EP4338371A1 - Procédé et système de vérification d'identité dans un réseau de télécommunication et service de vérification - Google Patents
Procédé et système de vérification d'identité dans un réseau de télécommunication et service de vérificationInfo
- Publication number
- EP4338371A1 EP4338371A1 EP21831079.5A EP21831079A EP4338371A1 EP 4338371 A1 EP4338371 A1 EP 4338371A1 EP 21831079 A EP21831079 A EP 21831079A EP 4338371 A1 EP4338371 A1 EP 4338371A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- user device
- verification
- service
- confirmation message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 128
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012790 confirmation Methods 0.000 claims abstract description 63
- 238000004590 computer program Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- the invention is concerned with a method and system of identity verification in a telecommunication network and a verification service to be used therein.
- Personally identifiable information generally includes a person's name, e-mail address, and/or phone number, identifying or identity number, such as a social security number, date of birth, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's resources, such as financial resources.
- Identification simply defined, is claiming to be someone, i.e. the process of someone claiming to be a specific person. As indicated above, persons can identify themselves by the above personally identifiable information, or in particular by showing up an identification document that has his/her picture and personal information. A driver’s license or a passport are examples of such identification documents.
- the social security number is generally for identifying persons in the public sector, such as different authority and government registers and in communication between those but also the private sector, such as banks, insurance companies, and health service providers, might need the social security number to ensure that data is registered for the right person for sure. Often, however, the mere name is used.
- Users identify themselves by providing such personally identifiable information on a web form for example, especially when it comes to online transactions or when they purchase an article online by additionally entering a credit card number and other credit card details and a billing address.
- Some service, providers, especially banks, may also require providing a social security number.
- Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. For example, goods and services might be ordered in the name of the victim for the identity theft and even bank accounts might be emptied. Other usual criminal acts are taking quickie loans and subscriptions in another person's name.
- Verification is performed for ensuring that a person really is the one he is claiming to be and consequently, verification is an important step.
- Verification traditionally, is verifying the person to be as claimed to be by validating his official documents. Verification is done digitally in two main ways, either by comparing user-submitted identity data such as name, date of birth and phone number to third-party data sources or by examining an identity document such as an ID card or driver’s license to make sure it is valid.
- the process usually starts with the verification of a government-issued ID document by some known technology in order to confirm whether the ID document is valid.
- ID verification is essential for all types of businesses, verification of customers’ and clients’ identities are necessary within financial services, online marketplace, travel, insurance, and real estate business.
- Verifying someone's identity to a high degree or certainty takes much effort with existing methods.
- some may just require a low barrier to entry to make it as easy as possible for consumers. They might ask only a name, an e-mail address, a user name, and a password, and maybe a phone number even if verification is recommendable.
- the object of the invention is to provide a verification service for versatile use enabling identity information to be easily verified without much effort and in a user-friendly way.
- the method of the invention for identity verification takes place in a telecommunication network, wherein at least one user device is used in connection with accessing an event.
- an identity number is presented by a user as requested by a second party for the access to the event.
- the second party is linked to a verification service to which the information of the identity number is forwarded from a first computer other than or same as the user device.
- the verification service then matches the identity number with contact information to a user device of the user and sends a confirmation message request to some user device of the user by means of the contact information.
- the user sends the requested confirmation message from the user device to the verification service as a reply message to the confirmation message request.
- the verification service requests a code on the first computer other than or same as the user device to be entered in by the user.
- the verification service receives the code entered by the user, matching the code with the identity number of the user is performed by the verification service, and the second party is informed if the code was correct.
- the second party can the provide access to the event for the user.
- the event can be a transaction process in a service provided by a service provider as said second party.
- the identity number is presented by a user as requested by the service provider for access to the transaction process by entering it on the user interface of the service on the first computer or on the user device.
- the event can also consist in e.g. verification of an identification document of a user to be performed by a requesting party as said second party.
- the identity number is presented by a user by showing it as a part of an identification card as requested by said second party.
- an identification document can e.g. be a passport, and identity card, a driving license, a debit card, or a credit card.
- the identity number can be the social security number of a person.
- the user device to which the confirmation request message is sent can be the first computer or it can be other than the first computer, whereby the first computer is a first user device and the user device other than the first computer is a second user device.
- the contact information can be an e-mail address to a user device of the user, whereby the confirmation message request, and the confirmation message sent as a reply to that are e-mails.
- the contact information can also be a telephone number to a telephone of the user, the telephone constituting the second user device, whereby the confirmation message request and the confirmation message sent as a reply to that are Short Message Service, SMS, text messages.
- the verification service of the invention is used in a telecommunication network for identity verification. It comprises a database of registered users, the register storing combined data of an identity number, a code, and contact information for each registered user. It further comprises a computer program product comprising instructions which when executed perform the steps when run by an application in a first computer or as software in a second computer.
- the steps consist in receiving information of the identity number as forwarded from the first computer, matching the identity number with contact information to a user device of the user, sending a confirmation message request to some user device of the user by means of the contact information, receiving a confirmation message from the user device as a reply message to the confirmation message request, requesting a code on the first computer or on the user device to be entered in by the user, receiving the code entered by the user, matching the code with the identity number of the user, and informing the second party if the code was correct.
- the system of the invention for identity verification in a telecommunication network comprises the verification service of the invention. It also comprises a first computer communicating with the verification service by forwarding identity information of a user and receiving information of the verification of the identity information of the user.
- the first computer can be a user device, or the system comprises a further user device communicating with the verification service at least by receiving a confirmation message request from the verification service and sending a confirmation message as a reply to said confirmation message request.
- the first computer is connected to the Internet, and can be a personal Computer (PC), a laptop, a tablet, or a smart phone being a user device for accessing services from a service provider or it can be an authority device or a general access device with a reader for e.g. reading identification cards, credit cards.
- PC personal Computer
- laptop a laptop
- tablet or a smart phone being a user device for accessing services from a service provider
- it can be an authority device or a general access device with a reader for e.g. reading identification cards, credit cards.
- a further user device can be a telephone for receiving the confirmation message request from the verification service and for sending the confirmation message as a reply to said confirmation message request as Short Message Service, SMS, text messages.
- the confirmation message request from the verification service and the confirmation message sent as a reply to said confirmation message request can also be e-mails, when the user device is the same device as the first computer, or other user device capable for communicating per e-mail, such as a personal Computer (PC), a laptop, a tablet, or a smart phone.
- PC personal Computer
- laptop a laptop
- tablet a smart phone
- the identity verification of the invention can be applied in all situations, where an identity number such as a social security number needs to be verified, even for verification of an identity of a person in situations, wherein the identity primarily is ensured by a person showing a passport, an identity card or the like.
- the identity verification of the invention is not service provider bound since it is primarily meant for private users to be used in all these situations wherein verification is needed.
- the invention for verification of identities is especially meant for preventing misuse of a person’ identity at use of transactions, purchases, and other services, taking place via the internet , such as at processes at online stores, credit applications, car purchases, moving notifications and corresponding notifications of change of residence, ordering of goods, payment transactions and all other such commercial situations.
- the invention is for example expected to especially decrease fraud at moving notifications and quickie loans.
- the invention can also be used at verification of identities in connection with the presentation and use of identity documents, such a passport and ID-cards, and in connection with the use of debit and credit cards at e.g. shops, restaurants, barbers, hairstylists, cash withdrawals from automates, cash desks and cashiers.
- identity documents such as a passport and ID-cards
- debit and credit cards at e.g. shops, restaurants, barbers, hairstylists, cash withdrawals from automates, cash desks and cashiers.
- a service provider by a service provider can have functionality to be linked to a verification service that itself is inventive.
- the verification service is used by users voluntary and independently from external parties, but it would be recommendable to involve service providers and to require the use of such a verification service.
- a service provider could be required to use the verification service and to check whether a person requiring access to a service requires use of the verification service in question. If that is the case, the identity number of the user needs to be verified by the verification service in accordance with the method of the invention and in case the verification is not successful, access to the service is denied.
- an identity number such as a social security number
- a notification is always sent in real-time to its owner with a text message, such as a Short Message Service (SMS) message, or by e-mail, or the both, when someone is using or trying to use the identity number and the owner has to confirm that the use of it is accepted at that moment in real-time.
- SMS Short Message Service
- the identity number can in some embodiments of the invention be excluded from use by means of the verification service, for an indefinite duration or temporarily for a defined time, such as for some hours, for example for a sufficient time until the security code has been changed.
- the invention provides an efficient protection against misuse of personal data, against money losses and other property and a lot of extra work, pain and regret when such incidents occur.
- Figure 1 is an architecture view of a system, wherein one embodiment of the invention can be applied.
- Figure 2 is a signal diagram of a first embodiment of the invention in connection with the use of services through a public network
- Figure 3 is a signal diagram of a second embodiment of the invention in connection with the verification of a person’s identity document DETAILED DESCRIPTION
- Figure 1 is an architecture view of a system, wherein one embodiment of the invention can be applied.
- a user has a user device 1 , such as a PC, Ipad or laptop or a smart phone, is connected to the Internet 2 and can use services provided by a service provider 3 that provides services through the Internet 2.
- This user device 1 is the first computer in the invention.
- the user has registered himself to a verification service 4 meaning that, the identity number, such as the social security number can not be used for services or identification unless it is verified in a way required by and though the verification service 4.
- the verification service 4 has a database 8 with registered users that match user identity information with security codes and contact information to the user.
- the registered users can e.g. be private persons, or companies, like service providers. For users that are service providers or companies or the like, a business identity code can be used as identity information.
- the identity information usually consists of an identity number, such as the social security number.
- the service provider 4 is registered to the verification service.
- the service provider 4 is either committed to use the verification service 4 or has decided to use the verification service for verification of identities, or it uses the verification service for such customer that has registered for the verification service.
- the service provider 4 has an identity verification function 5 working as a link to the verification service 4 in order to perform the functionality of the verification service 4 that either is hosted in a separate server or in an application in the server of the service provider 4.
- the user can have a second user device 7, which can be a telephone that communicates via the Global System for Mobile Communications (GSM) network 6 by voice calls or Short Message Service (SMS) messages. If it e.g. is a smart phone, it can also usually communicate via the Internet and send and receive e-mails.
- GSM Global System for Mobile Communications
- SMS Short Message Service
- the user might access services provided by the service provider from either one of his user devices 1 , 7.
- Private users, who are registered to the verification service 4 receive confirmation request messages to either one or both of their user devices 1 , 7 in real-time when their identity number is used.
- Figure 2 is a signal diagram of a first embodiment of the invention in connection with the use of services through a public network.
- the invention can be used in connection with a transaction process wherein a user requests use of a service provided by a service provider on-line in a public network like the Internet from a first user device.
- the service might consist of ordering an article to be paid.
- the transaction processes are usually managed by transaction processing systems that perform routine transactions necessary to conduct a business in question. Examples include systems that manage sales order entry, airline reservations, payroll, employee records, manufacturing, and shipping.
- the transaction processes especially useful to be used with the invention are interactive and concerned with online transaction processing.
- a Service Provider provides services, such as sells articles or services through e.g. the internet. It can be an Internet service provider (ISP) that provides services for accessing, using, or participating in the Internet.
- SP Service Provider
- ISP Internet service provider
- This service request for accessing a service from a service provider through the Internet constituting the first step 1 is made by the user form a first computer being the first user device in this example is indicated by arrow 1 .
- the service provider Upon receiving the request, the service provider replies in step 2 with asking identity information of the user on the user interface of the service provided suitably on the web page of the service provider on the first computer being here the first user device.
- the identity information asked usually consists of the name, address, telephone number, e- mail address and the social security number of the user.
- This second step is indicated by arrow 2 in figure 2.
- the user After that the user has, as a third step 3, indicated by arrow 3, entered the information requested in step 2, the information is automatically sent to a verification service.
- the verification service matches the identity number with contact information of the user in step 4 by using the database for fetching data (indicated by arrows not numbered) and sends a confirmation request message in signal 5 to the second user device as Short Message Service (SMS) text message.
- SMS Short Message Service
- the confirmation request message could have been sent to the first and/or second user device as e-mails.
- a confirmation message is sent in signal 6 as a reply message from the user device, in which the user confirms that he is the one trying to access the service provided by the service provider.
- the verification service When the confirmation message has been received by the verification service, the verification service next requests in step 7 on the user device (or on some user device) to enter a security code.
- the code is requested and entered on the interface of the first user device, usually being a laptop, tablet, like an Ipad, or a PC or it can be a smart phone or a telephone. But it can also be requested and entered by SMS on a second user device that is a telephone, especially in cases wherein ID cards a or credit or debit cards are used.
- step 8 When the user has entered the requested code in step 8, the verification service matches in step 9 the code with the identity information given in step 3.
- the verification service informs the service provider in step 10 of the successful verification of the identity information of the user, and the service provider can give the user access to the service in step 1 1 .
- Figure 3 is a signal diagram of a second embodiment of the invention in connection with the verification of a person’s identity document. It is assumed that a user has to identify himself by means of some identification document for example with a passport at e.g. a passport control.
- the identity number is a part of an identification card. In this case the invention is useful for verification of the identity number of the identification document when a user presents it in a step 1 .
- the person checking the identification card accesses in step 2 a verification service to be presented on a user interface in a computer held by the authority person being the first computer.
- the authority device has to be in contact with the verification service in a server or application holding the verification service. This is indicated by arrows (not numbered).
- the identity number of the person of the identification card is entered in step 3 in a field presented by the verification service on the user interface of the verification service on the first computer.
- the verification service After that the identity number has been entered by the user or preferably the authority person and received by the verification service in step 3, the verification service matches the identity number with contact information of the user in step 4. For that purpose, the verification service has a database to fetch the information from, which is indicated by arrows (not numbered).
- the verification service then sends a confirmation request message in signal 5 to a user device, preferably as a Short Message Service (SMS) text message so that the user can verify that he is the person accessing the service.
- SMS Short Message Service
- the confirmation request message could have been sent as an e-mail if the user device has e-mail capability and connection.
- the confirmation messages take place by SMS through the Global System for Mobile communications (GSM) network to a telephone used by the user as a user device.
- GSM Global System for Mobile communications
- a confirmation message is sent in signal 6 as a reply message from the user device, in which the user confirms that he is the one trying to access the event constituting in verification of the identification card for example to pass a gate in a passport control .
- the verification service next requests in step 7 the user to enter a code, as a security code, on the user interface of the computer held by the authority person.
- a code as a security code
- the code is requested and entered on a device by the user, such as a telephone or smart phone of the user.
- the verification service matches in step 8 the code with the identity information given in step 1 .
- the verification service has a database to fetch the information from, which is indicated by arrows (not numbered).
- the verification service informs in step 10 of the successful verification of the identity information of the user on the first computer held by the authority person, who can now accept the identification card in step 1 1 and let the user pass having now identified himself.
- a process similar to that of figure 3 can also be automated so that a user presents the ID card to a device with a reader working e.g. with RFID identification or other technique.
- the ID card has to be verified to be carried by the right person before e.g. a gate or door opens for the person so that he can pass.
- the device reads the identity number from the ID car presented by the user and forwards it to a verification service that can be in the form of an application in the device.
- the verification service then matches the read identity number and with contact information to a user device of the user.
- a confirmation request message is sent to the user device from the device by means of the contact information in real-time, where after a confirmation message is sent as a reply message from the user device.
- the verification service then requests a security code to be entered therein.
- the verification service matches the code with the read identity number and maybe with contact information to some user device of the user.
- the code can be requested and entered on the user device or authority device.
- the gate opens for the user to pass.
Abstract
Le procédé de l'invention permettant la vérification d'identité a lieu dans un réseau de télécommunication, au moins un dispositif d'utilisateur (1, 7) étant utilisé en lien avec l'accès à un événement. Selon le procédé, un numéro d'identité est présenté par un utilisateur selon la demande d'une seconde partie pour l'accès à l'événement. La seconde partie est reliée à un service de vérification (4) auquel sont transmises les informations du numéro d'identité à partir d'un premier ordinateur autre que le dispositif d'utilisateur ou à partir de ce dernier. Le service de vérification (4) fait alors correspondre le numéro d'identité avec des coordonnées relatives à un dispositif d'utilisateur (1, 7) de l'utilisateur et envoie une demande de message de confirmation au dispositif d'utilisateur (1, 7) de l'utilisateur grâce aux coordonnées. L'utilisateur envoie le message de confirmation demandé du dispositif d'utilisateur (1, 7) au service de vérification (4) sous forme de message de réponse à la demande de message de confirmation. Le service de vérification (4) demande ensuite, sur le premier ordinateur autre que le dispositif d'utilisateur ou sur le dispositif d'utilisateur, un code à entrer par l'utilisateur. Lorsque le service de vérification reçoit le code saisi par l'utilisateur, la mise en correspondance du code avec le numéro d'identité de l'utilisateur est effectuée par le service de vérification et la seconde partie est informée si le code est correct. La seconde partie peut donner accès à l'événement pour l'utilisateur. L'invention concerne également ledit service de vérification (4) et un système comprenant ledit service de vérification et au moins un dispositif d'utilisateur.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20206285A FI20206285A1 (en) | 2020-12-11 | 2020-12-11 | PROCEDURE AND SYSTEM FOR VERIFICATION OF IDENTITY IN A TELECOMMUNICATION NETWORK AND AN VERIFICATION SERVICE |
PCT/FI2021/050843 WO2022123112A1 (fr) | 2020-12-11 | 2021-12-03 | Procédé et système de vérification d'identité dans un réseau de télécommunication et service de vérification |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4338371A1 true EP4338371A1 (fr) | 2024-03-20 |
Family
ID=79024720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21831079.5A Pending EP4338371A1 (fr) | 2020-12-11 | 2021-12-03 | Procédé et système de vérification d'identité dans un réseau de télécommunication et service de vérification |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4338371A1 (fr) |
FI (1) | FI20206285A1 (fr) |
WO (1) | WO2022123112A1 (fr) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130007849A1 (en) | 2011-05-26 | 2013-01-03 | FonWallet Transaction Soulutions, Inc. | Secure consumer authorization and automated consumer services using an intermediary service |
US9727866B2 (en) | 2013-10-15 | 2017-08-08 | Intuit Inc. | Methods systems and computer program products for verifying consumer identity during transaction |
US9537661B2 (en) * | 2014-02-28 | 2017-01-03 | Verizon Patent And Licensing Inc. | Password-less authentication service |
US20170230368A1 (en) * | 2016-02-10 | 2017-08-10 | Tahir Khan | System and method of logging into a web server |
US10491595B2 (en) * | 2017-07-31 | 2019-11-26 | Airwatch, Llc | Systems and methods for controlling email access |
US11108757B2 (en) | 2017-12-21 | 2021-08-31 | Mastercard International Incorporated | Systems and methods relating to digital identities |
EP3627363A1 (fr) | 2018-09-19 | 2020-03-25 | Vocalink Limited | Système, dispositifs et procédés de traitement d'informations |
-
2020
- 2020-12-11 FI FI20206285A patent/FI20206285A1/en unknown
-
2021
- 2021-12-03 EP EP21831079.5A patent/EP4338371A1/fr active Pending
- 2021-12-03 WO PCT/FI2021/050843 patent/WO2022123112A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2022123112A1 (fr) | 2022-06-16 |
FI20206285A (fi) | 2022-06-12 |
FI20206285A1 (en) | 2022-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11288676B2 (en) | Private confirmation system | |
US10467624B2 (en) | Mobile devices enabling customer identity validation via central depository | |
US7761384B2 (en) | Strategy-driven methodology for reducing identity theft | |
KR101309594B1 (ko) | 전자상거래에서 사용자의 신원을 확인하기 위한 방법 및 시스템 | |
US8738921B2 (en) | System and method for authenticating a person's identity using a trusted entity | |
US7849014B2 (en) | System and method for facilitating a financial transaction with a dynamically generated identifier | |
US7383988B2 (en) | System and method for locking and unlocking a financial account card | |
US20060173776A1 (en) | A Method of Authentication | |
US20080255992A1 (en) | Double recognizing method by means of telephone number and identification code for online credit card transactions over the internet | |
US20060131390A1 (en) | Method and system for providing transaction notification and mobile reply authorization | |
US20090125440A1 (en) | Method and system for approving credit card transactions | |
US11122049B2 (en) | Attribute database system and method | |
MXPA05011481A (es) | Sistemas y metodos para verificar identidades en transacciones. | |
US20210390556A1 (en) | Systems and methods for age verification | |
KR20000049788A (ko) | 유무선통신을 이용한 개인 고유번호 자동전달 및 보안 시스템 | |
JP5164544B2 (ja) | 口座管理装置、および口座管理方法 | |
US20080083024A1 (en) | Single use user IDS | |
US20210185036A1 (en) | Secure authentication system | |
EP4338371A1 (fr) | Procédé et système de vérification d'identité dans un réseau de télécommunication et service de vérification | |
KR101547730B1 (ko) | 하나의 계좌에 대하여 둘 이상의 비밀번호를 운용하는 금융 계좌 관리 장치 및 방법 | |
JP2002042028A (ja) | カード等の不正使用防止システム | |
John | METHOD AND SYSTEM FOR SECURE CREDENTIAL GENERATION | |
GB2360383A (en) | Payment authorisation | |
KR20240021510A (ko) | 물류 서비스 지원 시스템 | |
WO2013160830A1 (fr) | Serveur et dispositif mobile pour autoriser une transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20231009 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |