JPH0715429A - Detection method of disapproved usage discrimination signal - Google Patents

Detection method of disapproved usage discrimination signal

Info

Publication number
JPH0715429A
JPH0715429A JP5012468A JP1246893A JPH0715429A JP H0715429 A JPH0715429 A JP H0715429A JP 5012468 A JP5012468 A JP 5012468A JP 1246893 A JP1246893 A JP 1246893A JP H0715429 A JPH0715429 A JP H0715429A
Authority
JP
Japan
Prior art keywords
subscriber
identification signal
subscriber station
unauthorized use
exchange
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP5012468A
Other languages
Japanese (ja)
Other versions
JP2759732B2 (en
Inventor
Stefan Scheinert
シェイネルト ステファン
Christoph Grauel
グロウエル クリストフ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Philips Gloeilampenfabrieken NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Gloeilampenfabrieken NV filed Critical Philips Gloeilampenfabrieken NV
Publication of JPH0715429A publication Critical patent/JPH0715429A/en
Application granted granted Critical
Publication of JP2759732B2 publication Critical patent/JP2759732B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

PURPOSE: To prevent a calling charge from being added to the charge of another subscriber by operating an identification signal which is likely to be obtained without any authorization due to the wire tapping of the exchange of information passing through a message transmission channel. CONSTITUTION: In a message transmission system, fixed data such as a subscriber number and the identification code of a subscriber's station stored in the subscriber's station are compared with fixed data stored in a switchboard and evaluated during the set-up of connection and evaluated. Then, additional variable data are allowed to exist in a subscriber's station T and a switchboard Z. A time of achieving connection with the switchboard, the fixed data and the variable data are both transmitted, compared, and evaluated. At the time of detecting the unauthorized use of an identification signal assigned to the subscriber's station, the number of times of the successful connection of the subscriber's station is used as the variable data, the subscriber's station and the switchboard are respectively provided with counters ZZ and ZZ1, and the counting positions of those counters are increased only by 1 at each time of successful connection.

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【産業上の利用分野】本発明は、メッセージ伝送システ
ムにおいて、接続のセット・アップ中に、加入者局にお
いて記憶された加入者番号、加入者局の識別符号のよう
な固定データを交換機において記憶された固定データと
比較し、評価し、追加の可変データを加入者局および交
換機に存在させ、交換機への接続を達成する際、固定デ
ータと可変データとを一緒に伝送し、比較し、評価し、
加入者局に割当てられた識別信号の不認可使用を検出す
る方法に関するものである。
BACKGROUND OF THE INVENTION 1. Field of the Invention In a message transmission system, the present invention stores fixed data such as a subscriber number and a subscriber station identification code stored in a subscriber station in a switch during connection setup. The fixed data and the variable data are transmitted together, evaluated, and the additional variable data is present in the subscriber station and the exchange, and when the connection to the exchange is achieved, the fixed data and the variable data are transmitted together, compared, and evaluated. Then
The present invention relates to a method for detecting unauthorized use of an identification signal assigned to a subscriber station.

【0002】メッセージ伝送システムの異なる加入者局
間を区別する為には、いわゆる識別信号を用いることが
できる。一般に呼出し料金は加入者局の識別符号に基づ
いて計算される。
To distinguish between different subscriber stations of a message transmission system, so-called identification signals can be used. Call charges are generally calculated based on the subscriber station identification code.

【0003】[0003]

【従来の技術】無線伝送システムでは、移動無線局にお
いて開始される通話の料金計算は無線交換機で行われ
る。ドイツ連邦共和国特許第24.19.615 号明細書には、
無線伝送システムにおける移動無線局の識別信号(加入
者番号および識別符号) の不認可使用を検出しうる加入
者局 (移動無線局) 識別方法が記載されている。移動無
線局では識別信号発生器、例えば磁気カード内に識別信
号が記憶されている。移動無線局を動作させる為には、
識別信号発生器を移動無線局の制御ユニットのスロット
内に挿入し、制御ユニットの読取り装置によりデータを
読取り、このデータを制御ユニット内の制御装置に供給
する。加入者番号が記憶されているテレフォンダイレク
トリィ中のエントリに基づいて磁気カードの非合法な複
製を防止する為に、無線伝送システムの各加入者に第2
の“秘密" 加入者番号(符号) を与え、これを磁気カー
ドに記憶している。
2. Description of the Related Art In a radio transmission system, the charge calculation for a call started at a mobile radio station is performed by a radio exchange. German Patent No. 24.19.615
A subscriber station (mobile radio station) identification method capable of detecting unauthorized use of an identification signal (subscriber number and identification code) of a mobile radio station in a wireless transmission system is described. In the mobile radio station, the identification signal is stored in an identification signal generator, for example, a magnetic card. In order to operate a mobile radio station,
The identification signal generator is inserted into the slot of the control unit of the mobile radio station, the reading device of the control unit reads the data, and this data is supplied to the control device in the control unit. To prevent illegal duplication of the magnetic card based on the entry in the telephone directory where the subscriber number is stored, a second is given to each subscriber of the wireless transmission system.
The "secret" subscriber number (code) is given and stored in a magnetic card.

【0004】ドイツ連邦共和国特許第24.19.615 号明細
書の場合には、同一性の検査として加入者識別符号と加
入者番号との間が対応しているかどうかを検査してい
る。加入者には分かっていない暗号キーを用いて形成し
た同一性検査用の識別符号が移動無線局から無線交換機
に伝送される。無線交換機においては、移動無線局から
与えられた識別符号を逆の暗号化規則を用いて解読す
る。関連の移動局の呼出し番号(加入者番号) は識別符
号による解読操作により得られる。
In the case of the German patent DE 24.19.615, the identity is checked by checking whether there is a correspondence between the subscriber identification code and the subscriber number. An identification code for identity verification, which is formed by using an encryption key unknown to the subscriber, is transmitted from the mobile radio station to the radio exchange. In the wireless exchange, the identification code given by the mobile wireless station is decrypted using the reverse encryption rule. The calling number (subscriber number) of the associated mobile station is obtained by a decoding operation using the identification code.

【0005】不正な識別信号、例えば加入者にとって知
られていない暗号化規則を用いることなく形成された識
別信号も実際には無線交換機において解読され、移動無
線局に識別符号として伝送される。しかし、このように
して得た識別信号は移動無線局の加入者番号と対応する
識別信号に一致しない。従って、受信した識別符号を例
えば識別符号受信機で、磁気カードに記憶された加入者
番号と比較すれば、対応していないことが検知され、達
成された接続が遮断される。
An illegal identification signal, for example an identification signal formed without using an encryption rule unknown to the subscriber, is actually decrypted by the wireless exchange and transmitted to the mobile radio station as an identification code. However, the identification signal thus obtained does not match the identification signal corresponding to the subscriber number of the mobile radio station. Therefore, if the received identification code is compared, for example, with an identification code receiver, to the subscriber number stored on the magnetic card, it is detected that they do not correspond and the established connection is cut off.

【0006】しかし、固定の暗号化 (符号化) 規則を用
いる方法では、無線伝送チャネルにおける情報の交換を
不認可で盗聴することにより得た不正の識別信号に対し
て殆ど何の防護も行うことができない。無線伝送チャネ
ルにおける情報の交換が聞き取られると、移動無線局に
おける識別信号発生器や更には制御装置( 識別符号受信
機) を操作することによりこの移動無線局に対する呼出
し料金を無線伝送システムの他の加入者の料金としてし
まうことができる。
However, the method using a fixed encryption (encoding) rule provides almost no protection against an unauthorized identification signal obtained by unauthorized wiretapping of information exchange in a wireless transmission channel. I can't. When the exchange of information on the radio transmission channel is heard, the call charge for this mobile radio station is transferred to other radio transmission systems by operating the identification signal generator in the mobile radio station and the control device (identification code receiver). It can be charged to the subscriber.

【0007】他の公共のサービスはテレテキスト伝送シ
ステムである。TE KA DE技術報告書(TE KA DE Technisc
he Mitteilungen),1980 年第21頁第5章“中継方式図
(Verbindungsaufbau)" には、加入者からの接続のセッ
ト・アップがテレビジョンセットの遠隔制御を作動させ
ることにより開始させることが記載されている。加入者
局からテレテキスト交換機へのラインが空いている場
合、テレテキストモデム(変復調装置) に電流を供給す
る為に必要なループを閉じた後に、交換機に割当てられ
た呼出し番号の自動選択が開始される。交換機への接続
を行いうる場合には、加入者局に記憶された加入者番号
(識別信号) を加入者局に設けられた制御装置を経て、
テレテキスト交換機に伝送する。例えばISO(情報標準化
機構) の7ビット符号の11位までと追加のチェック・バ
イトとより成る識別信号がテレテキスト交換機において
認可を検査したり、料金の正しい計算を検査したりすの
に用いられている。更に、テレテキスト交換機がこれに
記憶された情報成分にアクセスする前にこのテレテキス
ト交換機がいわゆる合言葉 (識別符号) を要求する手段
を講じうる。
Another public service is the teletext transmission system. TE KA DE Technical Report (TE KA DE Technisc
he Mitteilungen), 1980, page 21, Chapter 5, "Relay Scheme (Verbindungsaufbau)", states that the setup of the connection from the subscriber is initiated by activating the remote control of the television set. ing. If the line from the subscriber station to the teletext exchange is free, the automatic selection of the calling number assigned to the exchange starts after closing the loop necessary to supply the teletext modem (modulator / demodulator) with current. To be done. The subscriber number stored in the subscriber station, if a connection to the exchange can be made
(Identification signal) via the control device provided in the subscriber station,
Transmit to teletext exchange. For example, an identification signal consisting of up to the 11th place of the ISO (Information Standards Organization) 7-bit code and an additional check byte is used in teletext exchanges to check authorization and to check the correct calculation of charges. There is. Furthermore, provision may be made for the teletext exchange to request a so-called secret code (identification code) before it can access the information components stored therein.

【0008】この場合も、電話での会話を盗聴するのに
用いられる手法に類似する手法を用いて識別信号 (加入
者番号および識別符号) が聞き取られるおそれがあり、
テレテキストモデムの識別信号発生器内に記憶された識
別信号が詐欺の目的で変更されるおそれがある。
Also in this case, the identification signal (subscriber number and identification code) may be heard using a method similar to that used for eavesdropping on telephone conversations,
The identification signal stored in the identification signal generator of the teletext modem can be altered for fraudulent purposes.

【0009】[0009]

【発明が解決しようとする課題】本発明の目的は、メッ
セージ伝送チャネルを経る情報の交換を盗聴することに
より不認可で得られるおそれのある識別信号を操作する
ことにより呼出し料金をメッセージ伝送システムの他の
加入者の料金に加えるのを防止することにある。
SUMMARY OF THE INVENTION It is an object of the present invention to provide a call charge to a message transmission system by manipulating an identification signal that may be obtained without authorization by eavesdropping on the exchange of information over the message transmission channel. It is to prevent adding to the charges of other subscribers.

【0010】[0010]

【課題を解決するための手段】本発明方法は、メッセー
ジ伝送システムにおいて、接続のセット・アップ中に、
加入者局において記憶された加入者番号、加入者局の識
別符号のような固定データを交換機において記憶された
固定データと比較し、評価し、追加の可変データを加入
者局および交換機に存在させ、交換機への接続を達成す
る際、固定データと可変データとを一緒に伝送し、比較
し、評価し、加入者局に割当てられた識別信号の不認可
使用を検出するに当り、加入者局の成功接続の回数を可
変データとして用い、加入者局および交換機の各々がカ
ウンタを有し、これらのカウンタの計数位置を各成功接
続の度に1だけ増大させることを特徴とする。
According to the method of the present invention, in a message transmission system, during connection setup,
Fixed data such as the subscriber number, subscriber station identification code stored at the subscriber station is compared to the fixed data stored at the switch, evaluated, and additional variable data is present at the subscriber station and switch. , In transmitting the fixed data and the variable data together in achieving the connection to the exchange, comparing, evaluating and detecting the unauthorized use of the identification signal assigned to the subscriber station, the subscriber station Is used as variable data, each of the subscriber station and the exchange has a counter, and the counting positions of these counters are incremented by 1 for each successful connection.

【0011】特許請求の範囲の請求項1に記載の方法に
よれば、識別信号発生器を非合法的にコピーすることに
より或いはメッセージ伝送システムを経る情報の交換を
盗聴することにより不正なユーザが得た識別信号の不認
可使用を検出しうる。特許請求の範囲の請求項1に記載
したように、加入者番号および識別符号のような固定デ
ータは可変データと組合わせる。記憶された固定データ
がコピーされても、不正ユーザは依然として他の加入者
の費用で通話を行うことができない。その理由は、不正
ユーザは可変データを知らない為である。不正ユーザは
記憶した固定データをコピーし、可変データを聞き取る
までメッセージ伝送システムの他の加入者の費用で呼出
しを行うことができない。しかし、可変データは2つの
加入者局のオペレーション中変化する為、第1通話すな
わち第1期間中にサービスを利用しうるような不正使用
を検知しえないのはたまたま生じるにすぎない。2つの
加入者局のオペレーションの他の進行中は、等しくない
可変データを設定し、これにより交換機において異なる
比較結果を生ぜしめる為、長期間に亘って考慮すると、
不正ユーザは識別信号の不認可使用が検知されずにサー
ビスを利用しようとする試みはできない。本発明による
方法の他の利点は、固定データのデータボリュームを可
変データボリュームの為に減少せしめることができ、従
って識別信号発生器(固定データ記憶装置)、例えば磁
気カードを簡単な構成にしうる。
According to the method of claim 1, unauthorized users can be illegally copied by illegally copying the identification signal generator or eavesdropping on the exchange of information via the message transmission system. Unauthorized use of the obtained identification signal can be detected. As stated in claim 1 fixed data such as subscriber numbers and identification codes are combined with variable data. Even if the stored fixed data is copied, the fraudulent user is still unable to make calls at the expense of other subscribers. The reason is that an unauthorized user does not know variable data. An unauthorized user cannot copy the stored fixed data and make a call at the expense of other subscribers of the message transmission system until he hears the variable data. However, since the variable data changes during the operation of the two subscriber stations, it is only by chance that the fraudulent use of service during the first call or first period is undetectable. Over the course of a long period of time, during other operations of the two subscriber stations, variable data that are not equal are set, which results in different comparison results in the exchange,
An unauthorized user cannot make an attempt to use the service without detecting unauthorized use of the identification signal. Another advantage of the method according to the invention is that the data volume of the fixed data can be reduced due to the variable data volume, so that the identification signal generator (fixed data storage), eg a magnetic card, can be of simple construction.

【0012】特許請求の範囲の請求項1に応じて加入者
局の成功呼出しセット・アップ数を可変データとして用
いる場合、交換機における比較および評価処理を容易に
簡単化しうる。その理由は、符号化データ、特に計数位
置の比較を簡単な構成の論理回路を用いて行いうる為で
ある。
When the number of successful call setups of the subscriber station is used as the variable data according to claim 1, the comparison and evaluation process in the exchange can be easily simplified. The reason is that the encoded data, especially the counting positions can be compared using a logic circuit having a simple structure.

【0013】殆どの場合、メッセージ伝送チャネルを経
る情報交換を盗聴することにより識別信号の操作が行わ
れる。特許請求の範囲の請求項3に記載の方法では、暗
号化装置を用いて暗号化された計数位置を得る。不正ユ
ーザは瞬時的な計数位置も、この計数位置を暗号化する
規則も知らない為、安全手段を一層改善しうる。
In most cases, manipulation of the identification signal is performed by eavesdropping on information exchanges over the message transmission channel. The method according to claim 3 uses an encryption device to obtain an encrypted counting position. Since the unauthorized user does not know the instantaneous counting position or the rule for encrypting this counting position, the security measure can be further improved.

【0014】計数位置を暗号化(符号化)する暗号化規
則が繰り返しの試みにより解読されうるおそれを防止す
る為に、特許請求の範囲の請求項4に記載したように、
追加の固定データを暗号化装置に供給し、これを暗号化
装置に供給される計数位置と組合わせる。これにより、
メッセージ伝送システムの種々の加入者局に対し異なる
暗号化規則を生ぜしめる為、暗号化規則の復号化(解
読)に多大な努力を必要とする。
In order to prevent the possibility that the encryption rule for encrypting (encoding) the counting position may be decrypted by repeated attempts, as described in claim 4 of the claims,
Additional fixed data is supplied to the encryption device and this is combined with the counting position supplied to the encryption device. This allows
Since different encryption rules are generated for different subscriber stations of a message transmission system, a great deal of effort is required to decrypt the encryption rules.

【0015】また特許請求の範囲の請求項5或いは請求
項6に記載したように、加入者局が符号化された計数位
置の一部のみを可変データとして伝送し、この一部は所
定のビット位置を選択することにより或いはクロス加算
を行うことにより得る。不正ユーザがメッセージ伝送チ
ャネルを経る情報の交換を盗聴する場合には、この不正
ユーザは符号化された計数位置の一部のみを知りうるに
すぎず、計数位置全体を知ることができない。このクロ
ス加算の場合、多数の計数位置に常に同じクロス加算を
関連させ、例えば10進のクロス加算5を計数位置00
5,122,221と関連させる。従って、不正ユーザ
は計数位置全体を推測しうるにすぎず、通常不正ユーザ
の最初の試み中にこの不正ユーザが検知されてしまう。
As described in claim 5 or claim 6, the subscriber station transmits only a part of the encoded counting position as variable data, and this part transmits a predetermined bit. It is obtained by selecting the position or by performing cross addition. If an unauthorized user eavesdrops on the exchange of information over the message transmission channel, the unauthorized user will only be able to know a part of the encoded counting position and not the entire counting position. In the case of this cross addition, the same cross addition is always associated with a large number of counting positions, and for example, the decimal cross addition 5 is added to the counting position 00.
5,122,221. Therefore, an unauthorized user can only guess the entire counting position, which is usually detected during the unauthorized user's first attempt.

【0016】[0016]

【実施例】図1のブロック回路は、メッセージ伝送シス
テムの加入者局Tおよび交換機Zにおいて本発明による
方法に用いる回路を示す。加入者局Tおよび交換機Zは
それぞれ制御装置STTおよびSTZを有し、これら制
御装置により接続のセット・アップを制御する。加入者
局Tが交換機Zのサービスを利用したいと望む場合に
は、交換機Zが加入者局Tにその識別信号を送ることを
要求する。加入者局Tはこれ自体を識別させる為に、送
受(トランシーバ)装置SET により、識別信号発生器K
G、例えば磁気カード内に記憶された識別符号をメッセ
ージ伝送チャネルLを経て交換機Zに伝送する。これに
より伝送される識別信号は識別信号発生器KGに記憶さ
れた加入者番号TNRおよび第1識別符号K1を有す
る。交換機Zにおいては、伝送された識別信号を送受装
置SEZで受け、これを制御装置STZに供給し、制御
装置STZによりこの識別信号を識別信号データファイ
ルKD内に記憶した識別信号 (加入者番号TNRおよび
第1識別符号K1) と比較して評価する。
DESCRIPTION OF THE PREFERRED EMBODIMENT The block circuit of FIG. 1 shows the circuit used in the method according to the invention in a subscriber station T and a switch Z of a message transmission system. The subscriber station T and the exchange Z respectively have control units STT and STZ, which control the set-up of the connection. If the subscriber station T wishes to use the services of the exchange Z, the exchange Z requests the subscriber station T to send its identification signal. In order to identify itself, the subscriber station T uses an identification signal generator K by means of a transceiver device SET.
G, for example, the identification code stored in the magnetic card is transmitted to the exchange Z via the message transmission channel L. The identification signal transmitted thereby has the subscriber number TNR and the first identification code K1 stored in the identification signal generator KG. In the exchange Z, the transmitted identification signal is received by the transmission / reception device SEZ, is supplied to the control device STZ, and the identification signal (subscriber number TNR is stored in the identification signal data file KD by the control device STZ. And the first identification code K1) for evaluation.

【0017】図1に示す本発明による方法で、加入者局
Tと交換機Zとに変化する追加のデータを存在させる。
本例では、加入者局Tから成功接続回数を可変データと
して用いる。加入者局Tに設けたカウンタZZの計数位
置ZS* は各成功接続当り例えば1だけ増大する。カウ
ンタZZの出力端子QO 〜Qn から取出しうる計数位置
ZS* は送受装置SETによりメッセージ伝送チャネル
Lを経て伝送され、交換機Zにおける送受装置SEZに
より受けられ、制御装置STZに供給される。この加入
者局Tの各成功接続当りカウンタZZ1の計数位置が制
御装置STZにより1だけ増大される。計数位置が例え
ば直線的に増大する差により1よりも多い数ずつ増大
し、最大値に達する場合、例えば制御の目的の為にカウ
ンタと最後に用いた差に対する記憶装置とを設ける必要
がある。交換機ZにはM個の異なる加入者局に対する複
数個のカウンタZZ1,----- ,ZZMが設けられてい
る。
In the method according to the invention shown in FIG. 1, the subscriber station T and the exchange Z are provided with varying additional data.
In this example, the number of successful connections from the subscriber station T is used as variable data. The counting position ZS * of the counter ZZ provided at the subscriber station T is incremented, for example, by 1 for each successful connection. The counting position ZS * that can be taken out from the output terminals Q O to Q n of the counter ZZ is transmitted via the message transmission channel L by the transmission / reception device SET, received by the transmission / reception device SEZ in the exchange Z, and supplied to the control device STZ. The counting position of the counter ZZ1 for each successful connection of the subscriber station T is incremented by 1 by the control unit STZ. If the counting position increases by a number greater than 1 for example due to a linearly increasing difference and reaches a maximum value, it is necessary, for example for control purposes, to provide a counter and a storage for the last used difference. The exchange Z is provided with a plurality of counters ZZ1, ..., ZZM for M different subscriber stations.

【0018】図1につき説明した方法により、接続のセ
ット・アップ工程中、加入者番号TNR、第1識別符号
K1およびカウンタの計数位置ZS* を加入者局Tにお
ける制御装置STTによる制御の下で交換機Zに伝送
し、交換機において識別信号データファイルKD中に記
憶された加入者番号TNRおよび第1識別符号K1並び
にカウンタZZ1の計数位置と比較する。
According to the method described with reference to FIG. 1, the subscriber number TNR, the first identification code K1 and the counting position ZS * of the counter are controlled by the control unit STT at the subscriber station T during the setup process of the connection. It is transmitted to the exchange Z and compared with the subscriber number TNR and the first identification code K1 stored in the identification signal data file KD in the exchange and the counting position of the counter ZZ1.

【0019】加入者番号TNR、第1識別符号K1およ
び可変データ、例えば計数位置が加入者局および交換機
において互いに等しい場合には、加入者は交換機Zのサ
ービスにアクセルする。
If the subscriber number TNR, the first identification code K1 and the variable data, eg the counting positions, are equal to each other at the subscriber station and the exchange, the subscriber activates the services of the exchange Z.

【0020】カウンタZZおよびZZ1が互いに異なる
計数位置を有する場合には、交換機Zは第2識別符号K
2を送給することを識別指令により加入者局Tに要求す
る。交換機Zは受けた第2識別符号K2を識別信号デー
タファイルKD内に記憶された識別符号K2と比較し、
2つの識別符号K2が一致しない場合には警報装置をト
リガする。
If the counters ZZ and ZZ1 have different counting positions from each other, the exchange Z is assigned a second identification code K.
The subscriber station T is requested by the identification command to send 2. The exchange Z compares the received second identification code K2 with the identification code K2 stored in the identification signal data file KD,
If the two identification codes K2 do not match, the alarm device is triggered.

【0021】2つの識別符号が一致する場合には、中央
制御装置STZがカウンタZZ1を加入者局Tのカウン
タZZの計数位置にセットする。後の各成功接続のセッ
ト・アップ時には2つの計数位置が1だけ増大する。加
入者局Tの識別信号は交換機Z内に記憶される。次の接
続のセット・アップ工程中にカウンタZZおよびZZ1
の計数位置が一致する場合には、加入者局Tの識別番号
は記憶から排除される。次の比較のすべてが一致しない
場合には加入者局Tは阻止される。
If the two identification codes match, the central control unit STZ sets the counter ZZ1 at the counting position of the counter ZZ of the subscriber station T. At the setting up of each subsequent successful connection, the two counting positions are incremented by one. The identification signal of the subscriber station T is stored in the exchange Z. Counters ZZ and ZZ1 during the setup process of the next connection
If the count positions of the two match, the identification number of the subscriber station T is excluded from storage. If all of the following comparisons do not match, the subscriber station T is blocked.

【0022】図1に示す実施例では、加入者局Tのカウ
ンタZZの計数位置ZS* は暗号化計数位置VZS*
生ぜしめる暗号化装置VEに供給される。交換機Zは暗
号化装置VEに対応する解読装置EEを有し、この解読
装置EEもカウンタZZ1の計数位置ZSから暗号化さ
れた計数位置VZSを取り出す。識別処理に暗号化され
た計数位置VZS* およびVZSを比較する工程が含ま
れる場合には、識別操作を簡単に行うことができる。符
号化規則およびカウンタZZの計数位置ZS*を知らな
い不正なユーザは正しい可変データを偶然に伝送しうる
にすぎず、従って一般に不正なユーザは多数の不成功な
試みの後に試みをとめるであろう。
In the embodiment shown in FIG. 1, the counting position ZS * of the counter ZZ of the subscriber station T is supplied to the encryption device VE which produces the encrypted counting position VZS * . The exchange Z has a decryption device EE corresponding to the encryption device VE, and this decryption device EE also extracts the encrypted counting position VZS from the counting position ZS of the counter ZZ1. When the identification process includes a step of comparing the encrypted counting positions VZS * and VZS, the identification operation can be easily performed. A rogue user who does not know the encoding rules and the counting position ZS * of the counter ZZ can only accidentally transmit the correct variable data, so in general a rogue user will stop after a number of unsuccessful attempts. Let's do it.

【0023】安全手段を更に改善する為には、追加の固
定データ、より詳細に云えば交換機Zにも分かっている
第2識別符号K2をも暗号化装置VEに供給する。加入
者局Tの暗号化装置VEはこれに供給される第2識別符
号K2および計数位置ZS*の組合わせから符号化され
た計数位置VZS* を発生する。交換機Zにおける解読
装置EEを用いることにより、カウンタZZ1の計数位
置ZSの前記と同じ解読処理をこの解読装置EEで行
う。これにより得られた結果は前述したのと同じ方法で
比較する。
In order to further improve the security measure, additional fixed data, more specifically a second identification code K2, which is also known to the exchange Z, is also supplied to the encryption device VE. The encryption device VE of the subscriber station T generates an encoded counting position VZS * from the combination of the second identification code K2 and the counting position ZS * supplied to it. By using the deciphering device EE in the exchange Z, the deciphering device EE performs the same deciphering process as described above for the counting position ZS of the counter ZZ1. The results obtained thereby are compared in the same way as described above.

【0024】安全手段の更に他の改善は、接続のセット
・アップ工程中に計数位置ZS* の一部分TZS* のみ
を加入者局Tにより可変データとして伝送することによ
り達成しうる。この目的の為に、加入者局Tに選択回路
ASTを設け、この選択回路ASTにより例えばこれに
供給される暗号化された計数位置VZS* から所定のビ
ット位置を選択するようにする。他の実施例では、選択
回路ASTにより、供給される暗号化計数位置VZS*
をクロス加算処理する。交換機Zにも選択回路ASZを
設けて加入者局Tにおける選択回路ASTに対応して計
数位置ZSから一部TZSを選択し、比較を行うように
する。或いは選択回路ASZにより暗号化計数位置VZ
Sをクロス加算処理する。
A further improvement of the security measure can be achieved by transmitting only a part TZS * of the counting position ZS * as variable data by the subscriber station T during the setup process of the connection. For this purpose, the subscriber station T is provided with a selection circuit AST, for example for selecting a predetermined bit position from the encrypted counting position VZS * supplied to it. In another embodiment, the encrypted counting position VZS * supplied by the selection circuit AST .
Is cross-added. The switching circuit Z is also provided with a selection circuit ASZ so that a part TZS is selected from the counting position ZS corresponding to the selection circuit AST in the subscriber station T and comparison is performed. Alternatively, the encrypted counting position VZ is selected by the selection circuit ASZ.
Cross-add S.

【0025】不正なユーザがメッセージ伝送チャネルL
を経る情報の交換を盗聴している場合には、この者は暗
号化された計数位置VZS* の一部のみを得ることがで
きるにすぎず、完全な暗号化計数位置VZS* を得るこ
とができない。クロス加算処理に際して、或いは所定の
ビット部分を選択することにより計数位置の一部分のみ
を伝送する場合には、複数個の計数位置ZS* が可能で
ある為、不正なユーザは完全な計数位置ZS* の推測を
試みうるにすぎない。一般に可変データを推測する不正
なユーザの最初の試みはすでに検知され、対応する手段
を講じうる。
An unauthorized user may access the message transmission channel L
If you are wiretapping the exchange of information through the, this shall only be able to obtain only a portion of the encrypted counted position VZS *, to obtain a complete encryption counting position VZS * Can not. In the case of transmitting only a part of the counting positions during the cross addition process or by selecting a predetermined bit part, a plurality of counting positions ZS * are possible, and thus an unauthorized user can obtain a complete counting position ZS *. You can only try to guess. In general, a fraudulent user's first attempt to infer variable data has already been detected and appropriate measures can be taken.

【0026】本発明による方法は、固定データおよび可
変データが磁気カードに記憶される銀行業務およびクレ
ジットカード業務に適用するのにも有益である。この場
合の可変データは加入者の現在の取り引き状態や、1組
の合言葉のうちの1つの合言葉である。
The method according to the invention is also useful in banking and credit card operations where fixed and variable data are stored on magnetic cards. The variable data in this case is the current transaction status of the subscriber or one secret word of a set of secret words.

【図面の簡単な説明】[Brief description of drawings]

【図1】本発明方法の実施例に用いる回路を示すブロッ
ク線図である。
FIG. 1 is a block diagram showing a circuit used in an embodiment of a method of the present invention.

【符号の説明】[Explanation of symbols]

T 加入者局 Z 交換機 STT,STZ 制御装置 KG 識別信号発生器 SET,SEZ 送受装置 L メッセージ伝送チャネル KD 識別信号データファイル ZZ,ZZ1,ZZM カウンタ VE 暗号化装置 EE 解読装置 AST,ASZ 選択回路 T subscriber station Z exchange STT, STZ control device KG identification signal generator SET, SEZ transmission / reception device L message transmission channel KD identification signal data file ZZ, ZZ1, ZZM counter VE encryption device EE decryption device AST, ASZ selection circuit

───────────────────────────────────────────────────── フロントページの続き (51)Int.Cl.6 識別記号 庁内整理番号 FI 技術表示箇所 8732−5K H04L 11/26 ─────────────────────────────────────────────────── ─── Continuation of the front page (51) Int.Cl. 6 Identification code Office reference number FI technical display location 8732-5K H04L 11/26

Claims (6)

【特許請求の範囲】[Claims] 【請求項1】 メッセージ伝送システムにおいて、接続
のセット・アップ中に、加入者局において記憶された加
入者番号、加入者局の識別符号のような固定データを交
換機において記憶された固定データと比較し、評価し、
追加の可変データを加入者局(T)および交換機(Z)
に存在させ、交換機(Z)への接続を達成する際、固定
データと可変データとを一緒に伝送し、比較し、評価
し、加入者局に割当てられた識別信号の不認可使用を検
出するに当り、 加入者局(T)の成功接続の回数を可変データとして用
い、加入者局(T)および交換機(Z)の各々がカウン
タ(ZZ,ZZ1)を有し、これらのカウンタ(ZZ,
ZZ1)の計数位置を各成功接続の度に1だけ増大させ
ることを特徴とする識別信号不認可使用検出方法
1. In a message transmission system, during set up of a connection, fixed data such as a subscriber number, an identification code of the subscriber station, stored in the subscriber station is compared with fixed data stored in the exchange. And evaluate
Additional variable data for subscriber stations (T) and exchanges (Z)
Existing, and in connection with the exchange (Z), fixed data and variable data are transmitted together, compared, evaluated and the unauthorized use of the identification signal assigned to the subscriber station is detected. In this case, the number of successful connections of the subscriber station (T) is used as variable data, each of the subscriber station (T) and the exchange (Z) has a counter (ZZ, ZZ1), and these counters (ZZ, ZZ,
A method for detecting unauthorized use of an identification signal, characterized in that the counting position of ZZ1) is increased by 1 for each successful connection.
【請求項2】 請求項1に記載の識別信号不認可使用検
出方法において、固定データおよび可変データが磁気カ
ードに記憶されているようにすることを特徴とする識別
信号不認可使用検出方法。
2. The identification signal unauthorized use detection method according to claim 1, wherein fixed data and variable data are stored in a magnetic card.
【請求項3】 請求項1に記載の識別信号不認可使用検
出方法において、加入者局(T)のカウンタ(ZZ)の
計数位置(ZS* )を暗号化装置(VE)に供給し、こ
の暗号化装置により前記の計数位置(ZS* )から暗号
化された計数位置(VZS* )を発生させることを特徴
とする識別信号不認可使用検出方法。
3. The method for detecting unauthorized use of an identification signal according to claim 1, wherein the counting position (ZS * ) of the counter (ZZ) of the subscriber station (T) is supplied to the encryption device (VE). A method for detecting unauthorized use of an identification signal, wherein an encrypted counting position (VZS * ) is generated from the counting position (ZS * ) by an encryption device.
【請求項4】 請求項3に記載の識別信号不認可使用検
出方法において、交換機(Z)にも知られている追加の
固定データ(K2)を暗号化装置(VE)に供給し、こ
の暗号化装置(VE)により前記の追加の固定データか
ら暗号化された計数位置(VZS* )を生ぜしめること
を特徴とする識別信号不認可使用検出方法。
4. The method for detecting unauthorized use of an identification signal according to claim 3, wherein additional fixed data (K2), which is also known to the exchange (Z), is supplied to the encryption device (VE). A method for detecting unauthorized use of an identification signal, characterized in that an encrypted counting position (VZS * ) is generated from the additional fixed data by an encryption device (VE).
【請求項5】 請求項1〜4のいずれか一項に記載の識
別信号不認可使用検出方法において、接続のセット・ア
ップ中前記の計数位置(ZS* )の一部分(TZS*
のみを加入者局(T)により可変データとして伝送し、
選択回路(AST)においてこれに供給される暗号化さ
れた計数位置(VZS* )から所定のビット位置を選択
することを特徴とする識別信号不認可使用検出方法。
5. The method for detecting unauthorized use of an identification signal according to claim 1, wherein a part (TZS * ) of the counting position (ZS * ) is set up during connection setup .
Transmitted only as variable data by the subscriber station (T),
A method for detecting unauthorized use of an identification signal, characterized in that a selection circuit (AST) selects a predetermined bit position from the encrypted counting position (VZS * ) supplied thereto.
【請求項6】 請求項1〜4のいずれか一項に記載の識
別信号不認可使用検出方法において、接続のセット・ア
ップ中計数位置(ZS* )の一部分(TZS * )のみを
加入者局(T)により可変データとして伝送し、選択回
路(AST)においてこれに供給される計数位置(VZ
* )からクロス加算値を形成することを特徴とする識
別信号不認可使用検出方法。
6. The knowledge according to any one of claims 1 to 4.
In the separate signal unauthorized use detection method, the connection
Up counting position (ZS*) Part (TZS *) Only
It is transmitted as variable data by the subscriber station (T) and selected
On the road (AST) the counting position (VZ
S*) To form a cross addition value
Another signal unauthorized use detection method.
JP5012468A 1984-03-24 1993-01-28 Identification signal unauthorized use detection method Expired - Lifetime JP2759732B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19843410937 DE3410937A1 (en) 1984-03-24 1984-03-24 Method for identifying the unauthorised use of an identifier
DE3410937:4 1984-03-24

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
JP60060508A Division JPS60236537A (en) 1984-03-24 1985-03-25 Identification signal nonapproved use detecting method

Publications (2)

Publication Number Publication Date
JPH0715429A true JPH0715429A (en) 1995-01-17
JP2759732B2 JP2759732B2 (en) 1998-05-28

Family

ID=6231544

Family Applications (3)

Application Number Title Priority Date Filing Date
JP60060508A Granted JPS60236537A (en) 1984-03-24 1985-03-25 Identification signal nonapproved use detecting method
JP5012468A Expired - Lifetime JP2759732B2 (en) 1984-03-24 1993-01-28 Identification signal unauthorized use detection method
JP8099331A Pending JPH09154177A (en) 1984-03-24 1996-03-27 Mobile radio station

Family Applications Before (1)

Application Number Title Priority Date Filing Date
JP60060508A Granted JPS60236537A (en) 1984-03-24 1985-03-25 Identification signal nonapproved use detecting method

Family Applications After (1)

Application Number Title Priority Date Filing Date
JP8099331A Pending JPH09154177A (en) 1984-03-24 1996-03-27 Mobile radio station

Country Status (5)

Country Link
JP (3) JPS60236537A (en)
CA (1) CA1242501A (en)
DE (1) DE3410937A1 (en)
DK (1) DK128585A (en)
FR (1) FR2561841B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070111A (en) * 1997-04-09 2000-05-30 Honda Giken Kogyo Kabushiki Kaisha Vehicle diagnosing apparatus

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3420874A1 (en) * 1984-06-05 1985-12-05 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt Method and arrangement for monitoring network access in telecommunications networks
DE3619566A1 (en) * 1986-06-11 1987-12-17 Omikron Systemhaus Gesellschft Method and system for data transmission
FR2614162B1 (en) * 1987-04-17 1993-12-10 Flonic Sa ANALOGUE AUTHENTICATION SYSTEM RECIPROCED BETWEEN A TERMINAL AND A TRANSMISSION LINE
ATE85737T1 (en) * 1987-08-14 1993-02-15 Siemens Ag DATA TRANSFER METHOD.
US5239294A (en) * 1989-07-12 1993-08-24 Motorola, Inc. Method and apparatus for authenication and protection of subscribers in telecommunication systems
US5091942A (en) * 1990-07-23 1992-02-25 Ericsson Ge Mobile Communications Holding, Inc. Authentication system for digital cellular communications
DE4223258C3 (en) * 1992-07-15 2001-03-15 Telefunken Microelectron Method for verifiable transmission of data
DE4317143C2 (en) * 1993-05-24 1999-02-18 Deutsche Telekom Mobil Method and device for operating a mobile radio network
DE4335161A1 (en) * 1993-10-15 1995-04-20 Joachim Linz Method and installation for authenticating connections which can be set up via a telephone network
DE4336995A1 (en) * 1993-10-29 1995-05-04 Sel Alcatel Ag Method and device for determining the assignment of a mobile radio device to device lists
DE4416598A1 (en) * 1994-05-11 1995-11-16 Deutsche Bundespost Telekom Securing telecommunication connection against unauthorised use
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
DE4445615A1 (en) * 1994-12-21 1996-06-27 Sel Alcatel Ag Confidentiality protection system for communications network
DE19523654A1 (en) * 1995-06-29 1997-01-02 Sel Alcatel Ag Fraud-proof equipment identification method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5888472U (en) * 1981-12-11 1983-06-15 株式会社日立製作所 Terminal identification code verification device
JPS5936873A (en) * 1982-06-19 1984-02-29 ミコ,ダ−テンジステム,ゲゼルシヤフト,ミツト,ベシユレンクテル,ハフツング Detection of false data recording medium and data recording medium

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH516854A (en) * 1969-11-29 1971-12-15 Ciba Geigy Ag Method and device for encrypted transmission of information
DE2536452A1 (en) * 1975-08-16 1977-02-24 Licentia Gmbh Car radio telephone subscriber search system - enables calling subscriber to dial search code to examine memory of local exchange information units
DE2635795B2 (en) * 1975-09-09 1980-08-21 Dasy Inter S.A., Genf (Schweiz) Method and device for checking the authenticity of identification cards and similar documents
US4114139A (en) * 1977-01-25 1978-09-12 International Business Machines Corporation Security controlled information exchange system
US4214230A (en) * 1978-01-19 1980-07-22 Rolf Blom Personal identification system
US4310720A (en) 1978-03-31 1982-01-12 Pitney Bowes Inc. Computer accessing system
LU79726A1 (en) * 1978-05-29 1978-11-28 Eckert R TELESCOPIC FORK
EP0018129B1 (en) * 1979-04-02 1982-11-17 Motorola, Inc. Method of providing security of data on a communication path
DE2924325B2 (en) * 1979-06-15 1981-06-11 Hermann 7742 St. Georgen Stockburger Method and device for the secret identification and evaluation of machine-readable data carriers
US4349695A (en) * 1979-06-25 1982-09-14 Datotek, Inc. Recipient and message authentication method and system
JPS5829669B2 (en) * 1979-10-22 1983-06-24 日本電信電話株式会社 Mobile communication user-only method
FR2469760A1 (en) * 1979-11-09 1981-05-22 Cii Honeywell Bull METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA
US4304990A (en) * 1979-12-11 1981-12-08 Atalla Technovations Multilevel security apparatus and method
DE3000560C2 (en) * 1980-01-09 1986-10-09 Hermann 7742 St Georgen Stockburger Method for checking the authenticity of a data carrier and device for carrying out the method
JPS5915419B2 (en) * 1980-02-01 1984-04-09 日本電信電話株式会社 Method to prevent unauthorized use of mobile devices
DE3012231C2 (en) * 1980-03-28 1987-09-10 Siemens AG, 1000 Berlin und 8000 München Mobile radio network at national level
IL64675A0 (en) * 1981-12-30 1982-03-31 Greenberg Avigdor Data verification system
NL8201077A (en) * 1982-03-16 1983-10-17 Philips Nv A COMMUNICATION SYSTEM, CONTAINING A CENTRAL DATA PROCESSING DEVICE, ACCESS STATIONS AND EXTERNAL STATIONS, WHICH A CRYPTOGRAPHIC CHECK IS FORDICULARIZING AN EXTERNAL STATION, AND EXTERNAL STATIONS FOR USE IN SUCH A COMMUNITY.
EP0090771B1 (en) * 1982-03-26 1985-10-02 GRETAG Aktiengesellschaft Method and apparatus for the enciphered transmission of information
DE3212023A1 (en) * 1982-03-31 1983-10-06 Siemens Ag Active-address-related information system for the administration of mobile communication subscribers

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5888472U (en) * 1981-12-11 1983-06-15 株式会社日立製作所 Terminal identification code verification device
JPS5936873A (en) * 1982-06-19 1984-02-29 ミコ,ダ−テンジステム,ゲゼルシヤフト,ミツト,ベシユレンクテル,ハフツング Detection of false data recording medium and data recording medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070111A (en) * 1997-04-09 2000-05-30 Honda Giken Kogyo Kabushiki Kaisha Vehicle diagnosing apparatus

Also Published As

Publication number Publication date
DE3410937A1 (en) 1985-10-03
CA1242501A (en) 1988-09-27
JP2759732B2 (en) 1998-05-28
DK128585A (en) 1985-09-25
FR2561841B1 (en) 1994-04-01
JPH09154177A (en) 1997-06-10
FR2561841A1 (en) 1985-09-27
JPH0548981B2 (en) 1993-07-23
JPS60236537A (en) 1985-11-25
DE3410937C2 (en) 1991-08-14
DK128585D0 (en) 1985-03-21

Similar Documents

Publication Publication Date Title
JP2759732B2 (en) Identification signal unauthorized use detection method
US4955049A (en) Method of supervising mobile telephone subscriptions in a mobile telephone system
US4484025A (en) System for enciphering and deciphering data
US3798605A (en) Centralized verification system
US4531023A (en) Computer security system for a time shared computer accessed over telephone lines
US5335278A (en) Fraud prevention system and process for cellular mobile telephone networks
US5708710A (en) Method and apparatus for authentication in a communication system
US5822691A (en) Method and system for detection of fraudulent cellular telephone use
EP0064779B1 (en) Method and system for the mutual encyphered identification between data communicating stations and stations for use with such method and system
US5457737A (en) Methods and apparatus to verify the identity of a cellular mobile phone
US6434378B1 (en) Pre-paid cellular telephone system
US5343529A (en) Transaction authentication using a centrally generated transaction identifier
US5301234A (en) Radiotelephone installation for prepayment operation with security protection
US5809125A (en) Method and apparatus for intercepting potentially fraudulent telephone calls
US5572193A (en) Method for authentication and protection of subscribers in telecommunications systems
JPS6129294A (en) Method of unauthorized use detection of identified information aligned for mobile radio station in radio transmission system
US5594795A (en) Method and apparatus for key transforms to discriminate between different networks
JPH09322239A (en) Illegal use prevention method for mobile communication equipment such as portable telephone set and illegal use prevention system realizing the method
EP1157582B1 (en) Authentication method for cellular communications systems
MXPA96006339A (en) Communication method and device
US20020081179A1 (en) Smart card of a terminal, a terminal using a smart card, and an improved method for identifying a user by means of a smart card
WO1998000956A2 (en) System and method for preventing cellular fraud
US5765106A (en) Authorized cellular telephone communication access and verification control system
US6208722B1 (en) Method of accepting charges in individual connections and a telephone network and terminal
US5768383A (en) Authorized cellular voice messaging and/or analog or digital data communication access and verification control system

Legal Events

Date Code Title Description
A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 19960213

EXPY Cancellation because of completion of term