GB2148569A - Method of determining authorization of the user of a subscriber set - Google Patents

Method of determining authorization of the user of a subscriber set Download PDF

Info

Publication number
GB2148569A
GB2148569A GB08426640A GB8426640A GB2148569A GB 2148569 A GB2148569 A GB 2148569A GB 08426640 A GB08426640 A GB 08426640A GB 8426640 A GB8426640 A GB 8426640A GB 2148569 A GB2148569 A GB 2148569A
Authority
GB
United Kingdom
Prior art keywords
user
characteristic
stored
subscriber set
entered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB08426640A
Other versions
GB8426640D0 (en
Inventor
Ernest Godlstern
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Philips Gloeilampenfabrieken NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Gloeilampenfabrieken NV filed Critical Philips Gloeilampenfabrieken NV
Publication of GB8426640D0 publication Critical patent/GB8426640D0/en
Publication of GB2148569A publication Critical patent/GB2148569A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The authorization of the user of a portable personal automatic telephone is partly determined by comparing the voice characteristic of the user with that of the authorized person and is further determined by comparing the fingerprint pattern of the user with the fingerprint pattern of the authorized person. The arrangement includes a processor (5) which compares stored characteristics (ROM 1, 3) with user entered characteristics (RAM 2, 4). The switch (10) can be operated in response to correlations between one or both of the characteristics depending on the use to which the set is to be put. <IMAGE>

Description

SPECIFICATION Determining the user authorization of a subscriber set for signal transmission The invention relates a method of determining whether a user is authorized to use a subscriber set for signal transmission and to a subscriber set for signal transmission including user authorization determining means.
Such a method and such a subscriber set are disclosed in European Patent Specification No. EP-B1-O 027 596.
Generally, it is useful to provide a subscriber set for signal transmission, such as, for example, a telephone set with a protection against unauthorized use, as the use of the subscriber set is always charged to the subscriber. With the present-day development of mobile subscriber sets (for example the socalled automatic personal telephone, as described in the article "The cellular telephone goes on line", published in the periodical "Electronics" of 22nd September 1983, pages 121-129), special account must be taken of the risk of non-authorized use. These portable sets may be found abandoned more frequently than wired sets, for example in the event of loss or theft.
It is already known to protect the subscriber set from unauthorized use by providing it with a lock to prevent unauthorized use. The authorized user identifies himself by using the appropriate key. The subscriber set may alternatively be arranged such that it is capable of recognizing a code on an identification card of the authorized person. These known manners of protection have the disadvantage that a physical identification device (key or card) is always necessary which may get lost.
From the above-mentioned European Patent Sepcification it is known to determine the user authorization of a telephone set by comparing the voice characteristic of the user with the voice characteristic of the authorized person.
The human voice is an individual, unambiguous characteristic. With this personal characteristic it is possible to try to identify the owner of the voice unambiguously, so that in this way of determining the user authorization no physical identification device is required.
Several methods of identifying a person by means of his voice pattern are known. In all these methods the error probability, (i.e. the probability that a speaker is erroneously identified as non-authorized or a non-authorized speaker is erroneously identified as authorized) depends on the available computer and memory capacities and on the available computing time. If a great deal of memory capacity is available the speech samples can be stored in amore extensive form, which requires more computing time, such as described in, for example, the article "Talking with computers: Synthesis and Rocognition of Speech by Machines"; IEEE Transactions on Biomedical Engineering, Vol. BME-29, No. 4, April 1982, Pages 223-232, more specifically page 230, paragraph Ill-F.
When determining the user authorization of a subscriber set for signal transmission it is undesirable for time necessary to arrive at a decision whether the set will be enabled or not, to be longer than a few seconds, as this would be annoying for the user. With a prescribed processing rate of the data such a fast decision can be relaized by limiting the number and size of the recorded speech samples, but this increases the error probability. More extensive recording of the speech samples implies a larger storage capacity and higher processing rates which, for reasons of cost and volume, is undesirable, especially with portable subscriber's sets such as used in said system of automatic personal telephones.
It is an object of the invention to provide a method of determining whether a user is authorized to use a subscriber set in which the error probability is reduced without significantly increasing the decision time, and which is suitable for portable subscriber sets of the automatic personal telephone system. It is a further object of the invention to provide a subscriber set for signal transmission including user authorization means in which the error probability is reduced without significantly increasing the decision time.
The invention provides a method of determining whether a user is authorized to use a subscriber set for signal transmission and enabling the subscriber set if authorization is determined, said method comprising the steps of: comparing a representation of a first characteristic of the authorized user, which characteristic is stored within an authorization determining means, with a corresponding representation of the first characteristic entered by the user to the authorisation determining means; producing a first decision signal indicating whether a sufficient correlation between the stored and entered representations of the first characteristic exists to imply that the user is the authorised user; comparing a representation of a second characteristic of the authorised user, which characteristic is stored within the authorisation determining means, with a corresponding representation of the second characteristic entered by the user into the authorisation determining means; producing a second decision signal indicating whether a sufficient correlation between the stored and entered representations of the second characteristic exists to imply that the user is the authorised user; and enabling the subscriber set if the first and/or second decision signals indicate correlation between the stored and entered representations of the user characteristic.
The invention further provides a subscriber set for signal transmission including user au thorisation determining means, said user authorisation determining means comprising means for storing a representation of a first characteristic of an authorised user; means for entering the first characteristic of a potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the first characteristic and producing a first decision signal which indicates whether a sufficient correlation exists between the representations of the stored and entered first characteristics to imply that both were produced by the same person; means for storing a representation of a second charateristic of an authorised user; means for entering the second characteristic of the potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the second characteristic and producing a second decision signal which indicates whether a sufficient correlation exists between the representation of the stored and entered second characteristics to imply that both were produced by the same person; means for applying the first and second decision signals to a subscriber set enabling means for producing an enabling signal when the first and/or second decision signals indicate correlation between the stored and entered characteristic(s).
As the second personal characteristic is independent of the first personal characteristic, the occurrence of incorrect decisions because of mutually dependent error causes is obviated. These mutually dependent error causes might, for example, be present if, to reduce the error probability, the other personal characteristic of the same type as the first personal characteristic, for example the voice characteristic, were chosen. In that case it is possible that because of, for example, the fact that the speaker has caught a cold or of permanent interfering background noise an incorrect decision as regards the user authorization of the speaker would continuously be taken.
With an embodiment of a method and a subscriber set which are suitable for simple and fast recognition the first personal characteristic may be formed by the voice characteristic and the second personal characteristic may be a finger of thumb print. Since using a subscriber set for signal transmission always implies that is touched by the user this touch can also be used for entering the finger print so that no additional manipulations of the user are- required for this purpose.
An embodiment of the invention and its advantages will now be described, by way of example with reference to the accompanying drawing, in which the sole Figure shows by means of a block schematic diagram an arrangement of a subscriber set for signal transmission including user authorization determining means.
The arrangement shown in the Fig. 2 comprises four memories 1, 2, 3 and 4, a processing unit 5, two converters 6 and 7, supply means 8 and 9, an authorizatici circuit 10 and a mode selector 12. The arrangement is connected via the authorization circuit 10 to the further circuits of the subscriber set, shown schematically in the Figure by the set function circuit 11.
Memory 1 is a read-only memory, intended to store a representation of the voice characteristic of the authorized user. The term "readonly memory" must be understood to mean that the content of memory 1, and also the content, of the read-only memory 3 still to be described, is not erased as part of the procedure for determining the user authorization. It is indeed possible that the read-only memories 1 and 3 are given a new content as part of a procedure for writing a characteristic of an authorized user into the memories. It is alternatively possible for the read-only memories 1 and 3 to be in the form of plug-in modules which are programmed outside the subscriber set.
The representation of the voice characteristic may assume different forms, as known from the prior art. For speaker recognition the representation of the voice characteristic may correspond to the representation for word identification, as described in the afore-mentioned IEEE-Article. The manner of storing a representation for word recognition is known per se, for example from the periodical "Mini Micro Syems", June 1983. pages 242, 244 and 246, or from the periodical "Telecommunication Journal", Vol. 48, December 1981, pages 734 and 735.
Memory 2 is an erasable memory, intended to store a representation of the voice characteristic of a person wanting to use the subscriber set, called user hereinafter, which representation corresponds to that stored in the read-only memory 1.
Under the control of processing unit 5, prior to the use for communication purposes, the voice of the user is converted by converter 6 formed by a microphone 6-1 and an analogue-to-digital converter 6-2- into a representation of the voice characteristic, for example into a set of digital code words each representing a sample of the speech signal.
The set of digital code words can be read directly into memory 2 under the control of processing unit 5 or can be processed first by processing unit 5 to form a different representation before being stored in memory 2. After the representation of the voice characteristic of the user has been stored in memory 2 it is compared to the representation of the voice characteristic of the authorized person. This manner of comparing is known per se and is described in, for example, said periodical "Mini-Micro Systems", page 244. If both voice representations show sufficient correla tion between each other, that is to say they are within a predetermined margin of each other, then the processing unit generates a first decision signal which indicates that the two representations are sufficiently similar to be assumed to emanate from the same person.
Speaker recognition on the basis of the voice characteristic has an error probability in the order of some percents. From said IEEEarticle a value of 10% can be derived for the eror probability (page 230, paragraph Ill-F).
From the above-mentioned periodical "Mini Micro Systems", pages 244 and 246 a value of 1 % for the error probability for word recognition can be derived, but this value holds for uptimun circumstances and may be considerably more in actual use. As for word recognition a method is followed which corresponds to the method of speaker recognition, it may be assumed that in both cases the error probability is of the same order of magnitude.
In order to reduce the number of times that the authorized user is not recognized as such, or that an unauthorized person is identified as authorized, as the case may be, the identity of the user is checked against a second individual characteristic which is independent of the first individual characteristic. In this embodiment the second characteristic is the finger print pattern.
In the read-only memory 3 a representation of the finger print pattern of the authorized user is stored. The manner of forming a representation of the pattern of a finger print is known per se, for example, from United States Patent No. 4,210,899 and from the article "Reducing Storaged Requirements of Digitized Fingerprint Images", 1 982 Carnahan Conference on Security Technology, University of Kentucky, 12-14 May 1982.
Memory 4 is an erasable memory intended to store the representation of the fingerprint pattern of the user. Entering the fingerprint pattern of the user into 4 the memory is effected in parallel with entering the voice characteristic of the user into the memory 2.
To this end the subscriber set is provided in a suitable place with a window 7-1 on which the relevant finger is placed.
Window 7-1 forms part of a converter 7 for converting the fingerprint pattern into a representation suitable for storage and/or processing. In addition, converter 7 comprises a lighting element 7-4, for example a small incandescent lamp, a camera 7-2 and an analogue-to-digital converter 7-3. Camera 7-2 is a television pick-up element which is known per se, for example a CTD (Charge Transfer Device3 clement. Such a television pick-up element is, for example, the Philips RGS-4 solid-state image sensor. In response to the pressure of the finger on the window 7-1 the lighting element 7-4 is switched on and camera 7-2 produces a signal representative of the fingerprint pattern.Under the control of processing unit 5 the camera signal is converted by anlogue-to-digital converter 7-3 into a set of digital code words which is either directly stored in memory 4 or is first processed by processing unit 5 and then stored in memory 4.
After the representation of the fingerprint pattern of the user has been stored in memory 4 a comparison is made with the representation of the fingerprint pattern of the authorized user. The manner in which this comparison is effected is known per se from the prior art, such as, for example, said United States Patent Specification and from said article of the "Carnahan Conference". If these two representations show sufficient correlation between each other, that is they are within a predetermined margin of each other, then the processing unit generates a second decision signal which indicates that the two representations of the finger-print patterns are sufficiently similar to be assumed to be produced by the same person.
With the first decision signal which relates to correlation of the voice characteristics, and the second decision signal which relates to the correlation of the fingerprints the subscriber set can now be enabled for communication. It is possible to enable the subscriber set if at least one of the decision signals indicates correlation; it is alternatively possible to only enable the set when both decision signals indicate correlation.
In the first case the probalility of nonrecognition of the authorized user is small, but it is possible that an unauthorized person may be erroneously identified as being authorized.
In the second case the probability of nonauthorized use is small, but the probability of non-recognition of an authorized user is increased. It is also possible to differentiate the enabling criteria on the basis of the intended use of the subscriber set. So it is, for example, possible that for expensive international connection both decision signals indicating correlation are required, whilst only one decision signal indicating correlation is required for the less expensive national connections.
Entering the personal characteristics of the authorized user can be effected outside the subscriber set. It is alternatively possible for the authorized person to enter his personal characteristics himself, after he has adjusted the subscriber set to a suitable state for that purpose, for example with the aid of a key, a magnetic identification card or with the aid of a nummerical code which is entered via a number selection unit.
When the personal characteristics are entered by the authorized user himself, the subscriber set is adjusted with the aid of mode selector 1 2 in one of the above-described ways to the state suitable for storing the personal characteristics of the authorized user.
In this state the supply means 8 and 9 only transfer the information from the converters 6 and 7 to the memories 1 and 3, respectively.
After the personal characteristics of the authorized user have been stored, the subscriber set is readjusted to the normal mode of usage by removing the key or the identification card or by applying an appropriated nummerical code.

Claims (10)

1. A method of determining whether a user is authorized to use a subscriber set for signal transmission and enabling the subscriber set if authorization is determined, said method comprising the steps of: comparing a representation of a first characteristic of the authorized user, which characteristic is stored within an authorization determining means, with a corresponding representation of the first characteristic entered by the user to the authorization determining means; producing a first decision signal indicating whether a sufficient correlation between the stored and entered representations of the first characteristic exists to imply that the user is the authorized user;; comparing a representation of a second characteristic of the authorized user, which characteristic is stored within the authorization determining means, with a corresponding representation of the second characteristic entered by the user into the authorization determining means; producing a second decision signal indicating whether a sufficient correlation between the stored and entered representations of the second characteristic exists to imply that the user is the authorized user; and enabling the subscriber set if the first and/or second decision signals indicate correlation between the stored and entered representations of the user characteristic.
2. A method according to Claim 1 in which the first characteristic is a voice characteristic.
3. A method according to Claim 1 or 2, in which the second characteristic is a finger or thumb point.
4. A method of determining whether a user is authorized to use a subscriber set for signal transmission and enabling the subscriber set if authorization is determined, the method being substantially as described herein with reference to the accompanying drawing.
5. A subscriber set for signal transmission including user authorization determining means, said user authorization determining means comprising means for storing a representation of a first characteristic of an authorized user; means for entering the first characteristic of a potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the first characteristic and producing a first decision signal which indicates whether a sufficient correlation exists between the representations of the stored and entered first characteristics to imply that both were produced by the same person, means for storing a representation of a second characteristic of an authorized user; means for entering the second characteristic of the potential user and producing a corresponding representation thereof; means for comparing the stored and entered representations of the second characteristic and producing a second decision signal which indicates whether a sufficient correlation exists between the representation of the stored and entered second characteristics to imply that both were produced by the same person; means for applying the first and second decision signals to a subscriber set enabling means for producing an enabling signal when the first and/or second decision signals indicate correlation between the stored and entered characteristic(s).
6. A subscriber set as claimed in Claim 5, in which the representations of the first and/or second characteristics of the authorized user are stored in one or more non-volatile memories which is/are programmed outside the subscriber set.
7. A subscriber set as claimed in Claim 5, in which the user authorization determining means comprises a first transducer for converting the first characteristic of the user into an electrical signal, a second transducer for converting the second characteristic of the user into an electrical signal, means for temporarily storing the electrical signals corresponding to the first and second characteristics of the user, and means for comparing the stored authorized user representations and the temporarily stored user representations.
8. A subscriber set as claimed in any of Claims 5, 6 or 7, comprising means for enabling the authorized user characteristics to be entered into one or more memories under the control of a switching arrangement actuated by the user.
9. A subscriber set as claimed in Claim 7, in which the switching arrangement is actuated under the control of a key.
10. A subscriber set for signal transmission substantially as described herein with reference to the accompanying drawing.
GB08426640A 1983-10-24 1984-10-22 Method of determining authorization of the user of a subscriber set Withdrawn GB2148569A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL8303649A NL8303649A (en) 1983-10-24 1983-10-24 METHOD FOR DETERMINING THE USE OF A USER OF A SUBSCRIBER FOR SIGNAL TRANSMISSION.

Publications (2)

Publication Number Publication Date
GB8426640D0 GB8426640D0 (en) 1984-11-28
GB2148569A true GB2148569A (en) 1985-05-30

Family

ID=19842601

Family Applications (1)

Application Number Title Priority Date Filing Date
GB08426640A Withdrawn GB2148569A (en) 1983-10-24 1984-10-22 Method of determining authorization of the user of a subscriber set

Country Status (9)

Country Link
JP (1) JPS60116263A (en)
AU (1) AU3463984A (en)
BE (1) BE900869A (en)
DE (1) DE3438106A1 (en)
FR (1) FR2553955A1 (en)
GB (1) GB2148569A (en)
IT (1) IT1175881B (en)
NL (1) NL8303649A (en)
SE (1) SE8405271L (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634570A1 (en) * 1988-07-22 1990-01-26 Reitter Renaud Multi-biometric authentication system
GB2229844A (en) * 1989-01-16 1990-10-03 Nat Res Dev Individual identification
GB2243934A (en) * 1990-05-09 1991-11-13 Shorrock Ltd Access control
GB2260670A (en) * 1991-10-18 1993-04-21 * Norm Pacific Automation Corporation Multi-functional telephone system with speech recognition and control device
AU698612B2 (en) * 1993-12-21 1998-11-05 Telia Ab Method and arrangement in calls from mobile stations
GB2334864A (en) * 1998-01-16 1999-09-01 Nec Corp Mobile phone has vector coded password protection
WO1999056482A1 (en) * 1998-04-23 1999-11-04 Siemens Aktiengesellschaft Radio equipment with enhanced user authentication possibilities
GB2342744A (en) * 1998-10-14 2000-04-19 Toshiba Kk User confirmation using biometrics
EP1039770A1 (en) * 1999-03-24 2000-09-27 Robert Bosch Gmbh A method and apparatus for getting access to a mobile communication apparatus, particularly digital mobile phone
GB2360166A (en) * 2000-03-07 2001-09-12 Mitel Corp Telephone call blocking using voice recognition
EP1156697A1 (en) * 2000-05-11 2001-11-21 Semiconductor Energy Laboratory Co., Ltd. Biometrical authentication in a communication system
US6496571B1 (en) * 1998-08-28 2002-12-17 Lucent Technologies Inc. Telecommunication system, method and telephone with personal caller identification capability
US6792287B1 (en) * 1998-07-02 2004-09-14 Nokia Mobile Phone Limited Electronic apparatus
US7333798B2 (en) * 2002-08-08 2008-02-19 Value Added Communications, Inc. Telecommunication call management and monitoring system
KR100854395B1 (en) * 2002-07-16 2008-08-26 엘지전자 주식회사 Method for controlling public telephone system using a finger print management function
US9521250B2 (en) 2002-08-08 2016-12-13 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4439068C2 (en) * 1994-11-02 1999-12-09 Deutsche Telekom Ag Method and device for protection against unauthorized use of communication connections
DE19515123C1 (en) * 1995-04-25 1996-08-22 Orga Kartensysteme Gmbh Smart card access control security protection system
DE19629687A1 (en) * 1996-07-23 1998-01-29 Bernd Laichinger Personal identity security device e.g. for cash cards
DE19645936A1 (en) * 1996-11-07 1998-05-14 Deutsche Telekom Ag Authorised user control method for telecommunications device
DE19645937B4 (en) * 1996-11-07 2007-10-04 Deutsche Telekom Ag Method and system for person-dependent control of a telecommunications terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1304555A (en) * 1969-11-20 1973-01-24
GB1403765A (en) * 1971-11-04 1975-08-28 Rothfjell Rolf Eric Identification of individuals
EP0010611A1 (en) * 1978-10-19 1980-05-14 Siemens Aktiengesellschaft Identity card
EP0082304A1 (en) * 1981-11-20 1983-06-29 Siemens Aktiengesellschaft Method of identifying a person by speech and face recognition, and device for carrying out the method
EP0086064A1 (en) * 1982-01-29 1983-08-17 Kabushiki Kaisha Toshiba Individual verification apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2941928C2 (en) * 1979-10-17 1986-04-10 Telefonbau Und Normalzeit Gmbh, 6000 Frankfurt Circuit arrangement for a telephone subscriber station
JPS57136238A (en) * 1981-02-16 1982-08-23 Nec Corp Information processor

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1304555A (en) * 1969-11-20 1973-01-24
GB1403765A (en) * 1971-11-04 1975-08-28 Rothfjell Rolf Eric Identification of individuals
EP0010611A1 (en) * 1978-10-19 1980-05-14 Siemens Aktiengesellschaft Identity card
EP0082304A1 (en) * 1981-11-20 1983-06-29 Siemens Aktiengesellschaft Method of identifying a person by speech and face recognition, and device for carrying out the method
EP0086064A1 (en) * 1982-01-29 1983-08-17 Kabushiki Kaisha Toshiba Individual verification apparatus

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634570A1 (en) * 1988-07-22 1990-01-26 Reitter Renaud Multi-biometric authentication system
GB2229844A (en) * 1989-01-16 1990-10-03 Nat Res Dev Individual identification
GB2243934A (en) * 1990-05-09 1991-11-13 Shorrock Ltd Access control
GB2260670A (en) * 1991-10-18 1993-04-21 * Norm Pacific Automation Corporation Multi-functional telephone system with speech recognition and control device
AU698612B2 (en) * 1993-12-21 1998-11-05 Telia Ab Method and arrangement in calls from mobile stations
US6249759B1 (en) 1998-01-16 2001-06-19 Nec Corporation Communication apparatus using speech vector comparison and recognition
GB2334864A (en) * 1998-01-16 1999-09-01 Nec Corp Mobile phone has vector coded password protection
GB2334864B (en) * 1998-01-16 2000-03-15 Nec Corp Communication apparatus
AU747731B2 (en) * 1998-01-16 2002-05-23 Nec Corporation Communication apparatus using speech recognition
WO1999056482A1 (en) * 1998-04-23 1999-11-04 Siemens Aktiengesellschaft Radio equipment with enhanced user authentication possibilities
US6466781B1 (en) * 1998-04-23 2002-10-15 Siemens Aktiengesellschaft Biometric authentication technology for wireless transceiver activation
US6792287B1 (en) * 1998-07-02 2004-09-14 Nokia Mobile Phone Limited Electronic apparatus
US6496571B1 (en) * 1998-08-28 2002-12-17 Lucent Technologies Inc. Telecommunication system, method and telephone with personal caller identification capability
GB2342744A (en) * 1998-10-14 2000-04-19 Toshiba Kk User confirmation using biometrics
GB2342744B (en) * 1998-10-14 2000-10-25 Toshiba Kk User confirmation system using biometrics and storage medium
EP1039770A1 (en) * 1999-03-24 2000-09-27 Robert Bosch Gmbh A method and apparatus for getting access to a mobile communication apparatus, particularly digital mobile phone
GB2360166A (en) * 2000-03-07 2001-09-12 Mitel Corp Telephone call blocking using voice recognition
EP1507431A1 (en) * 2000-05-11 2005-02-16 Semiconductor Energy Laboratory Co., Ltd. Biometrical authentication in a communication system
US8601009B2 (en) 2000-05-11 2013-12-03 Semiconductor Energy Laboratory Co., Ltd. Communication system
EP1156697A1 (en) * 2000-05-11 2001-11-21 Semiconductor Energy Laboratory Co., Ltd. Biometrical authentication in a communication system
KR100854395B1 (en) * 2002-07-16 2008-08-26 엘지전자 주식회사 Method for controlling public telephone system using a finger print management function
US9699303B2 (en) 2002-08-08 2017-07-04 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US9888112B1 (en) 2002-08-08 2018-02-06 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US9521250B2 (en) 2002-08-08 2016-12-13 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US9560194B2 (en) 2002-08-08 2017-01-31 Global Tel*Link Corp. Telecommunication call management and monitoring system with voiceprint verification
US9686402B2 (en) 2002-08-08 2017-06-20 Global Tel*Link Corp. Telecommunication call management and monitoring system with voiceprint verification
US7333798B2 (en) * 2002-08-08 2008-02-19 Value Added Communications, Inc. Telecommunication call management and monitoring system
US9843668B2 (en) 2002-08-08 2017-12-12 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US8948350B2 (en) 2002-08-08 2015-02-03 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US9930172B2 (en) 2002-08-08 2018-03-27 Global Tel*Link Corporation Telecommunication call management and monitoring system using wearable device with radio frequency identification (RFID)
US10069967B2 (en) 2002-08-08 2018-09-04 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US10091351B2 (en) 2002-08-08 2018-10-02 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US10135972B2 (en) 2002-08-08 2018-11-20 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US10230838B2 (en) 2002-08-08 2019-03-12 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US10721351B2 (en) 2002-08-08 2020-07-21 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US10944861B2 (en) 2002-08-08 2021-03-09 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification
US11496621B2 (en) 2002-08-08 2022-11-08 Global Tel*Link Corporation Telecommunication call management and monitoring system with voiceprint verification

Also Published As

Publication number Publication date
JPS60116263A (en) 1985-06-22
GB8426640D0 (en) 1984-11-28
SE8405271L (en) 1985-04-25
AU3463984A (en) 1985-05-02
IT1175881B (en) 1987-07-15
NL8303649A (en) 1985-05-17
IT8423254A0 (en) 1984-10-19
FR2553955A1 (en) 1985-04-26
IT8423254A1 (en) 1986-04-19
DE3438106A1 (en) 1985-05-02
BE900869A (en) 1985-04-22
SE8405271D0 (en) 1984-10-22

Similar Documents

Publication Publication Date Title
GB2148569A (en) Method of determining authorization of the user of a subscriber set
US6466781B1 (en) Biometric authentication technology for wireless transceiver activation
US5987155A (en) Biometric input device with peripheral port
US5144680A (en) Individual identification recognition system
US4827518A (en) Speaker verification system using integrated circuit cards
US6076055A (en) Speaker verification method
US20060156395A1 (en) Security device and terminal and method for their communication
EP0099476A2 (en) Identity verification system
US20040139333A1 (en) Information storing apparatus
CN101494690A (en) Mobile terminal and unlocking method thereof
EP1423821A1 (en) Method and apparatus for checking a person&#39;s identity, where a system of coordinates, constant to the fingerprint, is the reference
JP2004506253A (en) Biometric identity check
WO2001023982A1 (en) User configurable levels of security for a speaker verification system
US20030040339A1 (en) Method and system for accessing functions of a portable information appliance
CA2104850C (en) Speech password system
US8032380B2 (en) Method of accessing a dial-up service
CN108985035B (en) Control method and device for user operation authority, storage medium and electronic equipment
JPH09171547A (en) Ic card with finger print reading function
US6931110B2 (en) System and method for implementing calling card security and secured calling card
EP1454286B1 (en) Method and device for matching fingerprints
KR100337141B1 (en) security system for permitting/nonpermitting to come in and go out security region by distinguish authorized/unauthorized person and method for distinguishing the same
CN109934591A (en) A kind of method and mobile terminal ensureing safety of payment
US20050015630A1 (en) Personal authentication processing device, locking/unlocking management apparatus, and locking/unlocking management system
Manabe et al. Security evaluation of biometrics authentications for cellular phones
JP3592415B2 (en) Speaker recognition system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)