GB2329498A - Data carrier and method for controlling activation of a security feature - Google Patents
Data carrier and method for controlling activation of a security feature Download PDFInfo
- Publication number
- GB2329498A GB2329498A GB9719876A GB9719876A GB2329498A GB 2329498 A GB2329498 A GB 2329498A GB 9719876 A GB9719876 A GB 9719876A GB 9719876 A GB9719876 A GB 9719876A GB 2329498 A GB2329498 A GB 2329498A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data carrier
- parameter
- stored
- input
- security feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A data carrier 10 is provided for use with a device e.g. cellular telephone. One of the carrier and the device has a security feature. The data carrier includes an interface 26, arranged for communicating with the device, a memory 22 arranged for storing at least one parameter 23, and a security agent 24 arranged for comparing an input parameter received from the interface with the stored parameter to provide a comparison value, and further arranged for processing the comparison value according to a set of rules, in order to derive a control signal. The control signal is used for controlling the activation of the security feature. For example, the parameter may be the time interval between first and second key actuations during entry of a PIN number, being compared with the previous such value. Temperature, pressure and call area codes can also be used.
Description
DATA CARRIER AND METHOD FOR CONTROLLING ACIIVATION OF
A SECURITY FEATURE
Field of the Invention
This invention relates to data carriers, and particularly but not exclusively to data carriers for use in communication networks.
Background of the Invention
Data carriers, such as smart-cards, are widely used with portable communications devices such as cellular telephones, to provide subscriber information and, amongst other things, security features.
For example, a SIM (subscriber information module) card for use with a cellular telephone may have an associated PIN (personal identification number), which a user must provide to the telephone in order to activate the
SIM card and turn on the telephone, in order to make a call.
A problem with this arrangement is that if the telephone is stolen while switched on, or the PIN protection is either disabled or compromised, then the telephone can be used by an unauthorised person to make unwanted calls.
A further problem is that the unwanted calls are not typically detected at the time they are made, causing call charges which are borne either by the service provider or the subscriber.
Typically a SIM card is only blocked (disabled) once it has been reported stolen, or once a fraudulent call has been detected.
There is therefore a need to provide an improved security arrangement which reduces the likelihood of fraudulent calls. This invention seeks to provide a data carrier and method which mitigates the above mentioned disadvantages.
Summarv of the Invention
According to a first aspect of the present invention there is provided a data carrier for use with a device, at least one of the data carrier and the device having a security feature, the data carrier comprising; an interface, arranged for communicating with the device; a memory arranged for storing at least one parameter; and, a security agent arranged for comparing an input parameter received from the interface with the stored parameter to provide a comparison value, and further arranged for processing the comparison value according to a set of rules, to derive a control signal; wherein the control signal is used for controlling the activation of the security feature.
Preferably the security agent is provided as software stored in the memory, for execution by a processor. Alternatively the security agent is provided as a logic circuit.
According to a second aspect of the present invention there is provided a method for controlling activation of a security feature of a device, comprising the steps of: storing a parameter in a memory; measuring an input parameter at an input; comparing the input parameter with at least one stored parameter to produce a comparison value; processing the comparison value using a set of rules to provide a control signal; and, controlling the activation of the security feature in dependence upon the control signal.
Preferably the set of rules are updated in dependence upon previous activity of the security agent. The input and stored parameters are preferably derived from an attribute of a user interface coupled to the input.
Alternatively the input and stored parameters are derived from an attribute of the device.
Preferably one or more of the at least one stored parameter is a previous input parameter, or is derived from a previous input parameter.
Preferably one or more of the at least one stored parameter is obtained from a remote source, the remote source being accessed via a communications network arranged for coupling to the device.
Preferably the at least one stored parameter relates to communications between the device and the network, the network being a cellular communications network and the device being a portable cellular communications device.
Preferably the at least one stored parameter includes information relating to selcted cells of the cellular communications network. The security feature preferably prevents operation of the device.
