EP3100220A1 - Method for securing an electronic transaction - Google Patents

Method for securing an electronic transaction

Info

Publication number
EP3100220A1
EP3100220A1 EP15707823.9A EP15707823A EP3100220A1 EP 3100220 A1 EP3100220 A1 EP 3100220A1 EP 15707823 A EP15707823 A EP 15707823A EP 3100220 A1 EP3100220 A1 EP 3100220A1
Authority
EP
European Patent Office
Prior art keywords
transaction
phone
end user
audio
audio file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP15707823.9A
Other languages
German (de)
French (fr)
Inventor
Trond Lemberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Okay As
Original Assignee
Protectoria AS
Protectoria A S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Protectoria AS, Protectoria A S filed Critical Protectoria AS
Publication of EP3100220A1 publication Critical patent/EP3100220A1/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/305Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wired telephone networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/16Payments settled via telecommunication systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3272Short range or proximity payments by means of M-devices using an audio code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation

Definitions

  • the present invention regards a system and a method for securing an electronic transaction, and more particularly a system and a method for securing an electronic transaction between an application server and an end user.
  • Public Key Infrastructure would be a good technological candidate for protecting transactions, but the deployment rate in the market is relatively small due to large costs, cumbersome logistics and with a general lack of interoperability between heterogeneous deployments.
  • the system and method solves the above mentioned problems by securing an electronic transaction between an application server and an end user. This is done without sharing any secrets between any parties over insecure equipment, environments or networks.
  • the system and method enables the end user to verify an electronic transaction towards an application server, out of band of cyber criminals or other unauthorized parties, without requiring any other pre-requisite on the end user side than being able to take a phone call within the proximity of a computer with a working loudspeaker connected to a network.
  • An application server generates a transaction secret connected to this
  • the reason may be that the application has been trigged by a risk parameter, either within the application or provided by another source.
  • the application After generating the originating transaction secret, the application generates a proxy secret (PS) that correlates to the origin transaction secret, typically a random number or cryptographically made fingerprint, like a hash value of the transaction secret.
  • PS proxy secret
  • the application server is then generating and sending a Verification Order (VO) to the Transaction Verification Server (TVS).
  • VO Verification Order
  • TVS Transaction Verification Server
  • TVS is either directly or indirectly connected to at least one Telecom
  • the VO includes minimum a trustworthy phone number, order number, the PS, transaction details and a language indicator.
  • the VO may optionally include several control indicators (CI) and requirements for each of them, such as identification indicators (II) that shall be used as part of the transaction verification mechanism, call control indicators (CCI) or positioning indicators (PI) that shall be used before the transaction verification mechanism is being started.
  • CI control indicators
  • II identification indicators
  • CCI call control indicators
  • PI positioning indicators
  • Requirements for (II) may be using an integrated Voice Biometrics system, another type of biometrics system, PKI system, DTMF based authentication method e.g. from a phone banking system, or similar, where the end user already is enrolled.
  • Requirements for (CCI) may be denying transaction verification
  • Requirement for (PI) may be denying transaction verification service if the correlated geographical distance between web-IP of the end users computer and the end users mobile positioning parameter is outside an acceptable geographical distance stated in the VO.
  • the next step of the transaction verification mechanism is starting a process where TVS converts the relevant content delivered within the received VO into audio files with different purposes.
  • Audio file #1 comprises a synthetic voice of the ordered language reading the transaction details.
  • Audio file #2 comprises the (PS) as an instrumented audio message to be streamed as a sound circuit through the audio based equipment of the end user.
  • the audio file #2 is also equipped with error correction and redundancy mechanisms ensuring higher quality and efficiency of the subsequent audio transmission.
  • the next step of the process of the transaction verification mechanism is that TVS prepare for setting up the call to the user on the basis of the phone number retrieved from the VO.
  • the TVS is able to detect twin SIMs, call forwarding setup, conference call setup or other relevant issues from the telecom network depending of a peer agreement with the integrated Telecom Operator.
  • the TVS is able to detect the geographical positioning data for each of the end user devices -computer and mobile phone and if required in the VO providing a correlated distance between the devices.
  • TVS is setting up the call towards the end user.
  • TVS plays the audio file # 1 over the phone call presenting transactions details in the ordered language, upon optionally identifying the user by a specified method retrieved from the VO.
  • the end users identity validation task is provided from TVS to the integrated voice biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
  • the end users identity validation task is provided from TVS to the integrated biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification
  • the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
  • the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
  • the next step is that the TVS starts playing audio file #2, streaming the instrumented audio message through the users two devices verifying that the equipment is under both physical and logical control of the identified user.
  • the user By operating the physical movement of the phone, the user now verifies the transaction by letting the audio stream from the
  • loudspeaker of the computer be recorded by the microphone of the phone. a.
  • the user wants to cancel the transaction verification, the user only needs to hang up the phone call and thereby physically prohibit the transaction from being executed.
  • TVS is after decoding comparing the inbound audio with the outbound audio of audio file #2.
  • TVS analyse the bit stream and audio packets, adjust the inbound audio with error correction and redundancy measures of the TVS audio based protocol until perfect match possibly is achieved.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method for securing an electronic transaction between an application server and an end user, wherein said end user has access to a phone and a computer with a loudspeaker.

Description

Method for securing an electronic transaction Technical Field
The present invention regards a system and a method for securing an electronic transaction, and more particularly a system and a method for securing an electronic transaction between an application server and an end user.
Background of the invention
It has become evident that traditional security solutions are no longer able to protect transactions from being manipulated by unauthorized parties. Due to lack of efficient and strong session security mechanisms deployed in commonly used end user systems, Man-in-the Middle attacks has constantly become easier to execute, and are also being more and more sophisticated and scalable.
As a consequence, stealing money from banks and their customers by manipulating payment and money transfer transactions, manipulating electronic agreements and most likely also manipulating stock exchange transactions over insecure networks and devices, etc. has become a huge problem for people, businesses and even whole nations.
Theoretically, Public Key Infrastructure would be a good technological candidate for protecting transactions, but the deployment rate in the market is relatively small due to large costs, cumbersome logistics and with a general lack of interoperability between heterogeneous deployments.
Summary of the invention
It is therefore the purpose of the present invention, as it is stated in the set of claims, to solve the problems mentioned above.
The system and method solves the above mentioned problems by securing an electronic transaction between an application server and an end user. This is done without sharing any secrets between any parties over insecure equipment, environments or networks.
The system and method enables the end user to verify an electronic transaction towards an application server, out of band of cyber criminals or other unauthorized parties, without requiring any other pre-requisite on the end user side than being able to take a phone call within the proximity of a computer with a working loudspeaker connected to a network.
Detailed description
The mechanism of the invention works according to this description :
(1) An application server generates a transaction secret connected to this
transaction verification method. The reason may be that the application has been trigged by a risk parameter, either within the application or provided by another source. After generating the originating transaction secret, the application generates a proxy secret (PS) that correlates to the origin transaction secret, typically a random number or cryptographically made fingerprint, like a hash value of the transaction secret.
(2) The application server is then generating and sending a Verification Order (VO) to the Transaction Verification Server (TVS).
(3) TVS is either directly or indirectly connected to at least one Telecom
Operator (e.g. through a SIP trunk and possibly an ISUP interface) and connected to the application server and its IP network over a secured connection.
(4) The VO includes minimum a trustworthy phone number, order number, the PS, transaction details and a language indicator. In addition, the VO may optionally include several control indicators (CI) and requirements for each of them, such as identification indicators (II) that shall be used as part of the transaction verification mechanism, call control indicators (CCI) or positioning indicators (PI) that shall be used before the transaction verification mechanism is being started.
a. Requirements for (II) may be using an integrated Voice Biometrics system, another type of biometrics system, PKI system, DTMF based authentication method e.g. from a phone banking system, or similar, where the end user already is enrolled. As a sub-requirement for (II) there may be set quality parameters depending on a risk level of the particular transaction to be secured, e.g. for a medium risk transaction the Voice Biometrics system shall identify the end user by requiring the end user to only say its name or an agreed phrase as requested in the call from TVS, while for a high risk transaction the user is required to also repeat a unique random number retrieved from the VO and initially provided to the end user over synthetic voice generated by the TVS.
b. Requirements for (CCI) may be denying transaction verification
service if any twin SIM or call forwarding setup for the relevant end user is detected from the integrated telecom infrastructure. c. Requirement for (PI) may be denying transaction verification service if the correlated geographical distance between web-IP of the end users computer and the end users mobile positioning parameter is outside an acceptable geographical distance stated in the VO.
(5) The next step of the transaction verification mechanism is starting a process where TVS converts the relevant content delivered within the received VO into audio files with different purposes.
a. Audio file #1 comprises a synthetic voice of the ordered language reading the transaction details.
b. Audio file #2 comprises the (PS) as an instrumented audio message to be streamed as a sound circuit through the audio based equipment of the end user. The audio file #2 is also equipped with error correction and redundancy mechanisms ensuring higher quality and efficiency of the subsequent audio transmission.
c. In addition, there may be generated other audio files with synthetic voice, generated on the basis of (II) for Voice Biometrics.
(6) The next step of the process of the transaction verification mechanism is that TVS prepare for setting up the call to the user on the basis of the phone number retrieved from the VO.
a. In case the (CCI) is ordered, the TVS is able to detect twin SIMs, call forwarding setup, conference call setup or other relevant issues from the telecom network depending of a peer agreement with the integrated Telecom Operator.
b. In case the (PI) is ordered, the TVS is able to detect the geographical positioning data for each of the end user devices -computer and mobile phone and if required in the VO providing a correlated distance between the devices.
c. In case (CCI) or (PI) not meet requirement set in the VO, a negative receipt to application server is provided from TVS informing about reasons for not setting up the call to the end user.
(7) In case (CCI) and (PI) requirements are met the TVS is setting up the call towards the end user. (8) After the end user possibly has answered the call from the TVS, TVS plays the audio file # 1 over the phone call presenting transactions details in the ordered language, upon optionally identifying the user by a specified method retrieved from the VO.
a. In case of a voice biometrical based method of identification, using a voice biometric system integrated with the TVS, the end users identity validation task is provided from TVS to the integrated voice biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
b. In case of another biometrical based method of identification, using a biometric based system integrated with the TVS, the end users identity validation task is provided from TVS to the integrated biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification
E I Ic I l i S Sbj E 1.
c. In case of a DTMF based method of identification, requiring the end user to tap in a code of the phone, using DTMF sounds, using e.g. a phone banking system integrated with the TVS, the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism. d. In case of a PKI based method of identification, requiring the end user to a use a particular certificated based system, integrated with the TVS, the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
(9) In case the end user accepts transaction details presented towards the user over the synthetic voice from audio file # 1, the user is asked to bring the microphone of the phone against the loudspeaker of the computer.
(10) The next step is that the TVS starts playing audio file #2, streaming the instrumented audio message through the users two devices verifying that the equipment is under both physical and logical control of the identified user. By operating the physical movement of the phone, the user now verifies the transaction by letting the audio stream from the
loudspeaker of the computer be recorded by the microphone of the phone. a. In case the user wants to cancel the transaction verification, the user only needs to hang up the phone call and thereby physically prohibit the transaction from being executed.
(11) If the user wants to accept the transaction verification by allowing the audio stream to be fully executed, the recorded audio stream is
subsequently being delivered as an inbound audio stream over the current phone call to the TVS for decoding. TVS is after decoding comparing the inbound audio with the outbound audio of audio file #2.
a. In case the inbound audio compared with the outbound audio of audio file #2 differs, TVS analyse the bit stream and audio packets, adjust the inbound audio with error correction and redundancy measures of the TVS audio based protocol until perfect match possibly is achieved.
b. In case perfect match still not is achieved, the TVS analyse the
relevant packets and starts its adaptive retransmission property of its audio protocol for the relevant audio based packets, until these iterations of coding, retransmission, decoding and comparison provides a perfect match.
(12) In case TVS comparison of inbound and outbound (PS) within a time out setting gets a perfect match, a positive receipt with minimum the inbound decoded (PS) and the order number are sent back to the application server for processing. The application server can now both match (PS) sent with (PS) received and validate the received (PS) against the transaction secret. If this validation process gives a positive result, the application server will then accept the transaction.
a. In case TVS comparison of inbound and outbound (PS) within a time out setting never gets a perfect match, a negative receipt with minimum the inbound decoded (PS) and the order number are sent back to the application server for processing. The application server will then reject the transaction.

Claims

Claims
A method for securing an electronic transaction between an application server and an end user, wherein said end user has access to a phone and a computer with a loudspeaker and is further c h a r a c t e r i z e d b y that:
» the appiication server sends a verification order to a Transaction
Verification Server,
* the Transaction Verification Server converts the verification order into at least two audio flies,
* the Transaction Verification Server sets up a call to the end user and plays of the first audio file on the phone of the end user according to the parameters and transaction information stated in the verification order,
* if the end user accepts the transaction details presented as Synthetic voice in the relevant language over the phone call, the Transaction Verification Server plays of the second audio file as an outbound audio stream on the end users computer loudspeaker,
» the second audio file is recorded by the microphone on the end users phone,
* the recorded second audio file is transmitted from the microphone of the phone to the Transaction Verification Server over the actual phone call,
* the Transaction Verification Server compares the outbound streamed second audio file with the received second audio file, and
« if they match the Transaction Verification Server sends a positive receipt to the application server.
* A negative receipt is sent to the application server in case the end user don't accept the transaction details presented by the mechanism by hanging up the call or tapping a button on the phone, In case the Transaction Verification Server not are able to find a match between outbound streamed audio with the inbound received audio a negative receipt is sent to the appiication server.
Method according to ciaim 1 wherein said verification order includes at least a trustworthy phone number, an order number, a proxy secret, transaction details and a language indicator.
3, Method according to claim 2 wherein said verification server can also include an identification indicator, a call control indicator or a position indicator.
4. Method according to claim 1 wherein the first audio file comprises a synthetic voice on the ordered language reading the transaction details,
5, Method according to claim 1 wherein the second audio file comprises the proxy secret.
EP15707823.9A 2014-01-28 2015-01-28 Method for securing an electronic transaction Ceased EP3100220A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20140098A NO337813B1 (en) 2014-01-28 2014-01-28 Procedure for securing an electronic transaction
PCT/NO2015/050018 WO2015115908A1 (en) 2014-01-28 2015-01-28 Method for securing an electronic transaction

Publications (1)

Publication Number Publication Date
EP3100220A1 true EP3100220A1 (en) 2016-12-07

Family

ID=52598808

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15707823.9A Ceased EP3100220A1 (en) 2014-01-28 2015-01-28 Method for securing an electronic transaction

Country Status (3)

Country Link
EP (1) EP3100220A1 (en)
NO (1) NO337813B1 (en)
WO (1) WO2015115908A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6934858B2 (en) * 1999-12-15 2005-08-23 Authentify, Inc. System and method of using the public switched telephone network in providing authentication or authorization for online transactions
GB2427286A (en) * 2005-06-11 2006-12-20 Harley Clark Financial transaction method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7082533B2 (en) * 2000-08-04 2006-07-25 First Data Corporation Gauging risk in electronic communications regarding accounts in ABDS system
US7461258B2 (en) * 2002-05-24 2008-12-02 Authentify, Inc. Use of public switched telephone network for capturing electronic signatures in on-line transactions
US8934865B2 (en) * 2006-02-02 2015-01-13 Alcatel Lucent Authentication and verification services for third party vendors using mobile devices
EP1921578A1 (en) * 2006-11-13 2008-05-14 Yellow One Asset Management Ltd. Payment method and system between the buyer and seller by means of a third party
US20120203695A1 (en) * 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions
NO333223B1 (en) * 2011-07-13 2013-04-15 Trond Lemberg Alternate PIN transfer
US20130204786A1 (en) * 2012-02-03 2013-08-08 Daniel Mattes Verification of Online Transactions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6934858B2 (en) * 1999-12-15 2005-08-23 Authentify, Inc. System and method of using the public switched telephone network in providing authentication or authorization for online transactions
GB2427286A (en) * 2005-06-11 2006-12-20 Harley Clark Financial transaction method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2015115908A1 *

Also Published As

Publication number Publication date
NO20140098A1 (en) 2015-07-29
NO337813B1 (en) 2016-06-27
WO2015115908A1 (en) 2015-08-06

Similar Documents

Publication Publication Date Title
US10764043B2 (en) Identity and content authentication for phone calls
US20090025075A1 (en) On-demand authentication of call session party information during a telephone call
CN101248613B (en) Authentic device admission scheme for a secure communication network, especially a secure ip telephony network
US8156335B2 (en) IP address secure multi-channel authentication for online transactions
US9077566B2 (en) Caller ID callback authenticationi for voice over internet protocol (“VoIP”) deployments
US8522344B2 (en) Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems
US7920680B2 (en) VoIP caller authentication by voice signature continuity
US8345871B2 (en) Fast authentication over slow channels
US20150333914A1 (en) Method and system for authentication
US8681783B2 (en) Prevention of call spoofing in a Voice over Internet Protocol (VoIP) network
US20090046839A1 (en) Verifying authenticity of called party in telephony networks
US11042613B2 (en) Enhanced user authentication based on device usage characteristics for interactions using blockchains
KR20140005306A (en) Continuous voice authentication for a mobile device
CN102802150B (en) phone number verification method, system and terminal
US8769623B2 (en) Grouping multiple network addresses of a subscriber into a single communication session
US8023654B2 (en) Securing multimedia network communication
US10893414B1 (en) Selective attestation of wireless communications
CN110839036B (en) Attack detection method and system for SDN (software defined network)
US20230088868A1 (en) Systems and methods for indicating and managing a validation of a caller identification to prevent identity spoofing
Du et al. {UCBlocker}: Unwanted call blocking using anonymous authentication
US10063699B1 (en) Method, apparatus and computer program product for verifying caller identification in voice communications
KR101216005B1 (en) System for protecting SIP internet phone attack under encrypted signal circumstance
CN113194069B (en) Communication tracing method, communication tracing device and medium based on block chain
EP3100220A1 (en) Method for securing an electronic transaction
CN112865975A (en) Message security interaction method and system, and signaling security gateway device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20160829

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20180307

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: OKAY AS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20201015