GB2405287A - A telecommunications service access control method - Google Patents

A telecommunications service access control method Download PDF

Info

Publication number
GB2405287A
GB2405287A GB0319564A GB0319564A GB2405287A GB 2405287 A GB2405287 A GB 2405287A GB 0319564 A GB0319564 A GB 0319564A GB 0319564 A GB0319564 A GB 0319564A GB 2405287 A GB2405287 A GB 2405287A
Authority
GB
United Kingdom
Prior art keywords
network
service
telecommunications
access control
control method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0319564A
Other versions
GB0319564D0 (en
Inventor
Bart Reynaert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Priority to GB0319564A priority Critical patent/GB2405287A/en
Publication of GB0319564D0 publication Critical patent/GB0319564D0/en
Publication of GB2405287A publication Critical patent/GB2405287A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42229Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location
    • H04M3/42263Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location where the same subscriber uses different terminals, i.e. nomadism
    • H04M3/42272Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location where the same subscriber uses different terminals, i.e. nomadism whereby the subscriber registers to the terminals for personalised service provision
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/54Arrangements for diverting calls for one subscriber to another predetermined subscriber

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

In order to prevent malicious accessing of a telecommunications service such as call forwarding a person accessing the service is required to enter a personal identification number or PIN. In doing this a network identity is held in memory and if a predetermined security event occurs such as the incorrect PIN being entered more than a predetermined number of times the network identity is retrievable. Thus, the terminal used for the possibly malicious attempt to access the service is identified.

Description

1 2405287 A telecommunications service access control method This
invention relates to a telecommunications service access control method.
It is now possible for a subscriber to access telecommunications services from a terminal other than his or her own. This is useful where the subscriber is travelling or working from a different location for example.
A problem with this is that it is also possible to non-authorised persons to attempt to use the services at the subscriber's expense. To counter this possibility it is known to require a Personal Identification Number (PIN) to be entered before the services are provided. A number of attempts are usually allowed to cater for mistakes by the true subscriber before the call is terminated. However, it is then possible for another series of attempts to be made.
It will be appreciated that some services are expensive to subscribe to and are thus of sufficient value to a fraudster for the fraudster to persist until successful. The network operator will often write of the cost of such a fraud for the sake of maintaining goodwill with the subscriber. Thus the effects of such fraudulent use can have a significant financial impact.
According to the invention there is provided a telecommunications service access control method comprising accepting a call from a network terminal having a network identity which call attempting to access a service; storing the network identity; initializing a security step as a condition of providing the service; monitoring the security step and when a predetermined security condition occurs providing the network operator the stored network identity.
By storing the network identity and providing it to the network operator after a predetermined security condition has occurs it is possible to determine the network terminal from which the access attempt was made. Thus if the security condition is one which indicates an unauthorised or fraudulent attempt to access the services it is possible to provide the terminal identifier to the authorities for action or for the network operator to take action directly.
À.. ..
À's: : :.:* .e.e À:- .-: À:- À À.. e..
The network identifier may be the terminal's telephone number, the Anumber or some other identifier.
The security step may involve the entry of a character such as a number or letter or other symbol from the terminal or a spoken command. In the specific embodiment, a personal identification number or PIN is requested and the user of the network terminal enters the number on the terminal's keypad. If the wrong number is entered a predetermined number of times then the predetermined security condition occurs.
A specific embodiment of the invention will now be described with reference to the drawings in which: Figure 1 shows a telecommunications system operating in accordance with the invention.
As is shown in figure 1, a telecommunications system 1 comprises two or more local telephone system 3 and 4 linked over the public switched telephone network 5. The local telephone system 3 comprise a number of terminals 6, 7 and 8, a local exchange 9, a carrier switch 10 and associated carrier switch controller 11 and memory 12.
The terminals 6 to 8 are able to access services such as call forwarding. In the call forwarding service call destined for say terminal 6 may be directed to another terminal such as 8 in a different part of the building served by the local telephone exchange or indeed to terminals in other parts of the network. In this way a user may ensure that he or she need not miss calls when working at another desk.
In order to prevent mischievous or malicious forwarding of the calls by non- authorised persons a personal identification number (PIN) is required to modify or activate the call forwarding service. The use of a PA is known in existing systems.
The use of a PIN is helpful but unfortunately does not offer complete security. With some persistence a number of attempts may be made to access the system and eventually the correct combination of numbers derived.
À.. ..
À:. ... À:e.. - : : À - À . In this system, a number of incorrect attempts at the PIN entry are allowed. However, if the number of attempts exceeds a preset number which in the preferred embodiment is five then the identification of the calling terminal being used for the PIN entry is supplied to the network operator.
Let us suppose that terminal 13 is being used for the attempt at call forwarding to direct calls from terminal 7 to terminal 13. The connection is established across the local network 4, the network 5, the carrier switch 10 and to the local exchange 9 serving the terminal 7 in a manner well known to a person skilled in the art.
In the course of establishing the connection an identifier which in this case is that referred to in the art as an "A side number" is transmitted to the carrier switch 10.
The identifier is stored by the switch controller 11 in the memory 12. With the call established to the local telephone exchange 9 the user then inputs the required command to enter the call forwarding service and a PIN number. If after three attempts the input PIN is wrong then the call is terminated. The local telephone exchange 9 then creates a flag to indicate that the predetermined security condition has occurred and the network operator can retrieve from the memory 12 the A side number.
In some embodiments of the invention, the retrieval of the identifier may take place in an automatic way and the identifier may be stored at different nodes in the network.
The identifier may be provided to the authorised user of the terminal along with an indication that the security condition has been occurred. The user may retrieve this information when they next use their usual terminal either by logging on to a user account or by the local exchange 9 producing a different dialling tone to the normal one.
use ee.
À:- .. e. -a. -e::: À .

Claims (5)

  1. Claims 1. A telecommunications service access control method comprising
    accepting a call from a network terminal having a network identity which call attempting to access a service; storing the network identity; initialising a security step as a condition of providing the service; monitoring the security step and when a predetermined security condition occurs providing the network operator the stored network identity.
  2. 2. A telecommunications method as claimed in claim l wherein the network identifier is an A side number.
  3. 3. A telecommunications method as claimed in claim 1 or claim 2 wherein the security step includes an input of personal identification number.
  4. 4. A telecommunications method as claimed in claim 3 wherein the predetermined security condition occurs when the personal identification number has been incorrectly input a predetermined number of times.
  5. 5. A telecommunications service access control method substantially as hereinbefore described with reference to and as illustrated by the drawing.
    À .. .. - À. À. e. ' ., .. : À. À -
GB0319564A 2003-08-20 2003-08-20 A telecommunications service access control method Withdrawn GB2405287A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0319564A GB2405287A (en) 2003-08-20 2003-08-20 A telecommunications service access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0319564A GB2405287A (en) 2003-08-20 2003-08-20 A telecommunications service access control method

Publications (2)

Publication Number Publication Date
GB0319564D0 GB0319564D0 (en) 2003-09-24
GB2405287A true GB2405287A (en) 2005-02-23

Family

ID=28459993

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0319564A Withdrawn GB2405287A (en) 2003-08-20 2003-08-20 A telecommunications service access control method

Country Status (1)

Country Link
GB (1) GB2405287A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203052B (en) * 2007-12-24 2012-06-27 华为技术有限公司 Method and apparatus for preventing malice business request

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0541435A1 (en) * 1991-11-07 1993-05-12 Fujitsu Limited System and method of detecting unauthorized use of identifiers for computer access
EP0601659A1 (en) * 1992-12-07 1994-06-15 Koninklijke KPN N.V. Method for protecting a smart card system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0541435A1 (en) * 1991-11-07 1993-05-12 Fujitsu Limited System and method of detecting unauthorized use of identifiers for computer access
EP0601659A1 (en) * 1992-12-07 1994-06-15 Koninklijke KPN N.V. Method for protecting a smart card system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203052B (en) * 2007-12-24 2012-06-27 华为技术有限公司 Method and apparatus for preventing malice business request

Also Published As

Publication number Publication date
GB0319564D0 (en) 2003-09-24

Similar Documents

Publication Publication Date Title
US5163086A (en) Telephone network credit card calling apparatus and method of operation to determine validation and fraudulent use of credit cards in placing telephone calls
CA2013374C (en) Authenticated communications access service
US5022067A (en) Telephone call security system
US5982866A (en) Method and apparatus for forwarding caller identification for a credit card or calling card call to an automatic number identification system of a telephone network
ES2201057T3 (en) TELEPHONE SERVICES CENTER FOR INTERURBAN COMMUNICATIONS.
CA2257992C (en) A method and system for communication access restriction
US5274695A (en) System for verifying the identity of a caller in a telecommunications network
CA2177092C (en) True family telecommunication service
US5517559A (en) Apparatus for and method of verifying service user's information
US5684867A (en) Remote data access for operator assistance calls
WO2000035178A2 (en) Method and device for access control by use of mobile phone
US20050185784A1 (en) Method and electronic device for selective telephone call screening
US20020097854A1 (en) Ani-based dialing in telephone networks
US6370400B1 (en) Method for avoiding fraudulent use of a mobile radiotelephone by blocking an interface after a certain inactive period of time and mobile radiotelephone performing the same
EP0722241A2 (en) Secure access telephony server system
GB2405287A (en) A telecommunications service access control method
EP1119147A1 (en) Provision of secure access for telecommunications system
EP0805580A2 (en) A fraud control system for processing calls with an automatic number identification failure
GB2285200A (en) An analogue mobile telephone system
SE469707B (en) Method and device for authorization checking for telecommunications services
US6198810B1 (en) Authentication system for a communication network
US20020080941A1 (en) Message card
JPH06253022A (en) Public line call control system outside id management
US5883949A (en) Method for a private branch communications exchange to activate a night service configuration
JP3288294B2 (en) Call service regulation method by subscriber's password input in telephone exchange

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)