Brief Description of the Drawings
An exemplary embodiment of the invention will now be described with reference to the drawing in which:
FIG. 1 shows a preferred embodiment of a data carrier in accordance with the invention.
FIG. 2 shows a portable communications device incorporating the data carrier of FIG. 1.
FIG. 3 shows a flow diagram of a method incorporating the data carrier of
FIG. 1.
Detailed Description of a Preferred Embodlment Referring to FIG. 1, there is shown a data carrier in the form of a smartcard 10 for use with a portable communications device. The smart-card 10 is credit-card sized, and contains an encapsulated circuit 20 and a transducer 30, such as a temperature sensor.
The encapsulated circuit 20 contains a memory 22, having a stored parameter 23 and a security agent 24, to be further described below. The encapsulated circuit 20 also includes a microprocessor 25 and an interface 26.
The security agent 24 is a software algorithm of the type known as an intelligent agent", which uses fuzzy logic and self-learning features. The security agent 24 operates according to a set of 'rules' which are contained within the algorithm, and which are used to determine the outcome of any operation performed. The rules are updated periodically by the security agent 24, as it 1earns' about the activities of the smart-card to. The security agent 24 uses the processor 25 in a semi-autonomous manner, and is arranged to take control of the processor 25 whenever necessary.
Referring now also to FIG. 2, there is shown a portable cellular telephone 40, having a display screen 41, a keypad 42 and a smart-card reader 45. The smart-card 10 is inserted into the smart-card reader 45. The smart-card 10 is arranged to communicate with the telephone 40 via the interface 26, which, when inserted into the smart-card reader 45, couples to internal terminals (not shown).
When switched on, the portable cellular telephone 40 operates at least partially under the control of the smart-card 10. A PIN number is stored in the memory 22. A start-up routine either within the memory 22 or within the telephone 40 may cause the cause the telephone 40 to be inoperable until the user has entered a series of numbers via the keypad 42, which correspond to the PIN number stored in the memory 22. If the correct number is not entered, use of the telephone 40 to make a call is prevented.
If the correct number has been entered, the telephone 40 can be used to make a call.
In a prior art arrangement, if the PIN number is compromised in some way, an unauthorised user could enter the correct PIN number and make a call.
In operation, and referring now also to FIG. 3, an enhanced security method is provided as follows. While entering a PIN number, a user presses a first key of the keypad 42 (block 110). The security agent 24 initiates a timer within the processor 25 (block 110). When a second key is pressed by the user (block 115) the timer is stopped (block 120). The time between the first and the second key presses is calculated (block 125).
A previous time period is stored in the memory 22, as parameter 23. This indicates the time between the first and the second key presses of a previous
PIN number entry. The parameter 23 (and block 160) is compared with the calculated value (block 130). The security agent 24 then decides how the calculated value relates to the previous value (block 135), and provides a control signal indicating whether or not a suspicious situation has been detected. This decision could be based on a rigid comparison of the values, or it could incorporate a tolerance factor, provided by the rules of the algorithm within the security agent 24. In this way standard fuzzy logic methods and self-learning regimes within the security agent 24 can be used to provide a tolerance or weighting factor, such that the decision provides a good balance between minimum disruption for a legitimate user, and maximum possibility to prevent unauthorised use.
If the calculated time is greater than that allowed according to the rules, then further use of the telephone 40 is blocked (block 140). If the decision is that the calculated time is less than that allowed according to the rules, then the security agent 24 allows the telephone 40 to be used (block 145). The parameter 23 is then re-calculated, based on the previous parameter value 23 and the presently calculated value (block 150). The re-calculated parameter 23 is then stored in the memory 22, overwriting the previous value (block 155 and 160). The rules may also be updated, to take account of this activity.
In this way, if an unauthorised user obtains the PIN number for the smartcard, there is a good possibility that the unauthorised user may enter the
PIN number appreciably slower than a legitimate user would, and the security agent 24 will recognise the much slower entry of the PIN number, and block, or at least temporarily disable the functionality of the telephone 40.
Other security features could be activated, other than a PIN number request, when suspicious operation of the telephone 40 is detected by the security agent 24.
For example, an alert message could be secretly sent to a remote site without the users knowledge, such as a base station of the communications network to which the telephone 40 is arranged to operate. This alert message could then be used by a service provider of the communications network, in order to call the telephone 40, such that an operator of the service provider then asks the user for a verification password or other verifying information about the user (date of birth, mother's maiden name, etc..) before allowing any further use of the telephone 40.
Alternatively, in response to suspicious activity, the security agent could request a second, longer PIN number,thus verifying that the user knows not only the first PIN, but a second, further PIN.
Embodiments may be envisaged, either in combination with, or as an alternative to the above. The telephone 40 may be switched on by a legitimate user, but then stolen by a thief while still switched on. In this case, the thief may not know the PIN number, but the telephone 40 can still be used to make calls until it is switched off. In this situation, the security agent 24 may be arranged to monitor a parameter other than the speed of keypad presses. In one example, the transducer 30 of the smart-card 10 is used to gather information from the environment in which the smart-card 10 is situated. The transducer may be a temperature or a pressure sensor.
The security agent 24 may be arranged to gather temperature readings, and to ask the user for the PIN number if a temperature reading is unusually high or low, for example.
In another example, information relating to calls could be used, such as the typical area codes used for past calls. An example of this would be a user who makes all calls to or within a particular city, such as London,
England. In this case, all calls would, as of 1997, be preceded by the digits 0171 or 0181. The security agent 24 gathers call information, and the algorithm rules and the stored parameter then reflect that all calls begin with these digits. If a call is attempted which was not preceded by 0171 or 0181, the user would be asked for the PIN number, in order to verify that the user is authorised.
In this way, even if the telephone 40 is stolen while switched on, one or more security features may be invoked by the security agent 24, when suspicious activity is detected.
The security agent 24 may be arranged to use a number of different attributes, either singly or in combination, to detect suspicious activity. In addition to the keypad, temperature and call examples used above, other attributes may be used.
It will be appreciated that other embodiments to the one described above are possible. For example, the parameter 23 could be provided or at least influenced by the service provider of the communications network. It is also envisaged that a further security agent be provided at a base station of the communications network.
In this way the service provider may determine the level of security, perhaps in dependence upon the number of reported thefts of telephones.
Additionally the security agent of the service provider and/or the telephone 40 may gain information concerning the cells in which the telephone 40 has been used. In this way if a call attempted in a cell which has not previously been used by the telephone 40, one or more of the security features mentioned above is invoked by the security agent 24.
The smart-card could be provided without the transducer 30, or alternatively could be provided with an alternative inputloutput device.
It will also be appreciated that the above arrangement is not limited to smart-cards, but the security agent may also be incorporated directly within a portable communications device. Additionally, the above arrangement could be used with a smart-card for use in other applications, such as financial transaction cards and identity cards.
Furthermore, the security agent 24 need not be implemented in software. A hardware or firmware solution is also possible.
Claims (15)
1. A data carrier for use with a device, at least one of the data carrier and the device having a security feature, the data carrier comprising;
an interface, arranged for communicating with the device;
a memory arranged for storing at least one parameter; and,
a security agent arranged for comparing an input parameter received from the interface with the stored parameter to provide a comparison value, and further arranged for processing the comparison value according to a set of rules, to derive a control signal; wherein the control signal is used for controlling the activation of the security feature.
2. The data carrier of claim 1 wherein the security agent is provided as software stored in the memory, for execution by a processor.
3. The data carrier of claim 1 wherein the security agent is provided as a logic circuit.
4. A method for controlling activation of a security feature of a device, comprising the steps of: storing a parameter in a memory; measuring an input parameter at an input; comparing the input parameter with at least one stored parameter to produce a comparison value; processing the comparison value using a set of rules to provide a control signal; and, controlling the activation of the security feature in dependence upon the control signal.
5. The data carrier or method of any preceding claim, wherein the set of rules are updated in dependence upon previous activity of the security agent.
6. The data carrier or method of any preceding claim, wherein the input and stored parameters are derived from an attribute of a user interface coupled to the input.
7. The data carrier or method of any one of claims 1 to 6, wherein the input and stored parameters are derived from an attribute of the device.
8. The data carrier or method of any preceding claim, wherein one or more of the at least one stored parameter is a previous input parameter.
9. The data carrier or method of any preceding claim, wherein one or more of the at least one stored parameter is derived from a previous input parameter.
10. The data carrier or method of any preceding claim, wherein one or more of the at least one stored parameter is obtained from a remote source.
11. The data carrier or method of claim 10 wherein the remote source is accessed via a communications network arranged for coupling to the device.
12. The data carrier or method of claim 11, wherein the at least one stored parameter relates to communications between the device and the network.
13. The data carrier or method of claim 11, wherein the network is a cellular communications network and wherein the device is a portable cellular communications device.
14. The data carrier or method of claim 13, wherein the at least one stored parameter includes information relating to selected cells of the cellular communications network.
15. The data carrier or method of any preceding claim, wherein the security feature prevents operation of the device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9719876A GB2329498A (en) | 1997-09-19 | 1997-09-19 | Data carrier and method for controlling activation of a security feature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9719876A GB2329498A (en) | 1997-09-19 | 1997-09-19 | Data carrier and method for controlling activation of a security feature |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9719876D0 GB9719876D0 (en) | 1997-11-19 |
GB2329498A true GB2329498A (en) | 1999-03-24 |
Family
ID=10819284
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9719876A Withdrawn GB2329498A (en) | 1997-09-19 | 1997-09-19 | Data carrier and method for controlling activation of a security feature |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2329498A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2817989A1 (en) * | 2000-12-11 | 2002-06-14 | Sagem | Mobile telephone based remote alarm system having memory memorizing expected signals and where signals received different alarm signal raised, remote telephone call procedure raised. |
GB2457335A (en) * | 2008-01-21 | 2009-08-19 | H W Comm Ltd | A wearable device indicating if a current wearer is the habitual wearer of the device. |
EP2229019A1 (en) * | 2009-03-11 | 2010-09-15 | Gemalto SA | Method for avoiding malicious uses of a SIM card inserted in an M2M device and M2M device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4582985A (en) * | 1981-03-18 | 1986-04-15 | Loefberg Bo | Data carrier |
US5180901A (en) * | 1990-05-21 | 1993-01-19 | Kabushiki Kaisha Toshiba | IC card with individual authentication function |
EP0602319A1 (en) * | 1992-12-14 | 1994-06-22 | DeTeMobil Deutsche Telekom MobilNet GmbH | Method for securing a mobile wireless apparatus against unauthorized use |
EP0750438A1 (en) * | 1995-06-19 | 1996-12-27 | Nokia Mobile Phones Ltd. | Mobile station security |
EP0776141A2 (en) * | 1995-11-24 | 1997-05-28 | Nokia Telecommunications Oy | Checking the Personal Identification Number of a mobile subscriber |
EP0781065A2 (en) * | 1995-12-21 | 1997-06-25 | Alcatel Mobile Phones | Method for securing the usage of a terminal of a cellular radio communication system, terminal and user-card therefor |
GB2309860A (en) * | 1996-01-31 | 1997-08-06 | Motorola Inc | Wireless communication device adapted to prevent fraud |
-
1997
- 1997-09-19 GB GB9719876A patent/GB2329498A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4582985A (en) * | 1981-03-18 | 1986-04-15 | Loefberg Bo | Data carrier |
US5180901A (en) * | 1990-05-21 | 1993-01-19 | Kabushiki Kaisha Toshiba | IC card with individual authentication function |
EP0602319A1 (en) * | 1992-12-14 | 1994-06-22 | DeTeMobil Deutsche Telekom MobilNet GmbH | Method for securing a mobile wireless apparatus against unauthorized use |
EP0750438A1 (en) * | 1995-06-19 | 1996-12-27 | Nokia Mobile Phones Ltd. | Mobile station security |
EP0776141A2 (en) * | 1995-11-24 | 1997-05-28 | Nokia Telecommunications Oy | Checking the Personal Identification Number of a mobile subscriber |
EP0781065A2 (en) * | 1995-12-21 | 1997-06-25 | Alcatel Mobile Phones | Method for securing the usage of a terminal of a cellular radio communication system, terminal and user-card therefor |
GB2309860A (en) * | 1996-01-31 | 1997-08-06 | Motorola Inc | Wireless communication device adapted to prevent fraud |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2817989A1 (en) * | 2000-12-11 | 2002-06-14 | Sagem | Mobile telephone based remote alarm system having memory memorizing expected signals and where signals received different alarm signal raised, remote telephone call procedure raised. |
GB2457335A (en) * | 2008-01-21 | 2009-08-19 | H W Comm Ltd | A wearable device indicating if a current wearer is the habitual wearer of the device. |
EP2229019A1 (en) * | 2009-03-11 | 2010-09-15 | Gemalto SA | Method for avoiding malicious uses of a SIM card inserted in an M2M device and M2M device |
WO2010102954A1 (en) * | 2009-03-11 | 2010-09-16 | Gemalto Sa | Method for preventing the malicious use of a sim card inserted in an m2m device and m2m device |
US9179317B2 (en) | 2009-03-11 | 2015-11-03 | Gemalto Sa | Method for preventing the malicious use of a SIM card inserted in an M2M device and M2M device |
Also Published As
Publication number | Publication date |
---|---|
GB9719876D0 (en) | 1997-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101516391B1 (en) | Method of securing access to a proximity communication module in a mobile terminal and apparatus and program media therefor | |
US7174159B2 (en) | Method of securing a mobile telecommunication terminal | |
US9246903B2 (en) | Authentication method | |
US8782426B2 (en) | Security for a personal communication device | |
US8640950B2 (en) | Method and apparatus for contactless payment authentication | |
US6934689B1 (en) | Payment transaction method and payment transaction system | |
RU2111615C1 (en) | Unauthorized communication barring method for radiotelephone and radiotelephone system access control method | |
US6836654B2 (en) | Anti-theft protection for a radiotelephony device | |
US8463234B2 (en) | Method for providing security services by using mobile terminal password and mobile terminal thereof | |
US6799272B1 (en) | Remote device authentication system | |
US6463276B1 (en) | Mobile terminal having conditional blocking of outgoing call requests | |
US6360092B1 (en) | Remote unblocking of access to a telecommunication service | |
EP1549090A2 (en) | Apparatus and method for controlling use of a SIM card of a mobile terminal | |
US20020038422A1 (en) | Authentication system capable of maintaining security and saving expenses | |
US20010047479A1 (en) | Method and apparatus for checking access authorization for a system | |
KR20010041363A (en) | Method, arrangement and apparatus for authentication through a communications network | |
WO2000062214A1 (en) | Credit card security technique | |
CN101507247A (en) | Method for call-theft detection | |
US6370400B1 (en) | Method for avoiding fraudulent use of a mobile radiotelephone by blocking an interface after a certain inactive period of time and mobile radiotelephone performing the same | |
US6047070A (en) | Process for ensuring a securing interface between a telephone with a card and the network in a telephone system | |
GB2329498A (en) | Data carrier and method for controlling activation of a security feature | |
WO1998000956A2 (en) | System and method for preventing cellular fraud | |
KR100591341B1 (en) | Mobile Communication Device enable to User Authentification Using Smart card and its authentificating method | |
WO1993021720A1 (en) | Methods and apparatus for controlling access to toll free telephone service | |
KR100605955B1 (en) | Tele-banking method using mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |