WO2005076523A1 - System and method for authenticating the identity of a user - Google Patents

System and method for authenticating the identity of a user Download PDF

Info

Publication number
WO2005076523A1
WO2005076523A1 PCT/SG2005/000026 SG2005000026W WO2005076523A1 WO 2005076523 A1 WO2005076523 A1 WO 2005076523A1 SG 2005000026 W SG2005000026 W SG 2005000026W WO 2005076523 A1 WO2005076523 A1 WO 2005076523A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mobile phone
passkey
identity
authenticating
Prior art date
Application number
PCT/SG2005/000026
Other languages
French (fr)
Inventor
C. Alfredo Fajardo
Original Assignee
Veritas Mobile Solutions Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Veritas Mobile Solutions Pte. Ltd. filed Critical Veritas Mobile Solutions Pte. Ltd.
Priority to GB0615071A priority Critical patent/GB2426104A/en
Priority to EP05704846A priority patent/EP1714424A4/en
Priority to US10/597,628 priority patent/US20080281737A1/en
Publication of WO2005076523A1 publication Critical patent/WO2005076523A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1453Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network
    • H04L12/1467Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network involving prepayment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/48Secure or trusted billing, e.g. trusted elements or encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/02Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/10Account details or usage
    • H04M17/103Account details or usage using SIMs (USIMs) or calling cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M2017/12Prepayment of wireline communication systems, wireless communication systems or telephone systems using calling, telephone credit/debit cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0156Secure and trusted billing, e.g. trusted elements, encryption, digital signature, codes or double check mechanisms to secure billing calculation and information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/20Technology dependant metering
    • H04M2215/2026Wireless network, e.g. GSM, PCS, TACS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/32Involving wireless systems

Definitions

  • the present invention relates to a system and method for authenticating the identity of a user.
  • the invention is particularly useful for, but not limited to, authenticating the identity of a pre-paid mobile phone customer when said user has requested the transfer of their pre-paid balance amount following loss or damage of their mobile phone or SIM card.
  • Other uses relate to other services whereby the pre-paid mobile phone number is used as a quasi-account number for various financial and currency accounts, whereby a balance is kept, and funds may be sent out and received.
  • the world is moving towards a true m-commerce arrangement where the amount credited to a mobile phone (hereafter referred to as "load") is used as currency.
  • load the amount credited to a mobile phone
  • more and more people are driven towards being a pre-paid mobile phone customer due to the convenience of acquiring such type of account and for some, as this arrangement provides anonymity.
  • the problem with this arrangement and a problem with pre-paid mobile phone use in general, is one of customer authentication.
  • a pre-paid mobile phone customer loses or damages their mobile phone or SIM card (as the case may be for most GSM mobile phone systems)
  • the customer also loses their identity in the eyes of their mobile phone carrier.
  • This also means that the pre-paid mobile phone carrier also loses their accrued load.
  • this can amount to a loss of several thousands of dollars.
  • a system for authenticating the identity of a user comprising: • a user;
  • the authenticating party identifies the user through a first communication identifier and generates and sends a unique passkey to a second communication identifier associated with the user, the user thereafter being prompted to send a communications message including a passkey to a predefined destination and where upon receipt of the communications message, the authenticating party compares the generated unique passkey with the passkey included in the communications message and authenticates the identity of the user in accordance with the result of the comparison.
  • the communications message may be an e-mail, a SMS message, a data packet including data inputted by the user at a web page, or even a physical postal package sent to the user's home or shipping address.
  • the authenticating party may be a carrier, an authorised agent of the carrier or a facilitator.
  • the authentication procedure can be used as a means of authenticating a user's identity for the purposes of transferring load from a lost or damaged pre-paid mobile phone or SIM card to a new pre-paid mobile phone.
  • the system provides a mechanism by which the user can record the second communication identifier prior to making use of the authentication procedure.
  • This mechanism may comprise the user sending a communications message to the authenticating party containing a first passkey.
  • the authenticating party updates the user's corresponding user account to include the first passkey before requesting the user to provide details of the second communication identifier.
  • the authenticating party then sends a message to the second communication identifier.
  • This message contains a second passkey which the user is required to send to a pre-defined location.
  • This second passkey is also associated with the user's corresponding user account to allow the second passkey sent by the user to the pre-defined location to be verified.
  • the user's corresponding user account is again updated to include the second communication identifier.
  • Alternative mechanisms that incorporate all or part of the features of the mechanism described previously in this paragraph may also be implemented.
  • the passkeys may be alphabetic, alphanumeric or numeric in format.
  • the passkeys may also be modified for security purposes, for example, by being encrypted or slightly distorted.
  • the predefined location and predefined destination may be an e-mail address, a mobile application short-code or postal address.
  • the first communication identifier be a mobile phone number and the second communication identifier be an e-mail address because of their uniqueness and the fact that each identifier typically has a single owner.
  • the communication identifiers could be an instant messenger address, an alternative telephone number, a web page/IP address or postal address.
  • the authenticating party may take action to prevent further attempts at authentication until the user contacts the authenticating party and satisfies them as to their identity through an additional security procedure.
  • a user seeking authentication of their identity by an authenticating party, the user being identified by the authenticating party through a first communication identifier and thereafter receiving a unique passkey generated by the authenticating party by way of a second communication identifier recorded with the authenticating party as being applicable to that user, the user thereafter sending a communications message including a passkey to a predefined destination and the authenticating party thereafter comparing the generated unique passkey with the passkey included in the user's communications message and authenticating the identity of the user in accordance with the result of the comparison.
  • an authenticating party capable of authenticating the identity of a user, the authenticating party identifying the user through a first communication identifier; generating and sending a unique passkey to the user through a second communication identifier recorded with the authenticating party as being applicable to that user; receiving a communications message from the user including a passkey at a predefined destination and authenticating the identity of the user in accordance with the result of a comparison between the generated unique passkey and the passkey included in the user's communications message.
  • a method for authenticating the identity of a user comprising: • identifying the user through a first communication identifier;
  • a system for authenticating the identity of a user comprising: • a user;
  • the authenticating party generates a unique passkey and sends a communications message including the unique passkey to the user through the second communication identifier, the user then enters a passkey to the web page and the authenticating party authenticates the identity of the user in accordance with the results of a comparison between the passkey entered at the web page and the generated unique passkey.
  • a user seeking authentication of their identity by an authenticating party, the user being identified by the authenticating party through information entered at a web page and thereafter receiving a unique passkey generated by the authenticating party by way of a second communication identifier recorded with the authenticating party as being applicable to that user, the user thereafter entering a passkey at the web page and the authenticating party thereafter comparing the generated unique passkey with the passkey entered at the web page and authenticating the identity of the user in accordance with the result of the comparison.
  • an authenticating party capable of authenticating the identity of a user, the authenticating party identifying the user through information entered at a web page; generating and sending a unique passkey to the user through a second communication identifier recorded with the authenticating party as being applicable to that user; receiving a passkey from the user entered at the web page and authenticating the identity of the user in accordance with the result of a comparison between the generated unique passkey and the passkey entered at the web page.
  • a method for authenticating the identity of a user comprising:
  • a system for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising:
  • the authenticating party identifies the user through information provided in a communication message sent from the new mobile phone and generates and sends a unique passkey to a second communication identifier associated with the user, the user thereafter being prompted to send a communications message including a passkey to a predefined destination and where upon receipt of the communications message, the authenticating party compares the generated unique passkey with the passkey included in the communications message and authenticates the identity of the user in accordance with the result of the comparison and where, once the user has been authenticated, the authenticating party authorises the mobile phone carrier to add the amount of credit associated with the mobile phone to the credit associated with the new mobile phone.
  • a system for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising:
  • a mobile phone carrier who operates the telecommunications network used by the mobile phone and new mobile phone.
  • the authenticating party identifies the user through information entered at a web page, including information as to the telephone number of the new mobile phone, and generates and sends a unique passkey to the new mobile phone by an appropriate communications message, the user thereafter being prompted to enter a passkey at the web page and where upon entering the passkey at the web page, the authenticating party compares the generated unique passkey with the passkey entered at the web page and authenticates the identity of the user in accordance with the result of the comparison and where, once the user has been authenticated, the authenticating party authorises the mobile phone carrier to add the amount of the credit associated with the mobile phone to the credit associated with the new mobile phone.
  • Figure 1 is a schematic of a first embodiment of a system for authenticating the identity of a user.
  • Figure 2 is a schematic of a second embodiment of a system for authenticating the identity of a user.
  • a system 10 for authenticating the identity of a user 12 in order to facilitate the transfer of load from a lost or damaged prep-paid mobile phone or SIM card 14 to a new mobile phone 32 comprising:
  • User 12 is the owner and/or possessor of pre-paid mobile phone 14 and new mobile phone 32.
  • Pre-paid mobile phone 14 and new mobile phone 32 are adapted to operate using the telecommunications network owned and/or operated by carrier 16.
  • Carrier 16 operates carrier account database 20.
  • Carrier account database 20 is a database of user records 18.
  • Carrier 16 also operates, as part of their communication network, pre-determined mobile application shortcode 30 and application shortcode 38. Carrier 16, or an agent of carrier 16, operates web page 42.
  • the carrier 16 with which the pre-paid mobile phone 14 is associated creates a user record 18 in a carrier account database 20.
  • the user record 18 contains the telephone number assigned to the pre-paid mobile phone 14 and the current load balance for the pre-paid mobile phone 14.
  • the user record 18 is thereafter primarily referenced by the assigned telephone number field.
  • the user 12 is prompted by the carrier 16 to enter a Personal Identification Number ("PIN") to allow authorisation of secure transfers of load.
  • PIN Personal Identification Number
  • this prompting takes the form of an SMS message 22 sent to the pre-paid mobile phone 14 to which the user 12 replies with the PIN number.
  • the carrier 16 Upon receipt of the SMS message 22 containing the PIN number and the communication identifier, the carrier 16 operates to update the user record 18 to include the PIN as an additional field. Determining the appropriate user record 18 to update is achieved by this first process:
  • the carrier 16 prompts the user 12 to respond by SMS message 24 with an additional communication identifier.
  • the communication identifier is ideally an e-mail address because of its uniqueness and the fact that e-mail address typically have a single owner and it is in this context that the following examples will be described.
  • the communication identifier can be an instant messenger address, alternative telephone number or postal address.
  • the carrier 16 Upon receipt of the SMS message 24 with the additional communication identifier, the carrier 16 operates to send an e-mail message 26 to the e-mail address entered as the additional communication identifier.
  • the e-mail message 26 contains a unique passkey and a request for the user to send from the pre-paid mobile phone 14 an SMS message 28 containing only the unique passkey to a pre-determined mobile application shortcode 30.
  • the passkey may be in numeric, alphabetic or alphanumeric format. A copy of the unique passkey is also temporarily associated with the user record 18 for verification purposes.
  • the user 12 then follows the instructions contained in the e-mail message 26, upon receipt of the e-mail or when they next check for e-mail sent to their e-mail address.
  • the SMS message 28 is received by the carrier 16 via the predetermined mobile application shortcode 30.
  • the carrier 16 identifies the appropriate user record 18 according to the first process previously described.
  • the carrier 16 compares the unique passkey associated with the user record 18 with the passkey the subject of SMS message 28.
  • the appropriate user record 18 is again updated, this time to include the user's 12 communication identifier, ie. e-mail address, as an additional field.
  • the user 12 can then be identified through both their mobile number and their communication identifier.
  • the unique passkey associated with the user record 18 is discarded.
  • the user 12 is then periodically requested to repeat the foregoing procedure until such time as the user's 12 corresponding user record 18 has a field recording a communication identifier.
  • the user 12 can then seek to recover a load from a lost or damaged pre-paid mobile phone or SIM card 14 to a new mobile phone 32 in one of two ways.
  • the user 12 calls a customer service line of the carrier 16 using their new mobile phone 32.
  • the carrier 16 identifies the corresponding user record 18 for the user 12 - for example by requesting the user to enter in their previous mobile phone number and thereafter checking the entered number against the mobile phone number field of each user record 18 until a match is found.
  • an e-mail message 34 is sent to the e-mail address recorded as the user's 12 communication identifier.
  • E-mail message 34 includes a newly generated unique passkey which may also be in numeric, alphabetic or alphanumeric format.
  • E-mail message 34 may also include a prompt for user 12 to send by SMS message 36 the newly generated unique passkey to an application shortcode 38 using the new mobile phone 32.
  • the carrier 16 identifies the appropriate user record 18 according to the first process previously described. When the appropriate user record 18 has been identified, the carrier 16 compares the newly generated unique passkey associated with the user record 18 with the passkey the subject of SMS message 36.
  • the carrier operates to update the user record 18 to change the mobile phone number field to reflect the new mobile phone number and thereby effect a transfer of load.
  • the user 12 is then sent a SMS message 40 to the new mobile phone number informing them that the transfer was successful.
  • the unique passkey associated with the user record 18 is discarded.
  • the user 12 is then sent a SMS message 40 to the new mobile phone 32 informing them that the request was unsuccessful.
  • the user 12 logs onto a web page 42.
  • the user 12 is asked to enter in the following information:
  • the carrier 16 then receives the information the user 12 has entered into the web page 42.
  • the carrier 16 then operates to identify the user's 12 corresponding user record 18 according to this second process:
  • SMS message 44 is sent to new mobile phone 32.
  • SMS message 44 includes a newly generated unique passkey which may be in numeric, alphabetic or alphanumeric format. SMS message 44 may also include a prompt for user 12 to return to web page 42 to enter the unique passkey.
  • the carrier 16 identifies the appropriate user record 18 according to the second process previously described.
  • the carrier 16 compares the newly generated unique passkey associated with the user record 18 with the passkey entered via web page 42. If the two passkeys are identical, the carrier operates to update the user record 18 to change the mobile phone number field to reflect the new mobile phone number and thereby effect a transfer of load.
  • the user 12 is then sent a SMS message 40 to the new mobile phone number informing them that the transfer was successful.
  • the unique passkey associated with the user record 18 is discarded.
  • the user 12 is then sent a SMS message 40 to the new mobile phone 32 informing them that the request was unsuccessful.
  • the invention is not limited to the embodiments described.
  • the invention is not limited to situations involving pre-paid mobile phones.
  • post-paid mobile phones may be used.
  • Electronic wallets are created with the post-paid mobile phone as the central identifying medium; such electronic wallets do not necessarily contain loads, rather could be real currency as contained in one's bank account or even loads that are only intended for resale and not for own or personal use.
  • the above process could easily be adapted for use in other situations requiring authentication of the identity of a user.
  • the need to transfer load may arise in situations other than loss or damage of a mobile phone or SIM card. For example, load may be transferred prior to the mobile phone with new SIM card being given as a gift or loan to another party. Furthermore, the need to transfer load may be a result of loss or damage of the SIM card of the mobile phone, rather than loss or damage of the mobile phone itself. As another example, the user may simply wish to re-assign current electronic wallets associated with a pre-paid mobile account to a post-paid mobile account, as post-paid accounts are much more secure and inexpensive to maintain for a heavy user.
  • the carrier 16 may be replaced with an agent or facilitator.
  • the agent or facilitator may operate a modified carrier account database 20.
  • each user record 18 omits details of the current load balance for the pre-paid mobile phone.
  • Prompting the user 12 may take many forms and the invention should not be limited to any particular form of prompting.
  • the initial prompting of the user 12 may be by way of a notice in the pre- paid mobile phone 14 package asking the user to send a message or call a predetermined short code.
  • response may take many forms and the invention should not be limited to any form of response.
  • response may be by e-mail, or by returning a simple form downloadable from web site 42 to the carrier 16 by post.
  • E-mail messages 28, 34 may be in plain text or HTML format.
  • depiction of the unique passkey may be in a slightly distorted form or in graphic form for additional security purposes.
  • the e-mail messages 28, 34 may also be encrypted for yet additional security.
  • the user 12 may be also be sent a communication to their communication identifier informing them that a request to transfer load failed.
  • carrier 16 may take action to prevent further load requests from being processed and the corresponding pre-paid mobile phone from being used until such time as the user 12 contacts the carrier 16 and satisfies them as to their identity through an additional security procedure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)

Abstract

A system (10) for authenticating the identity of a user (12) comprising a user (12) and an authenticating party (16), where the user (12) enters identifying information to a web page (42) associated with the authenticating party (16) along with details of a communication identifier, the authenticating party (16) generates a unique passkey and sends a communications message (44) including the unique passkey to the user (12) by way of the communication identifier, the user (12) then operable to enter a passkey using an appropriate mechansim provided for at the web page (42) and where the authenticating party (16) authenticates the identity of the user (12) in accordance with the result of a comparison between the passkey entered via the web page (42) and the generated unique passkey. The system can also be performed by entering information and receiving information via a second destination address. Further embodiments describe a system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user.

Description

"System and Method for Authenticating the Identity of a User"
Field of the Invention
The present invention relates to a system and method for authenticating the identity of a user. The invention is particularly useful for, but not limited to, authenticating the identity of a pre-paid mobile phone customer when said user has requested the transfer of their pre-paid balance amount following loss or damage of their mobile phone or SIM card. Other uses relate to other services whereby the pre-paid mobile phone number is used as a quasi-account number for various financial and currency accounts, whereby a balance is kept, and funds may be sent out and received.
Background Art
The following discussion of the background to the invention is intended to facilitate an understanding of the present invention. However, it should be appreciated that the discussion is not an acknowledgment or admission that any of the material referred to was published, known or part of the common general knowledge of the person skilled in the art in any jurisdiction as at the priority date of the application.
The world is moving towards a true m-commerce arrangement where the amount credited to a mobile phone (hereafter referred to as "load") is used as currency. At the same time, more and more people are driven towards being a pre-paid mobile phone customer due to the convenience of acquiring such type of account and for some, as this arrangement provides anonymity.
The problem with this arrangement and a problem with pre-paid mobile phone use in general, is one of customer authentication. In current arrangements, when a pre-paid mobile phone customer loses or damages their mobile phone or SIM card (as the case may be for most GSM mobile phone systems), the customer also loses their identity in the eyes of their mobile phone carrier. This also means that the pre-paid mobile phone carrier also loses their accrued load. In the case of a pre-paid mobile phone carrier who is a merchant engaging in m-commerce transactions, this can amount to a loss of several thousands of dollars.
One means of overcoming this arrangement is to require the pre-paid mobile phone customer to complete forms which provide the information necessary to link the customer's true identity to their mobile phone. However, this solution negates the attractiveness of convenience and anonymity that have been key factors in the growth of pre-paid mobile phone customers. For those not concerned with anonymity, this solution is not ideal as some customers are always adverse to forms or do not have the time to complete such forms.
It is an object of the present invention to provide a simplified means of authenticating a user's identity that alleviates, in whole or in part, some of the problems mentioned above.
Disclosure of the Invention
Throughout the specification, unless the context requires otherwise, the word "comprise" or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers.
In accordance with a first aspect of the invention there is provided a system for authenticating the identity of a user comprising: • a user;
• an authenticating party;
where the authenticating party identifies the user through a first communication identifier and generates and sends a unique passkey to a second communication identifier associated with the user, the user thereafter being prompted to send a communications message including a passkey to a predefined destination and where upon receipt of the communications message, the authenticating party compares the generated unique passkey with the passkey included in the communications message and authenticates the identity of the user in accordance with the result of the comparison.
The communications message may be an e-mail, a SMS message, a data packet including data inputted by the user at a web page, or even a physical postal package sent to the user's home or shipping address.
In a situation where the authentication is required in the context of operation of a mobile phone, the authenticating party may be a carrier, an authorised agent of the carrier or a facilitator. In this context, the authentication procedure can be used as a means of authenticating a user's identity for the purposes of transferring load from a lost or damaged pre-paid mobile phone or SIM card to a new pre-paid mobile phone.
Ideally, the system provides a mechanism by which the user can record the second communication identifier prior to making use of the authentication procedure. This mechanism may comprise the user sending a communications message to the authenticating party containing a first passkey. The authenticating party then updates the user's corresponding user account to include the first passkey before requesting the user to provide details of the second communication identifier. The authenticating party then sends a message to the second communication identifier. This message contains a second passkey which the user is required to send to a pre-defined location. This second passkey is also associated with the user's corresponding user account to allow the second passkey sent by the user to the pre-defined location to be verified. Upon verification, the user's corresponding user account is again updated to include the second communication identifier. Alternative mechanisms that incorporate all or part of the features of the mechanism described previously in this paragraph may also be implemented.
The passkeys may be alphabetic, alphanumeric or numeric in format. The passkeys may also be modified for security purposes, for example, by being encrypted or slightly distorted. The predefined location and predefined destination may be an e-mail address, a mobile application short-code or postal address.
It is preferable that the first communication identifier be a mobile phone number and the second communication identifier be an e-mail address because of their uniqueness and the fact that each identifier typically has a single owner. However, it is possible to create alternative arrangements where the communication identifiers could be an instant messenger address, an alternative telephone number, a web page/IP address or postal address.
In situations where the user cannot be authenticated after one or more attempts, the authenticating party may take action to prevent further attempts at authentication until the user contacts the authenticating party and satisfies them as to their identity through an additional security procedure.
In accordance with a second aspect of the invention there is provided a user seeking authentication of their identity by an authenticating party, the user being identified by the authenticating party through a first communication identifier and thereafter receiving a unique passkey generated by the authenticating party by way of a second communication identifier recorded with the authenticating party as being applicable to that user, the user thereafter sending a communications message including a passkey to a predefined destination and the authenticating party thereafter comparing the generated unique passkey with the passkey included in the user's communications message and authenticating the identity of the user in accordance with the result of the comparison.
In accordance with a third aspect of the invention there is provided an authenticating party capable of authenticating the identity of a user, the authenticating party identifying the user through a first communication identifier; generating and sending a unique passkey to the user through a second communication identifier recorded with the authenticating party as being applicable to that user; receiving a communications message from the user including a passkey at a predefined destination and authenticating the identity of the user in accordance with the result of a comparison between the generated unique passkey and the passkey included in the user's communications message.
In accordance with a fourth aspect of the invention there is provided a method for authenticating the identity of a user comprising: • identifying the user through a first communication identifier;
• generating and sending a unique passkey to a second communication identifier associated with the user;
• receiving a communications message at a predefined destination from the user including a passkey; and • authenticating the identity of the user in accordance with the results of a comparison between the passkey in the communications message and the generated unique passkey.
In accordance with a fifth aspect of the invention there is provided a system for authenticating the identity of a user comprising: • a user;
• an authenticating party;
where the user enters identifying information to a web page associated with the authenticating party along with details of a second communication identifier, the authenticating party generates a unique passkey and sends a communications message including the unique passkey to the user through the second communication identifier, the user then enters a passkey to the web page and the authenticating party authenticates the identity of the user in accordance with the results of a comparison between the passkey entered at the web page and the generated unique passkey. ln accordance with a sixth aspect of the invention there is provided a user seeking authentication of their identity by an authenticating party, the user being identified by the authenticating party through information entered at a web page and thereafter receiving a unique passkey generated by the authenticating party by way of a second communication identifier recorded with the authenticating party as being applicable to that user, the user thereafter entering a passkey at the web page and the authenticating party thereafter comparing the generated unique passkey with the passkey entered at the web page and authenticating the identity of the user in accordance with the result of the comparison.
In accordance with a seventh aspect of the invention there is provided an authenticating party capable of authenticating the identity of a user, the authenticating party identifying the user through information entered at a web page; generating and sending a unique passkey to the user through a second communication identifier recorded with the authenticating party as being applicable to that user; receiving a passkey from the user entered at the web page and authenticating the identity of the user in accordance with the result of a comparison between the generated unique passkey and the passkey entered at the web page.
In accordance with an eighth aspect of the invention there is provided a method for authenticating the identity of a user comprising:
• identifying the user through information entered at a web page;
• generating and sending a unique passkey to a second communication identifier associated with the user;
• receiving a passkey entered at the web page; and • authenticating the identity of the user in accordance with the results of a comparison between the passkey entered at the web page and the generated unique passkey. ln accordance with a ninth aspect of the invention there is provided a system for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising:
• a user; • an authenticating party; and
• a mobile phone carrier who operates the telecommunications network used by the mobile phone and new mobile phone.
where the authenticating party identifies the user through information provided in a communication message sent from the new mobile phone and generates and sends a unique passkey to a second communication identifier associated with the user, the user thereafter being prompted to send a communications message including a passkey to a predefined destination and where upon receipt of the communications message, the authenticating party compares the generated unique passkey with the passkey included in the communications message and authenticates the identity of the user in accordance with the result of the comparison and where, once the user has been authenticated, the authenticating party authorises the mobile phone carrier to add the amount of credit associated with the mobile phone to the credit associated with the new mobile phone.
In accordance with a tenth aspect of the invention there is provided a system for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising:
• a user;
• an authenticating party; and
• a mobile phone carrier who operates the telecommunications network used by the mobile phone and new mobile phone. where the authenticating party identifies the user through information entered at a web page, including information as to the telephone number of the new mobile phone, and generates and sends a unique passkey to the new mobile phone by an appropriate communications message, the user thereafter being prompted to enter a passkey at the web page and where upon entering the passkey at the web page, the authenticating party compares the generated unique passkey with the passkey entered at the web page and authenticates the identity of the user in accordance with the result of the comparison and where, once the user has been authenticated, the authenticating party authorises the mobile phone carrier to add the amount of the credit associated with the mobile phone to the credit associated with the new mobile phone.
Further embodiments of the invention include:
• an authenticating party for use in a system for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user according to the ninth or tenth embodiment;
• methods for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user; and
• computer readable mediums having software recorded thereon for effecting a method for transferring the credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user.
Brief Description of the Drawings
The invention will now be described with reference to the following drawings, of which:
Figure 1 is a schematic of a first embodiment of a system for authenticating the identity of a user. Figure 2 is a schematic of a second embodiment of a system for authenticating the identity of a user.
Best Mode(s) for Carrying Out the Invention
In accordance with a first embodiment of the present invention there is provided a system 10 for authenticating the identity of a user 12 in order to facilitate the transfer of load from a lost or damaged prep-paid mobile phone or SIM card 14 to a new mobile phone 32 comprising:
• user 12;
• a pre-paid mobile phone 14; • a carrier 16;
• a carrier account database 20;
• a new mobile phone 32;
User 12 is the owner and/or possessor of pre-paid mobile phone 14 and new mobile phone 32. Pre-paid mobile phone 14 and new mobile phone 32 are adapted to operate using the telecommunications network owned and/or operated by carrier 16. Carrier 16 operates carrier account database 20. Carrier account database 20 is a database of user records 18.
Carrier 16 also operates, as part of their communication network, pre-determined mobile application shortcode 30 and application shortcode 38. Carrier 16, or an agent of carrier 16, operates web page 42.
The invention will now be described in the context of its most likely use.
When a user 12 activates a pre-paid mobile phone 14, the carrier 16 with which the pre-paid mobile phone 14 is associated creates a user record 18 in a carrier account database 20. The user record 18 contains the telephone number assigned to the pre-paid mobile phone 14 and the current load balance for the pre-paid mobile phone 14. The user record 18 is thereafter primarily referenced by the assigned telephone number field.
Following creation of the user record 18, the user 12 is prompted by the carrier 16 to enter a Personal Identification Number ("PIN") to allow authorisation of secure transfers of load. In the preferred arrangement, this prompting takes the form of an SMS message 22 sent to the pre-paid mobile phone 14 to which the user 12 replies with the PIN number.
Upon receipt of the SMS message 22 containing the PIN number and the communication identifier, the carrier 16 operates to update the user record 18 to include the PIN as an additional field. Determining the appropriate user record 18 to update is achieved by this first process:
• Identifying the telephone number of the pre-paid mobile phone 14 by means of caller identification; • Comparing the telephone number of each user record 18 in the carrier account database 20 with the identified telephone number until a match is found.
Once the PIN has been added to the user record 18, the carrier 16 prompts the user 12 to respond by SMS message 24 with an additional communication identifier.
The communication identifier is ideally an e-mail address because of its uniqueness and the fact that e-mail address typically have a single owner and it is in this context that the following examples will be described. However, in alternative arrangements, the communication identifier can be an instant messenger address, alternative telephone number or postal address.
Upon receipt of the SMS message 24 with the additional communication identifier, the carrier 16 operates to send an e-mail message 26 to the e-mail address entered as the additional communication identifier. The e-mail message 26 contains a unique passkey and a request for the user to send from the pre-paid mobile phone 14 an SMS message 28 containing only the unique passkey to a pre-determined mobile application shortcode 30. The passkey may be in numeric, alphabetic or alphanumeric format. A copy of the unique passkey is also temporarily associated with the user record 18 for verification purposes.
The user 12 then follows the instructions contained in the e-mail message 26, upon receipt of the e-mail or when they next check for e-mail sent to their e-mail address.
The SMS message 28 is received by the carrier 16 via the predetermined mobile application shortcode 30. The carrier 16 identifies the appropriate user record 18 according to the first process previously described. When the appropriate user record 18 has been identified, the carrier 16 compares the unique passkey associated with the user record 18 with the passkey the subject of SMS message 28.
If the two passkeys are identical, the appropriate user record 18 is again updated, this time to include the user's 12 communication identifier, ie. e-mail address, as an additional field. The user 12 can then be identified through both their mobile number and their communication identifier.
Where the two passkeys differ, the unique passkey associated with the user record 18 is discarded. The user 12 is then periodically requested to repeat the foregoing procedure until such time as the user's 12 corresponding user record 18 has a field recording a communication identifier.
Subsequent to this recording procedure, the user 12 can then seek to recover a load from a lost or damaged pre-paid mobile phone or SIM card 14 to a new mobile phone 32 in one of two ways.
In the first way, the user 12 calls a customer service line of the carrier 16 using their new mobile phone 32. The carrier 16 then identifies the corresponding user record 18 for the user 12 - for example by requesting the user to enter in their previous mobile phone number and thereafter checking the entered number against the mobile phone number field of each user record 18 until a match is found. Once identified, an e-mail message 34 is sent to the e-mail address recorded as the user's 12 communication identifier. E-mail message 34 includes a newly generated unique passkey which may also be in numeric, alphabetic or alphanumeric format. E-mail message 34 may also include a prompt for user 12 to send by SMS message 36 the newly generated unique passkey to an application shortcode 38 using the new mobile phone 32.
Again, for verification purposes, a copy of the newly generated unique passkey is associated with the user's 12 corresponding user record 18.
Once the user 12 has sent the SMS message 36 to the application shortcode 38, the carrier 16 identifies the appropriate user record 18 according to the first process previously described. When the appropriate user record 18 has been identified, the carrier 16 compares the newly generated unique passkey associated with the user record 18 with the passkey the subject of SMS message 36.
If the two passkeys are identical, the carrier operates to update the user record 18 to change the mobile phone number field to reflect the new mobile phone number and thereby effect a transfer of load. The user 12 is then sent a SMS message 40 to the new mobile phone number informing them that the transfer was successful.
Where the two passkeys differ, the unique passkey associated with the user record 18 is discarded. The user 12 is then sent a SMS message 40 to the new mobile phone 32 informing them that the request was unsuccessful.
In the second way, the user 12 logs onto a web page 42. At the web page 42, the user 12 is asked to enter in the following information:
• their communication identifier; • their PIN; and
• their new mobile phone number.
The carrier 16 then receives the information the user 12 has entered into the web page 42. The carrier 16 then operates to identify the user's 12 corresponding user record 18 according to this second process:
• Comparing the entered communication identifier with the communication identifier recorded for each user record 18;
• If the communication identifiers match, adding the user record 18 to a further search list; • Comparing the entered PIN with the PIN recorded for each user record 18 in the further search list until such time as a match is found.
Once a matching record is found, an SMS message 44 is sent to new mobile phone 32. SMS message 44 includes a newly generated unique passkey which may be in numeric, alphabetic or alphanumeric format. SMS message 44 may also include a prompt for user 12 to return to web page 42 to enter the unique passkey.
Again, for verification purposes, a copy of the newly generated unique passkey is associated with the user's 12 corresponding user record 18.
Once the user 12 has entered the unique passkey via web page 42, the carrier 16 identifies the appropriate user record 18 according to the second process previously described. When the appropriate user record 18 has been identified, the carrier 16 compares the newly generated unique passkey associated with the user record 18 with the passkey entered via web page 42. If the two passkeys are identical, the carrier operates to update the user record 18 to change the mobile phone number field to reflect the new mobile phone number and thereby effect a transfer of load. The user 12 is then sent a SMS message 40 to the new mobile phone number informing them that the transfer was successful.
Where the two passkeys differ, the unique passkey associated with the user record 18 is discarded. The user 12 is then sent a SMS message 40 to the new mobile phone 32 informing them that the request was unsuccessful.
It should be appreciated by the person skilled in the art that the above invention is not limited to the embodiments described. In particular, • The invention is not limited to situations involving pre-paid mobile phones. For example, even post-paid mobile phones may be used. Electronic wallets are created with the post-paid mobile phone as the central identifying medium; such electronic wallets do not necessarily contain loads, rather could be real currency as contained in one's bank account or even loads that are only intended for resale and not for own or personal use. The above process could easily be adapted for use in other situations requiring authentication of the identity of a user.
• The need to transfer load may arise in situations other than loss or damage of a mobile phone or SIM card. For example, load may be transferred prior to the mobile phone with new SIM card being given as a gift or loan to another party. Furthermore, the need to transfer load may be a result of loss or damage of the SIM card of the mobile phone, rather than loss or damage of the mobile phone itself. As another example, the user may simply wish to re-assign current electronic wallets associated with a pre-paid mobile account to a post-paid mobile account, as post-paid accounts are much more secure and inexpensive to maintain for a heavy user. (Carriers can easily restore an old account unto a new SIM card for post-paid users, rendering the lost or damaged post-paid SIM card useless.) • The carrier 16 may be replaced with an agent or facilitator. In such an arrangement, the agent or facilitator may operate a modified carrier account database 20. In the modified carrier account database 20, each user record 18 omits details of the current load balance for the pre-paid mobile phone. As a result, when a user's 12 identity has been authenticated and a request made to transfer load from one pre-paid mobile phone to another, the agent or facilitator operates to transfer the load by making a series of mobile terminating calls or varying denominations against the first pre-paid mobile phone, crediting the account of the second pre-paid mobile phone with the denomination (minus commission).
• Prompting the user 12 may take many forms and the invention should not be limited to any particular form of prompting. For example, the initial prompting of the user 12 may be by way of a notice in the pre- paid mobile phone 14 package asking the user to send a message or call a predetermined short code.
• Similarly, the response provided by a user 12 to a prompt may take many forms and the invention should not be limited to any form of response. For example, response may be by e-mail, or by returning a simple form downloadable from web site 42 to the carrier 16 by post.
• E-mail messages 28, 34 may be in plain text or HTML format. In HTML format, depiction of the unique passkey may be in a slightly distorted form or in graphic form for additional security purposes. The e-mail messages 28, 34 may also be encrypted for yet additional security.
• If the user 12 fails in their attempt to transfer load, the user 12 may be also be sent a communication to their communication identifier informing them that a request to transfer load failed. Upon multiple failures of an attempt to transfer load, carrier 16 may take action to prevent further load requests from being processed and the corresponding pre-paid mobile phone from being used until such time as the user 12 contacts the carrier 16 and satisfies them as to their identity through an additional security procedure.

Claims

We Claim:
1. A system for authenticating the identity of a user comprising: a user; an authenticating party, where the user enters identifying information to a web page associated with the authenticating party along with details of a communication identifier, the authenticating party generates a unique passkey and sends a communications message including the unique passkey to the user by way of the communication identifier, the user then operable to enter a passkey using an appropriate mechanism provided for at the web page and where the authenticating party authenticates the identity of the user in accordance with the result of a comparison between the passkey entered via the web page and the generated unique passkey.
2. A system for authenticating the identity of a user comprising: a user; an authenticating party, where the authenticating party identifies the user through a first communication identifier and generates and communicates a unique passkey to a second communication identifier, the user thereafter being prompted to send a communications message including a passkey to a predefined destination address associated with the authenticating party and where, upon receipt of the communication message at the predefined destination address, the authenticating party compares the generated unique passkey with the passkey included in the communications message and authenticates the identity of the user in accordance with the result of the comparison.
3. A system for authenticating the identity of a user according to claim 2, where the user provides details of the first communication identifier and the second communication identifier to the authenticating party as an initial step.
4. A system for authenticating the identity of a user according to any preceding claim where if the user cannot be authenticated after one or more attempts, the authenticating party prevents further attempts at authentication until the user contacts the authenticating party and satisfies the authenticating party as to their identity through an additional security procedure.
5. A system for authenticating the identity of a user according to any preceding claim, where the communication identifiers are at least two of the following: a mobile phone number; an instant messenger address; an e-mail address; a fixed phone number; a facsimile number; a domain name; a static IP address; a postal address.
6. A system for authenticating the identity of a user according to any preceding claim, where the communications messages are one of the following: an e- mail, a SMS message, a MMS message, a data packet including data inputted by the user at a web page, a physical postal package sent to the user's home or shipping address.
7. A system for authenticating the identity of a user according to any preceding claim, where the passkey is alphabetic, alphanumeric or numeric in format.
8. A system for authenticating the identity of a user according to any preceding claim, where the passkey is modified for security purposes.
9. A system for authenticating the identity of a user according to claim 8, where the passkey is encrypted.
10. A user seeking authentication of their identity by an authenticating party, the user entering identifying information to a web page associated with the authenticating party along with details of a communication identifier, the user thereafter receiving a communications message from the authenticating party via the communication identifier, the communications message including a unique passkey generated by the authenticating party, and in response operable to enter a passkey using an appropriate mechanism provided for at the web page, the authenticating party thereafter comparing the generated unique passkey with the passkey entered via the web page and authenticating the identity of the user in accordance with the results of the comparison.
11. A user seeking authentication of their identity by an authenticating party, the user being identified by the authenticating party through a first communication identifier and thereafter receiving a unique passkey generated by the authenticating party and communicated by way of a second communication identifier recorded with the authenticating party as being applicable to that user, the user thereafter sending a communications message including a passkey to a predefined destination and the authenticating party thereafter comparing the generated unique passkey with the passkey included in the user's communication message and authenticating the identity of the user in accordance with the result of the comparison.
12. A system for authenticating the identity of a user according to claim 8, where the passkey is distorted while still being recognisable.
13. An authenticating party capable of authenticating the identity of a user, the authenticating party receiving identifying information and details of a communication identifier by way of a web page associated with the authenticating party, generating and communicating a unique passkey via the second communication identifier and receiving a passkey entered by the user using an appropriate mechanism provided for at the web page and authenticating the identity of the user in accordance with the result of a comparison between the generated unique passkey and the passkey entered by the user via the web page.
14. An authenticating party capable of authenticating the identity of a user, the authenticating party identifying the user through a first communication identifier; generating and communicating a unique passkey to the user through a second communication identifier recorded with the authenticating party as being applicable to that user; receiving a communications message from the user including a passkey at a predefined destination address and authenticating the identity of the user in accordance with the result of a comparison between the generated unique passkey and the passkey included in the user's communication message.
15. A method for authenticating the identity of a user comprising: identifying the user through information entered at a web page; generating and sending a unique passkey to a communication identifier associated with the user; receiving a passkey entered at the web page; and authenticating the identity of a user in accordance with the results of a comparison between the passkey entered at the web page and the generated unique passkey.
16. A method for authenticating the identity of a user comprising: identifying the user through a first communication identifier; generating and sending a unique passkey to a second communication identifier associated with the user; receiving a communications message at a predefined destination from the user including a passkey; and authenticating the identity of the user in accordance with the results of a comparison between the passkey in the communications message and the generated unique passkey.
17. A computer readable medium having software recorded thereon, said software including: identifying means for identifying the user through information entered at a web page; communication means for generating and sending a unique passkey to a communication identifier associated with the user; and receiving a passkey entered at the web page; and authenticating means for authenticating the identity of a user in accordance with the results of a comparison between the passkey entered at the web page and the generated unique passkey.
18. A computer readable medium having software recorded thereon, said software including: identifying means for identifying the user through a first communication identifier; communication means for generating and sending a unique passkey to a second communication identifier associated with the user; and receiving a communications message at a predefined destination from the user including a passkey; and authenticating means for authenticating the identity of the user in accordance with the results of a comparison between the passkey in the communications message and the generated unique passkey.
19. A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising: a user; an authenticating party; and a mobile phone carrier who operates the telecommunications network used by the mobile phone or SIM card and the new mobile phone, where the authenticating party identifies the user through information provided in a communication message sent from the new mobile phone and generates and communicates a unique passkey to a second communication identifier associated with the user, the user thereafter being prompted to send a communications message including a passkey to a predefined destination and where upon receipt of the communications message, the authenticating party compares the generated unique passkey with the passkey included in the communications message and authenticates the identity of the user in accordance with the result of the comparison and where, once the user has been authenticated, the authenticating party authorises the mobile phone carrier to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone.
20. A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising: a user; an authenticating party; and a mobile phone carrier who operates the telecommunications network used by the mobile phone or SIM card and new mobile phone, where the authenticating party identifies the user through information entered at a web page, including information as to the number of the new mobile phone, and generates and communicates a unique passkey to the new mobile phone by an appropriate communications message, the user thereafter being prompted to enter a passkey at the web page and where upon entering the passkey at the web page, the authenticating party compares the generated unique passkey with the passkey entered at the web page and authenticates the identity of the user in accordance with the result of the comparison and where, once the user has been authenticated, the authenticating party authorises the mobile phone carrier to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone.
21.A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user according to claim 19 or claim 20, where the information by which the authenticating party identifies the user includes the number of the mobile phone or SIM card.
22. A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user according to claim19 or claim 21 , as dependent on claim 19, where the predefined destination is an e-mail address and the communications message is an e-mail message.
23. A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user according to any one of claims 19 to 22, where the mobile phone carrier adds the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone by changing a user's account with the mobile phone carrier associated with the mobile phone or SIM card to record the new mobile phone number and thereby associate the user's account with the new mobile phone number.
24. A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user according to any one of claims 19 to 22, where the authenticating party authorises the mobile phone carrier to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone by issuing a series of commands representative of the user having made a number of mobile terminating calls using the mobile phone or SIM card and issuing a series of commands representative of the user having made a credit payment on a user's account associated with the new mobile phone having a corresponding value to the value of the number of mobile terminating calls.
25. A system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user according to any one of claims 19 to 24, where upon the user failing to authenticate their identity a preset number of times, the authenticating party prevents further requests to transfer credit of a mobile phone or SIM card to a new mobile phone until such time as the user satisfies the authenticating party as to their identity through an additional security procedure.
26. An authenticating party for use in a system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user, the authenticating party operable to identify the user through information provided in a communication carrier sent from a new mobile phone, generate and communicate a unique passkey to a second communication identifier associated with the user and receive a communications message, at a predefined destination, including a passkey, the authenticating party thereafter authenticating the user on the basis of a comparison between the generated unique passkey and the passkey included in the communications message and, if the user is authenticated, authorise a mobile phone carrier who operates a telecommunications network used by the mobile phone or SIM card and the new mobile phone to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone.
27. An authenticating party for use in a system for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user, the authenticating party operable to identify the user through information entered at a web page, including information as to the number of the new mobile phone, generate and communicate a unique passkey to the new mobile phone by an appropriate communications message and receive a passkey entered at the web page in response to the communications message, the authenticating party thereafter authenticating the user on the basis of a comparison between the generated unique passkey and the passkey entered at the web page and, if the user is authenticated, authorise a mobile phone carrier who operates a telecommunications network used by the mobile phone or SIM card and the new mobile phone to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone.
28. A method for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising: identifying the user through information provided in a communication message sent from the new mobile phone; generating and communicating a unique passkey to a second communication identifier associated with the user; receiving a communications message including a passkey at a predefined destination; comparing the generated unique passkey with the passkey included in the communications message; authenticating the identity of the user in accordance with the result of the comparison; and if authenticated, authorising the mobile phone carrier who operates the telecommunications network used by the mobile phone or SIM card and the new mobile phone to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone.
29. A method for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user comprising: identifying the user through information entered at a web page, including information as to the number of the new mobile phone; generating and communicating a unique passkey to the new mobile phone by an appropriate communications message; receiving a passkey entered at the web page in response to the communications message; comparing the generated unique passkey with the passkey entered at the web page; authenticating the identity of the user in accordance with the result of the comparison; and if authenticated, authorising the mobile phone carrier who operates the telecommunications network used by the mobile phone or SIM card and the new mobile phone to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone.
30. A computer readable medium having software recorded thereon for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user, the software comprising: identification means for identifying the user through information provided in a communication message sent from the new mobile phone; communications means for generating and communicating a unique passkey to a second communication identifier associated with the user, and receiving a communications message including a passkey at a predefined destination; comparison means for comparing the generated unique passkey with the passkey included in the communications message; authentication means for authenticating the identity of the user in accordance with the result of the comparison; and transfer means for authorising the mobile phone carrier who operates the telecommunications network used by the mobile phone or SIM card and the new mobile phone to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone, if the user's identity is appropriately authenticated.
31. A computer readable medium having software recorded thereon for transferring credit of a mobile phone or SIM card to a new mobile phone on authentication of the identity of a user, the software comprising: identification means for identifying the user through information entered at a web page, including information as to the number of the new mobile phone; communications means for generating and communicating a unique passkey to the new mobile phone by an appropriate communications message and receiving a passkey entered at the web page in response to the communications message; comparison means for comparing the generated unique passkey with the passkey entered at the web page; authentication means for authenticating the identity of the user in accordance with the result of the comparison; and transfer means for authorising the mobile phone carrier who operates the telecommunications network used by the mobile phone or SIM card and the new mobile phone to add the amount of credit associated with the mobile phone or SIM card to the credit associated with the new mobile phone, if the user's identity is appropriately authenticated.
PCT/SG2005/000026 2004-02-05 2005-01-28 System and method for authenticating the identity of a user WO2005076523A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0615071A GB2426104A (en) 2004-02-05 2005-01-28 System and method for authenticating the identity of a user
EP05704846A EP1714424A4 (en) 2004-02-05 2005-01-28 System and method for authenticating the identity of a user
US10/597,628 US20080281737A1 (en) 2004-02-05 2005-01-28 System and Method for Authenticating the Identity of a User

