relates to the field of telecommunications and in particular that of public telephone networks.
  • the present invention relates more specifically to a secure public telephone system.
  • the present invention therefore relates to a telephone installation for the transmission of information over a telephone line comprising a telephone set of the type without subscription and connectable to said telephone line and a security server associated with said telephone set.
  • Public telephone sets allow users, by payment (by coins, tokens or cards), to communicate information, such as voice or data, through a telephone line.
  • Telephone charging is done by counting charging pulses sent to a telephone exchange or even directly by the electronic circuits of the telephone set, the latter then having its own table for charging telephone communications.
  • the telephone set has a particular structure and circuits which allow the exchange between the control module and the telephone set of authentication information which is compared to verify that the telephone set is authorized to be used.
  • the present invention proposes to perfect such tools by using a securing device which is at the same time particularly efficient, simple and inexpensive to implement.
  • the secure public telephone system according to the invention is therefore of the type comprising at least one public telephone connected to a telecommunications network and a security device capable of supervising the exchange of information between this public telephone and at least part of the numbers called.
  • the secure public telephone system is characterized in that the security device is formed by a remote server, this server being able to be connected to said public telephone by means of said telecommunications network and being adapted to transit the information exchanged between the public telephone and the numbers called.
  • the public telephone comprises means for transmitting communications to the server in the form of coded digital data.
  • the public telephone is equipped with the IP communication protocol and in that the information exchange sessions between the public telephone and the server use this IP protocol, the voice being coded in VoIP.
  • the telephone comprises selection means capable of directing part of the calls to the server, the calls directed to the server being selected according to predetermined criteria.
  • the criteria for selecting calls directed to said server include the cost of communications.
  • the public telephone is connected to the telecommunications network by means of a telephone exchange and this exchange includes means capable of refusing any direct communication with a telephone number. call meeting the predetermined selection criteria according to which this communication must pass through the server.
  • the public telephone addresses calls that do not meet the criteria predetermined selection, without any particular processing and in particular without digital coding of the channel.
  • the server comprises means capable of synchronizing and regulating the sessions for exchanging information between the public telephone and the numbers called passing through the server.
  • the server comprises means capable of authenticating the sessions for exchanging information between the public telephone and the numbers called passing through the server.
  • the server comprises appropriate means for transferring data to the public telephone in parallel with the information exchange sessions between said telephone and the numbers called passing through the server, these data concerning in particular the taxation of sessions and information related to the operation of said telephone
  • FIG. 1 is a simplified view showing the secure public telephone system according to the invention
  • FIG. 2 is a block diagram detailing the operation of the secure public telephone system according to the invention.
  • Figure 1 appears shown a telephone referenced 10 which belongs to a public telephone network.
  • Such a network generally comprises between several tens to several thousand telephones, or even several tens of thousands, depending on its territorial coverage.
  • the telephone 10 is conventionally intended to be used in self-service by users, who, for a fee, can make telephone communications to subscriber stations 5, consult Audiotel-type services 3, or even access the Web and the Internet or information servers residing on private networks.
  • the telephone set 10 comprises, in known manner, a box 101 provided with a keyboard 102 for dialing a call number, a display device 103, for example with liquid crystal, and a telephone handset 104.
  • the telephone set 10 further comprises a memory card reading / writing device, the insertion slot 105 of which can be seen.
  • the telephone set can be equipped with a coin cashing system in addition to or in replacement of the card reading / writing device payment.
  • the telephone 10 is connected to a communication network 1 which, in the example illustrated in FIG. 1, is the public switched telephone network PSTN or PSTN (acronym for Public Switching Telephone Network).
  • PSTN public switched telephone network
  • PSTN Public Switching Telephone Network
  • connection of the telephone 10 to the PSTN network 1 is carried out by means of a wired link 2 (with two wires) which leads into a telephone exchange 4 which is either a local exchange center CLR or a center with autonomous routing CAA.
  • This network 1 could also be constituted by a network of digital type ISDN (Integrated Services Digital Network).
  • the public telephone 10 includes hardware and software resources allowing its operation and in particular to debit the users of the amounts corresponding to the costs of the communications or services used, the users being able to pay either by means of payment cards, telephone or bank cards. , or by means of coins.
  • the telephone 10 includes an electronic command and control unit formed by a microprocessor or microcontroller, not shown, conventionally comprising a central unit (UC) of the input / output interfaces (I / O) and of various types of memories. (RAM, ROM, EPROM, ).
  • This microcontroller is therefore able to control and supervise the operation of the telephone apparatus 10 according to appropriate programs.
  • the slot 105 cooperates with non-illustrated guide means which brings the card into a processing position where the external electrical contact pads of the card are connected to the connection elements of the read / write head also not shown.
  • a processing circuit controlled by the microcontroller controls the reading or writing of new information in the memory of the card.
  • a first memory area contains identification information and a second memory area contains the successive balances of the card.
  • the card memory is PROM type
  • the card contains a certain number of memory points which are initially blank (state 0). Each memory point corresponds to a unit amount.
  • the balance is modified by irreversibly passing from state 0 to state 1 an integer number of points corresponding to the amount to be debited associated with the charging pulse sent by the microcontroller. The transition from state 0 to state 1 is obtained by applying a write voltage to the memory points considered.
  • the telephone 10 is equipped with the IP communication protocol (Internet Protocol) as well as TCP or UDP protocols in accordance with the technical recommendations of the IETF ("internet Engineering Task Force").
  • IP communication protocol Internet Protocol
  • TCP or UDP protocols in accordance with the technical recommendations of the IETF ("internet Engineering Task Force").
  • the physical layer of the telephone 10 is produced by analog (or digital depending on the nature of the network 1) modems.
  • connection of the telephone 10 to the PSTN network 1 is subject to restrictions of use defined with the operator of this network. These restrictions will be specified below. These restrictions are implemented in the central office 4 of the PSTN network 1 using appropriate programs controlling the various materials used. These materials and this type of program are known and therefore do not require further details.
  • the server 20 is arranged in a location which is not accessible to users, for example on the premises of the operator of the public telephone network.
  • the connection of the server 20 to the PSTN network 1 is carried out by means of an appropriate secure link, allowing including handling multiple communications simultaneously.
  • This server 20 is responsible, as will be detailed below, for establishing reliable and authenticated information exchange sessions which consists, for example, in certain identification of the telephones 10 during an information exchange or even in encrypt data to secure communication when needed.
  • This server 20 is formed by a computer, for example of the PC type operating under Windows NT (registered trademark). Any call arrives at an input port of the server which is not shown, which is listened to continuously, then analyzed by an appropriate software application for example in Java language (registered trademark) and then routed to the requested recipient: subscriber or server delivering a service.
  • Windows NT registered trademark
  • This ban can relate to all calls made by telephone 10 or even relate only to part of the calls.
  • the security method therefore consists in differentiating the calls into two groups, that of the calls to be secured and that of the calls for which security is not necessary and to apply appropriate treatment to each type of call.
  • the criteria for securing a call can be diverse and varied and adapted in particular by the operator of the public telephone network to his specific needs.
  • a criterion can for example be the cost of the communication, as soon as the cost of the communication to a subscriber or to a server exceeds a certain amount then the communication is secure.
  • the telephone 10 is suitable for paying access to subscribers or to services.
  • the price paid by the user for these services is obviously defined by the public telephone operator according to their cost price.
  • the price of a local call will not be the same as that of a national call or international, the same for services.
  • the numbering plan for services and telephone subscribers follows a set of rules established by the standardization bodies ETSI, ECTRA and ITU (cf. recommendations E.164, E.213 and X.121).
  • the first step of the method therefore consists in detecting the line seizure when the handset 104 is lifted and the numbering which follows.
  • the off-hook signal is perceived by appropriate means which inform the microprocessor thereof by sending a signal characteristic, it then initiates the progress of the line securing program according to the invention.
  • the system for implementing the method according to the invention records this number formed, in the case of a voice frequency telephone set, by a series of DTMF signals according to the recommendation F.23 from FUIT (International Telecommunication Union) and converts them into binary code to be processed by the microcontroller.
  • the microcontroller then operates the analysis of the called number and determines, from appropriate tables stored in an appropriate memory (EPROM or non-volatile RAM), it is a call to be secured because it belongs for example to the group high cost communications (national or international calls, servers ...) or if it is a call that may not be secure because of low cost (local call, emergency number, etc.) .
  • the telephone number entered by the user on the keypad of the telephone set is sent to the CLR / CAA telephone exchange. so that the latter establishes through its switches, a line with the telephone number called and sends the latter a ring signal.
  • the microcontroller supervises the line to determine whether the called party has picked up and that communication has been established. If this is the case, then price pulses are regularly sent to the collection system, whether it is to the card reader to toast the corresponding units of a prepaid telephone card or to the coin selector of change to cash coins. These tariff pulses are produced by the microcontroller from tariff tables stored in an appropriate memory of the telephone or even by the telephone exchange 4 and received on the line parallel to the communication in progress.
  • the call having been identified as having to be secured (national or international call, Audiotel server, etc.), the microcontroller then triggers appropriate processing of the call.
  • This processing consists in passing the exchange of information with the telephone number, whether voice or data, through the GATEWAY 20 server.
  • the information transmitted by the user in non-digital form such as voice is digitized by an appropriate signal processing algorithm of the CODEC type, then coded and compressed according to the recommendations G.723.1 (linked to H.323) in MP-MLQ / ACELP at 5.3 and 6.3 kbit / s or G.728 in LD-CELP at 16 kbit / s or G.729 in CS-ACELP at 8 kbit / s.
  • G.723.1 linked to H.323
  • MP-MLQ / ACELP at 5.3 and 6.3 kbit / s or G.728 in LD-CELP at 16 kbit / s or G.729 in CS-ACELP at 8 kbit / s.
  • these ITU standards are for reference only.
  • the information thus coded is sent in packets to the server 20 via a modem and the PSTN network, through a session using the IP and UDP protocols, with the responsibility for this server of directing them to
  • VoIP Voice over Frame Relay
  • VToA Voice Telephony over ATM
  • the GATEWAY server 20 When the GATEWAY server 20 receives the call from the telephone 10 it processes the request by an appropriate application allowing the control and the establishment of a session in the protocol sense of the term. A standard interface (“socket") is then opened and the request is re-sent to the number called after processing adapted to it. In particular, if the station called is a subscriber number with only a conventional telephone station, the server proceeds via conversion cards to the reverse processing of that operated by the telephone and sends a signal to this station. decoded voice.
  • the information originating from the number called also passes through the server 20 and is therefore the subject of a processing symmetrical to that of the data received by this number, they are coded by the server 20 and on their arrival decoded by the public telephone 10 .
  • the server 20 therefore has a certain number of functions provided by appropriate hardware and software means.
  • a first function consists in directing the information received from the telephone 10 towards the requested call number, this is a call re-routing function.
  • the server 20 can choose to operate the most suitable telecommunication network for re-routing, this may be the PSTN network 1 or even any other network to which the server 20 may have access, such as the Internet network for example.
  • Another function consists, when necessary, in translating the data transmitted in the format of the subscriber stations or servers called. Another function is to synchronize and regulate the information exchange sessions between the public telephone and the numbers called. Another function is still to establish reliable information exchange sessions and authenticated or to encrypt all or part of the data exchanged.
  • the telephone 10 and the server 20 send security data which can be encrypted by appropriate algorithms such as SSL (Socket Secure Layer) and which guarantee that the session processed by the GATEWAY server 20 is well established with the public telephone 10 and not with a telephone connected directly to the connection line 2.
  • SSL Socket Secure Layer
  • the server 20 can also provide information useful for the operation of the telephone 10 such as for example the charging pulses for the call in progress, thus the telephone 10 no longer has to manage rate tables for all secure calls.
  • the microcontroller of the telephone proceeds as previously with respect to a local call, namely that it supervises the communication and addresses regularly tariff pulses to the card or coin cashing system and this, depending on the cost of the communication determined from a tariff table suitable for the call, tariff table stored in an appropriate memory of the public telephone or else from the tariff information provided by the server 20 and communicated to the telephone 10.
  • connection of the telephone 10 to the PSTN network 1 is subject to restrictions of use defined with the operator of this network.
  • restriction is that that all calls that must be secured and therefore must pass through the server 20, cannot be taken into account and therefore routed by the exchange 4. Thus if a fraudster accesses the connection line 2, he can only access one limited number of telephone numbers.
  • Another example of restriction consists in redirecting any call received by the central office from line 2 and concerning a number to be secured to the server 20, which if it detects a call not coming from the telephone 10 is then able to trigger an appropriate alert.
  • the present invention is not limited to the single embodiment illustrated, which has been given only by way of example.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a secure public telephony system comprising at least one public telephone (10) which is connected to a telecommunication network (1) and a securement device that can monitor the exchanges of information between said public telephone and at least one part of the numbers called. The inventive system is characterised in that the securement device comprises a remote server (20). Said server (20) can be connected to the public telephone by means of the telecommunication network (1) and is adapted to transfer the information exchanged between said telephone and the numbers called.

Description

SYSTEME DE TELEPHONIE PUBLIQUE SECURISE SECURE PUBLIC TELEPHONY SYSTEM
La présente invention concerne le domaine des télécommunications et notamment celui des réseaux de téléphonie publique. La présente invention concerne plus spécifiquement un système de téléphonie publique sécurisé.The present invention relates to the field of telecommunications and in particular that of public telephone networks. The present invention relates more specifically to a secure public telephone system.
La présente invention concerne donc une installation téléphonique pour la transmission d'informations sur une ligne téléphonique comprenant un poste téléphonique du type sans abonnement et raccordable à ladite ligne téléphonique et un serveur de sécurisation associé audit poste téléphonique.The present invention therefore relates to a telephone installation for the transmission of information over a telephone line comprising a telephone set of the type without subscription and connectable to said telephone line and a security server associated with said telephone set.
Les postes téléphoniques publics permettent, moyennant paiement (par pièces, jetons ou cartes), aux usagers de communiquer des informations, telles que la voix ou des données, à travers une ligne téléphonique. La taxation téléphonique se fait par comptage d'impulsions de taxation émises au niveau d'un central téléphonique ou bien encore directement par les circuits électroniques du poste téléphonique, ce dernier comportant alors sa propre table de taxation des communications téléphoniques.Public telephone sets allow users, by payment (by coins, tokens or cards), to communicate information, such as voice or data, through a telephone line. Telephone charging is done by counting charging pulses sent to a telephone exchange or even directly by the electronic circuits of the telephone set, the latter then having its own table for charging telephone communications.
Comme tous les appareils délivrant en libre service des biens et des services de valeur, les téléphones publics sont soumis à des attaques de la part de fraudeurs. Parmi les fraudes les plus fréquentes concernant l'installation téléphonique proprement dite, on peut citer le détournement de la ligne téléphonique reliant le poste téléphonique public au central téléphonique en connectant directement à celle-ci un poste téléphonique classique ou bien encore en modifiant les données transmises sur cette ligne comme les données de taxation lorsque ces dernières transitent sur la ligne. Pour répondre à de telles attaques, la demanderesse a développé des outils de sécurisation de la ligne consistant à établir une authentification entre un poste téléphonique et un module associé monté sur la ligne de transmission reliant le poste téléphonique au central téléphonique et à interrompre la communication en cas de tentative de fraude.Like all self-service devices that deliver valuable goods and services, public phones are under attack from fraudsters. Among the most frequent frauds concerning the telephone installation itself, one can quote the diversion of the telephone line connecting the public telephone set to the telephone exchange by directly connecting to this one a traditional telephone set or even by modifying the transmitted data on this line as the charging data when these pass on the line. To respond to such attacks, the applicant has developed line security tools consisting of establishing authentication between a telephone set and an associated module mounted on the transmission line connecting the telephone set to the telephone exchange and interrupting communication by attempted fraud.
Ces outils sont basés sur l'installation sur la ligne téléphonique d'un module de contrôle associé à chaque poste téléphonique à sécuriser. Le poste téléphonique présente une structure et des circuits particuliers qui permettent l'échange entre le module de contrôle et le poste téléphonique d'informations d' authentification qui sont comparées pour vérifier que le poste téléphonique est autorisé à être utilisé.These tools are based on the installation on the telephone line of a control module associated with each telephone set to be secured. The telephone set has a particular structure and circuits which allow the exchange between the control module and the telephone set of authentication information which is compared to verify that the telephone set is authorized to be used.
La présente invention se propose de perfectionner de tels outils en utilisant un dispositif de sécurisation qui soit tout à la fois particulièrement performant, simple et peu coûteux à mettre en œuvre.The present invention proposes to perfect such tools by using a securing device which is at the same time particularly efficient, simple and inexpensive to implement.
Le système de téléphonie publique sécurisé selon l'invention est donc du type comportant au moins un téléphone public relié à un réseau de télécommunication et un dispositif de sécurisation apte à superviser les échanges d'informations entre ce téléphone public et au moins une partie des numéros appelés.The secure public telephone system according to the invention is therefore of the type comprising at least one public telephone connected to a telecommunications network and a security device capable of supervising the exchange of information between this public telephone and at least part of the numbers called.
Selon l'invention, le système de téléphonie publique sécurisé est caractérisé en ce que le dispositif de sécurisation est formé par un serveur à distance, ce serveur pouvant être connecté audit téléphone public par l'intermédiaire dudit réseau de télécommunication et étant adapté pour faire transiter les informations échangées entre le téléphone public et les numéros appelés. Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le téléphone public comporte des moyens pour transmettre les communications au serveur sous la forme de données numérisées codées. Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le téléphone public est équipé du protocole de communication IP et en ce que les sessions d'échanges d'informations entre le téléphone public et le serveur utilisent ce protocole IP, la voix étant codée en VoIP. Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le téléphone comporte des moyens de sélection aptes à diriger une partie des appels vers le serveur, les appels dirigés vers le serveur étant sélectionnés selon des critères prédéterminés. Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, les critères de sélection des appels dirigés vers ledit serveur comprennent le coût des communications.According to the invention, the secure public telephone system is characterized in that the security device is formed by a remote server, this server being able to be connected to said public telephone by means of said telecommunications network and being adapted to transit the information exchanged between the public telephone and the numbers called. According to another characteristic of the secure public telephone system which is the subject of the present invention, the public telephone comprises means for transmitting communications to the server in the form of coded digital data. According to another characteristic of the secure public telephone system which is the subject of the present invention, the public telephone is equipped with the IP communication protocol and in that the information exchange sessions between the public telephone and the server use this IP protocol, the voice being coded in VoIP. According to another characteristic of the secure public telephone system which is the subject of the present invention, the telephone comprises selection means capable of directing part of the calls to the server, the calls directed to the server being selected according to predetermined criteria. According to another characteristic of the secure public telephone system which is the subject of the present invention, the criteria for selecting calls directed to said server include the cost of communications.
Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le téléphone public est connecté au réseau de télécommunication par l'intermédiaire d'un central téléphonique et ce central comprend des moyens aptes à refuser toute communication directe avec un numéro d'appel répondant aux critères prédéterminés de sélection selon lesquels cette communication doit transiter par le serveur.According to another characteristic of the secure public telephone system which is the subject of the present invention, the public telephone is connected to the telecommunications network by means of a telephone exchange and this exchange includes means capable of refusing any direct communication with a telephone number. call meeting the predetermined selection criteria according to which this communication must pass through the server.
Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le téléphone public adresse les appels ne répondant pas aux critères prédéterminés de sélection, sans traitement particulier et en particulier sans codage numérique de la voie.According to another characteristic of the secure public telephone system object of the present invention, the public telephone addresses calls that do not meet the criteria predetermined selection, without any particular processing and in particular without digital coding of the channel.
Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le serveur comprend des moyens aptes à synchroniser et à réguler les sessions d'échanges d'informations entre le téléphone public et les numéros appelés transitant par le serveur.According to another characteristic of the secure public telephone system which is the subject of the present invention, the server comprises means capable of synchronizing and regulating the sessions for exchanging information between the public telephone and the numbers called passing through the server.
Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le serveur comprend des moyens aptes à authentifier les sessions d'échanges d'informations entre le téléphone public et les numéros appelés transitant par le serveur.According to another characteristic of the secure public telephone system which is the subject of the present invention, the server comprises means capable of authenticating the sessions for exchanging information between the public telephone and the numbers called passing through the server.
Selon une autre caractéristique du système de téléphonie publique sécurisé objet de la présente invention, le serveur comporte des moyens appropriés pour transférer des données au téléphone public parallèlement aux sessions d'échanges d'informations entre ledit téléphone et les numéros appelés transitant par le serveur, ces données concernant notamment la taxation des sessions et les informations liées au fonctionnement du dudit téléphoneAccording to another characteristic of the secure public telephone system which is the subject of the present invention, the server comprises appropriate means for transferring data to the public telephone in parallel with the information exchange sessions between said telephone and the numbers called passing through the server, these data concerning in particular the taxation of sessions and information related to the operation of said telephone
D'autres caractéristiques et avantages de la présente invention apparaîtront mieux à la lecture de la description qui suit d'un mode de réalisation de l'invention donné à titre d'exemple non limitatif. La description se réfère aux figures annexées sur lesquelles :Other characteristics and advantages of the present invention will appear better on reading the following description of an embodiment of the invention given by way of non-limiting example. The description refers to the appended figures in which:
- la figure 1 est une vue simplifiée présentant le système de téléphonie publique sécurisé selon l'invention ; - la figure 2 est un bloc diagramme précisant le fonctionnement du système de téléphonie publique sécurisé selon l'invention.- Figure 1 is a simplified view showing the secure public telephone system according to the invention; - Figure 2 is a block diagram detailing the operation of the secure public telephone system according to the invention.
Sur la figure 1 apparaît représenté un téléphone référencé 10 qui appartient à un réseau de téléphonie publique.In Figure 1 appears shown a telephone referenced 10 which belongs to a public telephone network.
Un tel réseau comprend généralement entre plusieurs dizaines à plusieurs milliers de téléphones, voire plusieurs dizaines de milliers, suivant sa couverture territoriale.Such a network generally comprises between several tens to several thousand telephones, or even several tens of thousands, depending on its territorial coverage.
Le téléphone 10 est de façon classique destiné à être utilisé en libre service par des usagers, lesquels moyennant paiement, peuvent effectuer des communications téléphoniques en direction de postes d'abonnés 5, consulter des services de type Audiotel 3, ou encore accéder au Web et à l'Internet ou à des serveurs d'informations résidant sur des réseaux privés. Le poste téléphonique 10 comprend de façon connue un boîtier 101 muni d'un clavier 102 pour composer un numéro d'appel, un dispositif d'affichage 103 par exemple à cristaux liquides et un combiné téléphonique 104. Le poste téléphonique 10 comprend en outre un dispositif de lecture/ écriture de cartes à mémoire dont on voit la fente d'introduction 105. Bien entendu le poste téléphonique peut être équipé d'un système d'encaissement à pièces en complément ou en remplacement du dispositif de lecture /écriture des cartes de paiement.The telephone 10 is conventionally intended to be used in self-service by users, who, for a fee, can make telephone communications to subscriber stations 5, consult Audiotel-type services 3, or even access the Web and the Internet or information servers residing on private networks. The telephone set 10 comprises, in known manner, a box 101 provided with a keyboard 102 for dialing a call number, a display device 103, for example with liquid crystal, and a telephone handset 104. The telephone set 10 further comprises a memory card reading / writing device, the insertion slot 105 of which can be seen. Of course, the telephone set can be equipped with a coin cashing system in addition to or in replacement of the card reading / writing device payment.
Le téléphone 10 est connecté à un réseau de communication 1 qui, dans l'exemple illustré à la figure 1, est le réseau téléphonique public commuté RTPC ou PSTN (acronyme de Public Switching Téléphone Network) .The telephone 10 is connected to a communication network 1 which, in the example illustrated in FIG. 1, is the public switched telephone network PSTN or PSTN (acronym for Public Switching Telephone Network).
La connexion du téléphone 10 au réseau RTPC 1 s'effectue au moyen d'une liaison filaire 2 (à deux fils) qui débouche dans un central téléphonique 4 qui est soit un central local de rattachement CLR ou un centre à autonomie d'acheminement CAA.The connection of the telephone 10 to the PSTN network 1 is carried out by means of a wired link 2 (with two wires) which leads into a telephone exchange 4 which is either a local exchange center CLR or a center with autonomous routing CAA.
Ce réseau 1 pourrait également être constitué par un réseau de type numérique ISDN (Integrated Services Digital Network). Par ailleurs, le téléphone public 10 comporte des ressources matérielles et logicielles permettant son fonctionnement et notamment de débiter les usagers des montants correspondants aux coûts des communications ou des services utilisés, les usagers pouvant payer soit au moyen de cartes de paiement, cartes téléphoniques ou bancaires, soit au moyen de pièces de monnaie.This network 1 could also be constituted by a network of digital type ISDN (Integrated Services Digital Network). Furthermore, the public telephone 10 includes hardware and software resources allowing its operation and in particular to debit the users of the amounts corresponding to the costs of the communications or services used, the users being able to pay either by means of payment cards, telephone or bank cards. , or by means of coins.
Ces ressources matérielles et logicielles sont aujourd'hui bien connues et ne nécessitent donc pas de plus amples descriptions.These hardware and software resources are now well known and therefore do not require further description.
On précisera toutefois que le téléphone 10 comporte une unité électronique de commande et de contrôle formée par un microprocesseur ou microcontrôleur, non figuré, comportant classiquement une unité centrale (UC) des interfaces entrées/ sorties (I/O) et de différents types de mémoires (RAM, ROM, EPROM,...). Ce microcontrôleur est donc à même de commander et de superviser le fonctionnement de l'appareil téléphonique 10 selon des programmes appropriés.However, it will be specified that the telephone 10 includes an electronic command and control unit formed by a microprocessor or microcontroller, not shown, conventionally comprising a central unit (UC) of the input / output interfaces (I / O) and of various types of memories. (RAM, ROM, EPROM, ...). This microcontroller is therefore able to control and supervise the operation of the telephone apparatus 10 according to appropriate programs.
Ainsi, la fente 105 coopèrent avec des moyens de guidage non figurés qui amène la carte dans une position de traitement où les plages externes de contact électrique de la carte sont connectées aux éléments de connexion de la tête de lecture/ écriture également non figurée. Un circuit de traitement contrôlé par le microcontrôleur commande la lecture ou l'écriture de nouvelle information dans la mémoire de la carte.Thus, the slot 105 cooperates with non-illustrated guide means which brings the card into a processing position where the external electrical contact pads of the card are connected to the connection elements of the read / write head also not shown. A processing circuit controlled by the microcontroller controls the reading or writing of new information in the memory of the card.
En effet, dans le cas des cartes prépayées téléphoniques, une première zone de mémoire contient une information d'identification et une seconde zone de mémoire contient les soldes successifs de la carte. Dans le cas où la mémoire de la carte est type PROM, celle-ci contient un certain nombre de points de mémoire qui sont initialement vierge (état 0) . Chaque point de mémoire correspond à un montant unitaire. Le solde est modifier en faisant passer de façon irréversible de l'état 0 à l'état 1 un nombre entier de points correspondant au montant à débiter associé à l'impulsion de taxation émise par le microcontrôleur. Le passage de l'état 0 à l'état 1 est obtenu en appliquant aux points mémoire considérés une tension d'écriture.Indeed, in the case of prepaid telephone cards, a first memory area contains identification information and a second memory area contains the successive balances of the card. In the case where the card memory is PROM type, the card contains a certain number of memory points which are initially blank (state 0). Each memory point corresponds to a unit amount. The balance is modified by irreversibly passing from state 0 to state 1 an integer number of points corresponding to the amount to be debited associated with the charging pulse sent by the microcontroller. The transition from state 0 to state 1 is obtained by applying a write voltage to the memory points considered.
De plus, le téléphone 10 est équipé du protocole de communication IP (Internet Protocol) ainsi que des protocoles TCP ou UDP conformes aux recommandations techniques de l'IETF («internet Engineering Task Force »). Enfin, la couche physique du téléphone 10 est réalisée par des modems analogiques (ou numériques selon la nature du réseau 1).In addition, the telephone 10 is equipped with the IP communication protocol (Internet Protocol) as well as TCP or UDP protocols in accordance with the technical recommendations of the IETF ("internet Engineering Task Force"). Finally, the physical layer of the telephone 10 is produced by analog (or digital depending on the nature of the network 1) modems.
La connexion du téléphone 10 au réseau RTPC 1 est soumis à des restrictions d'utilisation définies avec l'opérateur de ce réseau. Ces restrictions seront précisées par la suite. Ces restrictions sont mises opérées dans le central 4 du réseau RTPC 1 à partir de programmes appropriés pilotant les différents matériels mis en oeuvre. Ces matériels et ce type de programmes sont connues et ne nécessitent donc pas d'autres précisions.The connection of the telephone 10 to the PSTN network 1 is subject to restrictions of use defined with the operator of this network. These restrictions will be specified below. These restrictions are implemented in the central office 4 of the PSTN network 1 using appropriate programs controlling the various materials used. These materials and this type of program are known and therefore do not require further details.
Le serveur 20 est disposé dans un lieu non accessible aux usagers, par exemple dans les locaux de l'opérateur du réseau de téléphonie publique. La connexion du serveur 20 au réseau RTPC 1 s'effectue au moyen d'une liaison sécurisée appropriée, permettant notamment de traiter de multiples communications simultanément.The server 20 is arranged in a location which is not accessible to users, for example on the premises of the operator of the public telephone network. The connection of the server 20 to the PSTN network 1 is carried out by means of an appropriate secure link, allowing including handling multiple communications simultaneously.
Ce serveur 20 est chargé, comme cela sera détaillé ci-après d'établir des sessions d'échange d'informations fiables et authentifiées qui consiste par exemple à identifier de façon certaine les téléphones 10 lors d'un échange d'informations ou encore à encrypter des données afin de sécuriser la communication en cas de besoin.This server 20 is responsible, as will be detailed below, for establishing reliable and authenticated information exchange sessions which consists, for example, in certain identification of the telephones 10 during an information exchange or even in encrypt data to secure communication when needed.
Ce serveur 20 est formé par un ordinateur, par exemple de type PC fonctionnant sous Windows NT (marque déposée). Tout appel parvient à un port d'entrée du serveur non figuré qui est écouté en permanence, puis analysé par une application logicielle appropriée par exemple en langage Java (marque déposée) et routé ensuite vers le destinataire demandé : abonné ou serveur délivrant un service.This server 20 is formed by a computer, for example of the PC type operating under Windows NT (registered trademark). Any call arrives at an input port of the server which is not shown, which is listened to continuously, then analyzed by an appropriate software application for example in Java language (registered trademark) and then routed to the requested recipient: subscriber or server delivering a service.
En se reportant à la figure 2, le procédé de sécurisation des appels selon l'invention va maintenant être décrit.Referring to FIG. 2, the method for securing calls according to the invention will now be described.
Pour sécuriser l'usage du téléphone 10 et éviter des fraudes au préjudice de l'opérateur de téléphonie publique, il est donc important d'interdire les utilisations non autorisées du téléphoneTo secure the use of the telephone 10 and avoid fraud to the detriment of the public telephone operator, it is therefore important to prohibit unauthorized use of the telephone
10 et de la ligne téléphonique qui relie celui-ci au réseau RTPC c'est-à-dire au CLR ou au CAA.10 and the telephone line which connects it to the PSTN network, that is to say to the CLR or the CAA.
Cette interdiction peut porter sur tous les appels émis par le téléphone 10 ou bien encore ne porter que sur une partie des appels.This ban can relate to all calls made by telephone 10 or even relate only to part of the calls.
Conformément à la présente invention, le procédé de sécurisation consiste donc à différentier les appels en deux groupes, celui des appels devant être sécurisés et celui des appels pour lesquels la sécurisation n'est pas nécessaire et à appliquer à chaque type d'appel un traitement approprié.In accordance with the present invention, the security method therefore consists in differentiating the calls into two groups, that of the calls to be secured and that of the calls for which security is not necessary and to apply appropriate treatment to each type of call.
Les critères pour sécuriser un appel peuvent être divers et variés et adaptés notamment par l'opérateur du réseau de téléphonie publique à ses besoins spécifiques. Un critère peut par exemple être le coût de la communication, dès que le coût de la communication à destination d'un abonné ou d'un serveur dépasse un certain montant alors la communication est sécurisée.The criteria for securing a call can be diverse and varied and adapted in particular by the operator of the public telephone network to his specific needs. A criterion can for example be the cost of the communication, as soon as the cost of the communication to a subscriber or to a server exceeds a certain amount then the communication is secure.
Comme cela a été précisé ci-dessus le téléphone 10 est adapté pour accéder de façon payante à des abonnés ou à des services. Le prix payé par l'usager pour ces prestations est bien évidemment défini par l'opérateur de téléphonie publique en fonction de leur coût de revient Ainsi, le prix d'un appel local ne sera pas le même que celui d'un appel national ou international, de même pour les services.As specified above, the telephone 10 is suitable for paying access to subscribers or to services. The price paid by the user for these services is obviously defined by the public telephone operator according to their cost price. Thus, the price of a local call will not be the same as that of a national call or international, the same for services.
Conformément aux règles internationales, le plan de numérotation des services et des abonnés téléphoniques obéit à un ensemble de règles établies par les organismes de normalisation l'ETSI, l'ECTRA et l'UIT (cf. les recommandations E.164, E.213 et X.121).In accordance with international rules, the numbering plan for services and telephone subscribers follows a set of rules established by the standardization bodies ETSI, ECTRA and ITU (cf. recommendations E.164, E.213 and X.121).
La différentiation entre les appels à sécuriser et les autres peut donc être facilement établie à partir des seuls numéros d'appel.The differentiation between the calls to be protected and the others can therefore be easily established from only the telephone numbers.
La première étape du procédé consiste donc à détecter la prise de ligne lors du décrochage du combiné 104 et la numérotation qui s'en suit. Lorsqu'un usager décroche le combinéThe first step of the method therefore consists in detecting the line seizure when the handset 104 is lifted and the numbering which follows. When a user picks up the handset
104, le signal de décroché est perçu par des moyens appropriés lesquels en informent le microprocesseur par l'envoi d'un signal caractéristique, celui-ci initialise alors le déroulement du programme de sécurisation de la ligne selon l'invention.104, the off-hook signal is perceived by appropriate means which inform the microprocessor thereof by sending a signal characteristic, it then initiates the progress of the line securing program according to the invention.
Pendant la saisie par l'usager du numéro de téléphone appelé, le système de mise en oeuvre du procédé selon l'invention enregistre ce numéro formé, dans le cas d'un poste téléphonique à fréquences vocales, par une suite de signaux DTMF selon la recommandation Q.23 de FUIT (Union Internationale des télécommunications) et les convertit en code binaire pour être traité par le microcontrôleur. ( Le microcontrôleur opère alors l'analyse du numéro appelé et détermine, à partir de tables appropriées stockées dans une mémoire appropriée (EPROM ou RAM non volatile), il s'agit d'un appel à sécuriser parce qu'appartenant par exemple au groupe des communications à coûts élevés (appels nationaux ou internationaux, serveurs...) ou bien s'il s'agit d'un appel pouvant ne pas être sécurisé parce que de faible coût (appel local, numéro d'urgence, etc.).During the entry by the user of the telephone number called, the system for implementing the method according to the invention records this number formed, in the case of a voice frequency telephone set, by a series of DTMF signals according to the recommendation F.23 from FUIT (International Telecommunication Union) and converts them into binary code to be processed by the microcontroller. ( The microcontroller then operates the analysis of the called number and determines, from appropriate tables stored in an appropriate memory (EPROM or non-volatile RAM), it is a call to be secured because it belongs for example to the group high cost communications (national or international calls, servers ...) or if it is a call that may not be secure because of low cost (local call, emergency number, etc.) .
S'il s'agit d'un numéro d'appel ne nécessitant pas de sécurisation (appel local...), alors le numéro de téléphone saisi par l'usager sur le clavier du poste téléphonique est adressé au central téléphonique CLR/CAA afin que ce dernier établisse grâce à ses commutateurs, une ligne avec le numéro téléphonique appelé et adresse à ce dernier un signal de sonnerie.If it is a call number that does not require security (local call, etc.), then the telephone number entered by the user on the keypad of the telephone set is sent to the CLR / CAA telephone exchange. so that the latter establishes through its switches, a line with the telephone number called and sends the latter a ring signal.
Le microcontrôleur supervise la ligne pour déterminer si la partie appelée a bien décroché et qu'une communication a bien été établie. Si telle est bien le cas, alors des impulsions tarifaires sont régulièrement adressées au système d'encaissement que ce soit au lecteur de carte pour griller les unités correspondantes d'une carte téléphonique prépayée ou encore au sélecteur de pièces de monnaie pour encaisser les pièces. Ces impulsions tarifaires sont produites par le microcontrôleur à partir de tables de tarif stockées dans une mémoire appropriée du téléphone ou bien encore par le central téléphonique 4 et reçues sur la ligne parallèlement à la communication en cours.The microcontroller supervises the line to determine whether the called party has picked up and that communication has been established. If this is the case, then price pulses are regularly sent to the collection system, whether it is to the card reader to toast the corresponding units of a prepaid telephone card or to the coin selector of change to cash coins. These tariff pulses are produced by the microcontroller from tariff tables stored in an appropriate memory of the telephone or even by the telephone exchange 4 and received on the line parallel to the communication in progress.
L'appel ayant été identifié comme devant être sécurisé (appel national ou international, serveur Audiotel...), le microcontrôleur déclenche alors un traitement approprié de l'appel.The call having been identified as having to be secured (national or international call, Audiotel server, etc.), the microcontroller then triggers appropriate processing of the call.
Ce traitement consiste à faire transiter les échanges d'informations avec le numéro de téléphone appelé que ce soit de la voix ou des données par le serveur GATEWAY 20.This processing consists in passing the exchange of information with the telephone number, whether voice or data, through the GATEWAY 20 server.
Pour ce faire les informations transmises par l'usager sous forme non numérique comme la voix, sont numérisées par un algorithme de traitement du signal approprié de type CODEC, puis codées et compressées selon les recommandations G.723.1 (liée à H.323) en MP-MLQ/ACELP à 5,3 et 6, 3 kbit/ s ou G.728 en LD- CELP à 16kbit/s ou G.729 en CS-ACELP à 8kbit/s. Bien évidemment, ces normes de l'UIT ne sont données qu'à titre indicatif. Les informations ainsi codées sont adressées par paquets au serveur 20 via un modem et le réseau RTPC, à travers une session utilisant les protocoles IP et UDP, à charge pour ce serveur de les dirigées vers le numéro appelé par l'usager.To do this, the information transmitted by the user in non-digital form such as voice, is digitized by an appropriate signal processing algorithm of the CODEC type, then coded and compressed according to the recommendations G.723.1 (linked to H.323) in MP-MLQ / ACELP at 5.3 and 6.3 kbit / s or G.728 in LD-CELP at 16 kbit / s or G.729 in CS-ACELP at 8 kbit / s. Obviously, these ITU standards are for reference only. The information thus coded is sent in packets to the server 20 via a modem and the PSTN network, through a session using the IP and UDP protocols, with the responsibility for this server of directing them to the number called by the user.
Ce traitement de la voix est appelé VoIP. Bien évidemment toute autre méthode disponible est également utilisable comme le VoFR (Voice over Frame Relay) ou VToA (Voice Telephony over ATM).This voice processing is called VoIP. Obviously any other available method can also be used such as VoFR (Voice over Frame Relay) or VToA (Voice Telephony over ATM).
Lorsque le serveur GATEWAY 20 reçoit l'appel en provenance du téléphone 10 il traite la requête par une application appropriée permettant le contrôle et l'établissement d'une session au sens protocolaire du terme. Une interface standard (« socket ») est alors ouverte et la requête est ré-émise vers le numéro appelé après un traitement adapté à ce dernier. En particulier, s'il le poste appelé est un numéro d'abonné ne disposant que d'un poste téléphonique classique, le serveur procède via des cartes de conversion au traitement inverse de celui opéré par le téléphone et renvoie vers ce poste un signal de voix décodé.When the GATEWAY server 20 receives the call from the telephone 10 it processes the request by an appropriate application allowing the control and the establishment of a session in the protocol sense of the term. A standard interface ("socket") is then opened and the request is re-sent to the number called after processing adapted to it. In particular, if the station called is a subscriber number with only a conventional telephone station, the server proceeds via conversion cards to the reverse processing of that operated by the telephone and sends a signal to this station. decoded voice.
Les informations en provenance du numéro appelé transitent également par le serveur 20 et font donc l'objet d'un traitement symétrique à celui des données reçues par ce numéro, elles sont codées par le serveur 20 et à leur arrivée décodées par le téléphone public 10.The information originating from the number called also passes through the server 20 and is therefore the subject of a processing symmetrical to that of the data received by this number, they are coded by the server 20 and on their arrival decoded by the public telephone 10 .
Dans le cadre de la présente invention, le serveur 20 présentent donc un certain nombre de fonctions assurées par des moyens matériels et logiciels appropriés. Une première fonction consiste à orienter les informations reçues du téléphone 10 vers le numéro d'appel demandé, il s'agit là d'une fonction de re-routage des appels. Le serveur 20 peut choisir pour opérer le re-routage le réseau de télécommunication le plus approprié, cela pouvant être le réseau RTPC 1 ou bien encore tout autre réseau auquel le serveur 20 peut avoir accès comme par exemple le réseau Internet.In the context of the present invention, the server 20 therefore has a certain number of functions provided by appropriate hardware and software means. A first function consists in directing the information received from the telephone 10 towards the requested call number, this is a call re-routing function. The server 20 can choose to operate the most suitable telecommunication network for re-routing, this may be the PSTN network 1 or even any other network to which the server 20 may have access, such as the Internet network for example.
Une autre fonction consiste, quant cela est nécessaire, à traduire les données transmises au format des postes d'abonnés ou serveurs appelés. Une autre fonction est de synchroniser et de réguler les sessions d'échanges d'informations entre le téléphone public et les numéros appelés. Une autre fonction est encore d'établir des sessions d'échanges d'informations fiables et authentifiées ou encore d'encrypter tout ou partie des données échangées.Another function consists, when necessary, in translating the data transmitted in the format of the subscriber stations or servers called. Another function is to synchronize and regulate the information exchange sessions between the public telephone and the numbers called. Another function is still to establish reliable information exchange sessions and authenticated or to encrypt all or part of the data exchanged.
Parallèlement au traitement des informations échangées entre le téléphone public 10 et le numéro de téléphone appelé, le téléphone 10 et le serveur 20 s'adressent des données de sécurisation qui peuvent être cryptées par des algorithmes appropriés comme le SSL (Socket Secure Layer) et qui garantissent que la session traitées par le serveur GATEWAY 20 est bien établie avec le téléphone public 10 et non pas avec un téléphone connecté directement sur la ligne de liaison 2.In addition to processing the information exchanged between the public telephone 10 and the telephone number called, the telephone 10 and the server 20 send security data which can be encrypted by appropriate algorithms such as SSL (Socket Secure Layer) and which guarantee that the session processed by the GATEWAY server 20 is well established with the public telephone 10 and not with a telephone connected directly to the connection line 2.
Le serveur 20 peut également fournir des informations utiles au fonctionnement du téléphone 10 comme par exemple les impulsions de taxation de la communication en cours, ainsi le téléphone 10 n'a plus à gérer de tables de tarifs pour tous les appels sécurisés.The server 20 can also provide information useful for the operation of the telephone 10 such as for example the charging pulses for the call in progress, thus the telephone 10 no longer has to manage rate tables for all secure calls.
En effet, parallèlement aux transfert de données entre le téléphone 10 et le poste appelé via le serveur 20, le microcontrôleur du téléphone procède comme précédemment vis-à-vis d'un appel local, à savoir qu'il supervise la communication et adresse régulièrement des impulsions tarifaires au système d'encaissement à cartes ou à pièces et ce, selon le coût de la communication déterminée à partir d'une table de tarif appropriée à l'appel, table tarifaire stockée dans une mémoire appropriée du téléphone public ou bien encore à partir des informations tarifaires fournies par le serveur 20 et communiquées au téléphone 10.Indeed, in parallel with the transfer of data between the telephone 10 and the station called via the server 20, the microcontroller of the telephone proceeds as previously with respect to a local call, namely that it supervises the communication and addresses regularly tariff pulses to the card or coin cashing system and this, depending on the cost of the communication determined from a tariff table suitable for the call, tariff table stored in an appropriate memory of the public telephone or else from the tariff information provided by the server 20 and communicated to the telephone 10.
Pour renforcer encore la sécurité du système de téléphonie public selon l'invention, la connexion du téléphone 10 au réseau RTPC 1 est soumise à des restrictions d'utilisation définies avec l'opérateur de ce réseau. Un exemple de restriction consiste en ce que tous les appels devant être sécurisés et donc devant transiter par le serveur 20, ne puissent être pris en compte et donc acheminés par le central 4. Ainsi si un fraudeur accède à la ligne de liaison 2, il ne pourra accéder qu'à un nombre limité de numéros de téléphone. Un autre exemple de restriction, consiste à re-diriger tout appel reçu par le central depuis la ligne 2 et concernant un numéro à sécuriser vers le serveur 20, lequel s'il détecte un appel ne venant pas du téléphone 10 est alors à même de déclencher une alerte appropriée. Bien évidemment la présente invention n'est pas limité au seul mode de réalisation illustré, lequel n'a été donné qu'à titre d'exemple. To further strengthen the security of the public telephone system according to the invention, the connection of the telephone 10 to the PSTN network 1 is subject to restrictions of use defined with the operator of this network. An example of restriction is that that all calls that must be secured and therefore must pass through the server 20, cannot be taken into account and therefore routed by the exchange 4. Thus if a fraudster accesses the connection line 2, he can only access one limited number of telephone numbers. Another example of restriction consists in redirecting any call received by the central office from line 2 and concerning a number to be secured to the server 20, which if it detects a call not coming from the telephone 10 is then able to trigger an appropriate alert. Obviously the present invention is not limited to the single embodiment illustrated, which has been given only by way of example.

Claims

REVENDICATIONS
1. Système de téléphonie publique sécurisé comportant au moins un téléphone public (10) relié à un réseau de télécommunication (1) et un dispositif de sécurisation apte à superviser les échanges d'informations entre ledit téléphone public et au moins une partie des numéros appelés, caractérisé en ce que ledit dispositif de sécurisation est formé par un serveur à distance (20), ledit serveur (20) pouvant être connecté audit téléphone public par l'intermédiaire dudit réseau de télécommunication (1) et étant adapté pour faire transiter les informations échangées entre ledit téléphone et les numéros appelés.1. Secure public telephone system comprising at least one public telephone (10) connected to a telecommunications network (1) and a security device capable of supervising the exchange of information between said public telephone and at least part of the numbers called , characterized in that said security device is formed by a remote server (20), said server (20) being able to be connected to said public telephone via said telecommunication network (1) and being adapted to transmit information exchanged between said telephone and the numbers called.
2. Système de téléphonie publique sécurisé selon la revendication 1, caractérisé en ce que ledit téléphone (10) comporte des moyens pour transmettre les communications audit serveur (20) sous la forme de données numérisées codées.2. Secure public telephone system according to claim 1, characterized in that said telephone (10) comprises means for transmitting communications to said server (20) in the form of coded digitized data.
3. Système de téléphonie publique sécurisé selon la revendication 2, caractérisé en ce que ledit téléphone (10) est équipé du protocole IP de communication Internet et en ce que les sessions d'échanges d'informations entre ledit téléphone (10) et ledit serveur (20) utilisent ledit protocole IP, la voix étant codée en VoIP.3. Secure public telephone system according to claim 2, characterized in that said telephone (10) is equipped with the Internet communication IP protocol and in that the information exchange sessions between said telephone (10) and said server (20) use said IP protocol, the voice being encoded in VoIP.
4. Système de téléphonie publique sécurisé selon l'une quelconque des revendications précédentes, caractérisé en ce que ledit téléphone (10) comporte des moyens de sélection aptes à diriger une partie des appels vers ledit serveur (20), les appels dirigés vers ledit serveur (20) étant sélectionnés selon des critères prédéterminés. 4. Secure public telephone system according to any one of the preceding claims, characterized in that said telephone (10) comprises selection means capable of directing part of the calls to said server (20), calls directed to said server (20) being selected according to predetermined criteria.
5. Système de téléphonie publique sécurisé selon la revendication 4, caractérisé en ce que les critères de sélection des appels dirigés vers ledit serveur comprennent le coût des communications . 5. Secure public telephone system according to claim 4, characterized in that the selection criteria for calls directed to said server include the cost of communications.
6. Système de téléphonie publique sécurisé selon l'une quelconque des revendications précédentes, caractérisé en ce que ledit téléphone (10) est connecté au réseau de télécommunication (1) par l'intermédiaire d'un central téléphonique (4) et en que ledit central (4) comprend des moyens aptes à refuser toute communication directe avec un numéro d'appel répondant auxdits critères de sélection prédéterminés.6. Secure public telephone system according to any one of the preceding claims, characterized in that said telephone (10) is connected to the telecommunications network (1) via a telephone exchange (4) and in that said central (4) comprises means capable of refusing any direct communication with a telephone number meeting said predetermined selection criteria.
7. Système de téléphonie publique sécurisé selon l'une quelconque des revendications précédentes, caractérisé en ce que ledit téléphone (10) adresse les appels ne répondant pas auxdits critères de sélection prédéterminés, sans traitement particulier et en particulier sans codage numérique de la voie.7. Secure public telephone system according to any one of the preceding claims, characterized in that said telephone (10) addresses calls that do not meet said predetermined selection criteria, without special processing and in particular without digital coding of the channel.
8. Système de téléphonie publique sécurisé selon l'une quelconque des revendications précédentes, caractérisé en ce que ledit serveur (20) comprend des moyens aptes à synchroniser et à réguler les sessions d'échanges d'informations entre ledit téléphone (10) et les numéros appelés transitant par ledit serveur (20).8. Secure public telephone system according to any one of the preceding claims, characterized in that said server (20) comprises means capable of synchronizing and regulating information exchange sessions between said telephone (10) and the called numbers transiting through said server (20).
9. Système de téléphonie publique sécurisé selon l'une quelconque des revendications précédentes, caractérisé en ce que ledit serveur (20) comprend des moyens aptes à authentifier les sessions d'échanges d'informations entre ledit téléphone (10) et les numéros appelés transitant par ledit serveur (20).9. Secure public telephone system according to any one of the preceding claims, characterized in that said server (20) comprises means capable of authenticating information exchange sessions between said telephone (10) and the numbers called passing through. by said server (20).
10. Système de téléphonie publique sécurisé selon l'une quelconque des revendications précédentes, caractérisé en ce que ledit serveur (20) comporte des moyens appropriés pour transférer des données audit téléphone (10) parallèlement aux sessions d'échanges d'informations entre ledit téléphone et les numéros appelés transitant par ledit serveur (20), lesdites données concernant notamment la taxation desdites sessions. 10. Secure public telephone system according to any one of the preceding claims, characterized in that said server (20) includes means suitable for transferring data to said telephone (10) parallel to the information exchange sessions between said telephone and the numbers called passing through said server (20), said data relating in particular to the charging of said sessions.
EP02700507A 2001-02-22 2002-02-20 Secure public telephony system Withdrawn EP1410616A2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0102532 2001-02-22
FR0102532A FR2821227B1 (en) 2001-02-22 2001-02-22 SECURE PUBLIC TELEPHONY SYSTEM
PCT/IB2002/000502 WO2002067564A2 (en) 2001-02-22 2002-02-20 Secure public telephony system

Publications (1)

Publication Number Publication Date
EP1410616A2 true EP1410616A2 (en) 2004-04-21

Family

ID=8860403

Family Applications (1)

Application Number Title Priority Date Filing Date
EP02700507A Withdrawn EP1410616A2 (en) 2001-02-22 2002-02-20 Secure public telephony system

Country Status (4)

Country Link
EP (1) EP1410616A2 (en)
CA (1) CA2437586A1 (en)
FR (1) FR2821227B1 (en)
WO (1) WO2002067564A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2853174B1 (en) * 2003-03-27 2005-07-08 Schlumberger Systems & Service SECURE TELEPHONE SYSTEM
CA2546743C (en) 2003-12-15 2011-04-26 Bce Inc. Adapter for secure voip communications

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5812650A (en) * 1992-07-09 1998-09-22 Gammino; John R. Method and apparatus for intercepting potentially fraudulent
US5875236A (en) * 1995-11-21 1999-02-23 At&T Corp Call handling method for credit and fraud management
US5805686A (en) * 1995-12-22 1998-09-08 Mci Corporation Telephone fraud detection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO02067564A3 *

Also Published As

Publication number Publication date
FR2821227A1 (en) 2002-08-23
WO2002067564A3 (en) 2002-10-10
CA2437586A1 (en) 2002-08-29
WO2002067564A2 (en) 2002-08-29
FR2821227B1 (en) 2003-05-16

Similar Documents

Publication Publication Date Title
EP0463384B1 (en) Method of access to a cordless telephone service
US5351290A (en) Telecommunications fraud prevention system and method
MXPA06014682A (en) Centralized biometric authentication.
HU224267B1 (en) Procedure and system for providing a telecommunication service
CA2564463A1 (en) Voice over ip based biometric authentication
EP0424495A1 (en) Voice messaging for pay phone telephone systems.
AU2018217101B2 (en) Detection and prevention of unwanted calls in a telecommunications system
WO2001052476A2 (en) Architectures for clearing and settlement services between internet telephony clearinghouses
US7099652B2 (en) Originating a billed transaction for an origin telephony device
WO2006136733A1 (en) Ip telephony securing
US20020168962A1 (en) Customized service providing scheme
WO2002067564A2 (en) Secure public telephony system
US7525950B1 (en) Calling card system for voice and data transmission over a public network
FR2853174A1 (en) SECURE TELEPHONE SYSTEM
EP0827359B1 (en) Low-cost, automatic and transparent acces method and protocol for a telecommunication provider in ISDN
EP1489826A1 (en) Method for authentication in a terminal by the access to the content of a SIM card in a mobile telephone
AU2020102210A4 (en) ISMT- Voice Based Mobile Banking: INTELLIGENT SECURE MONEY TRANSFER USING BIOMETRIC INPUT VOICE BASED MOBILE BANKING
EP1430456B1 (en) Electronic payment system that is used to purchase goods or services offered by a merchant server and the method used in one such system
CN1111329C (en) Communication method for intelligent public telephone system
FR2678459A1 (en) Method of authenticating a subscriber making a call, for telephone billing
Sastre et al. New electronic funds transfer services over ip
CN101485183A (en) Method and apparatus for providing and using a telephone calling card
WO2003085555A2 (en) System for automatically controlling display of information pages
WO2004093427A1 (en) Wireless public internet access system
FI122518B (en) Variable payment in service number

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20030917

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: AL LT LV MK RO SI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SCHLUMBERGER MALCO, INC.

Owner name: AXALTO S.A.

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SCHLUMBERGER MALCO, INC.

Owner name: SCHLUMBERGER SYSTEMES

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SCHLUMBERGER MALCO, INC.

Owner name: SCHLUMBERGER PAYPHONES S.A.S

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SCHLUMBERGER MALCO, INC.

Owner name: SPT PUBLICOM

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20070829