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG200400555-9 2004-02-05
SG200400555 2004-02-05

Publications (1)

Publication Number Publication Date
WO2005076523A1 true WO2005076523A1 (en) 2005-08-18

Family

ID=34836934

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2005/000026 WO2005076523A1 (en) 2004-02-05 2005-01-28 System and method for authenticating the identity of a user

Country Status (6)

Country Link
US (1) US20080281737A1 (en)
EP (1) EP1714424A4 (en)
AR (1) AR047593A1 (en)
GB (1) GB2426104A (en)
TW (1) TW200530868A (en)
WO (1) WO2005076523A1 (en)

Families Citing this family (97)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7707120B2 (en) * 2002-04-17 2010-04-27 Visa International Service Association Mobile account authentication service
US9400589B1 (en) 2002-05-30 2016-07-26 Consumerinfo.Com, Inc. Circular rotational interface for display of consumer credit information
US9710852B1 (en) 2002-05-30 2017-07-18 Consumerinfo.Com, Inc. Credit report timeline user interface
US7792715B1 (en) 2002-09-21 2010-09-07 Mighty Net, Incorporated Method of on-line credit information monitoring and control
US8732004B1 (en) 2004-09-22 2014-05-20 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US8175889B1 (en) 2005-04-06 2012-05-08 Experian Information Solutions, Inc. Systems and methods for tracking changes of address based on service disconnect/connect data
US20060280382A1 (en) * 2005-06-06 2006-12-14 Mobicom Corporation Methods and apparatus for a wireless terminal with third party advertising: advertising-enabled wireless terminal
US20060282308A1 (en) * 2005-06-06 2006-12-14 Mobicom Corporation Methods and apparatus for a wireless terminal with third party advertising: card with indicium of sponsorship
US20060282384A1 (en) * 2005-06-06 2006-12-14 Mobicom Corporation Methods and apparatus for a wireless terminal with third party advertising: dual authentication method
US20060282385A1 (en) * 2005-06-06 2006-12-14 Mobicom Corporation Methods and apparatus for a wireless terminal with third party advertising: authentication methods
US8023624B2 (en) * 2005-11-07 2011-09-20 Ack Ventures Holdings, Llc Service interfacing for telephony
US7657489B2 (en) 2006-01-18 2010-02-02 Mocapay, Inc. Systems and method for secure wireless payment transactions
US8301897B2 (en) * 2006-08-23 2012-10-30 Cisco Technology, Inc. Challenge-based authentication protocol
US8036979B1 (en) 2006-10-05 2011-10-11 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US20080103984A1 (en) * 2006-10-30 2008-05-01 Mobilekash, Inc. System, Method, and Computer-Readable Medium for Mobile Payment Authentication and Authorization
US7657569B1 (en) 2006-11-28 2010-02-02 Lower My Bills, Inc. System and method of removing duplicate leads
US7778885B1 (en) 2006-12-04 2010-08-17 Lower My Bills, Inc. System and method of enhancing leads
US8606666B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US8606626B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
JP4873484B2 (en) * 2007-03-30 2012-02-08 京セラ株式会社 Mobile device
US20080294540A1 (en) 2007-05-25 2008-11-27 Celka Christopher J System and method for automated detection of never-pay data sets
US8533821B2 (en) 2007-05-25 2013-09-10 International Business Machines Corporation Detecting and defending against man-in-the-middle attacks
US20090063312A1 (en) * 2007-08-28 2009-03-05 Hurst Douglas J Method and System for Processing Secure Wireless Payment Transactions and for Providing a Virtual Terminal for Merchant Processing of Such Transactions
US8839386B2 (en) 2007-12-03 2014-09-16 At&T Intellectual Property I, L.P. Method and apparatus for providing authentication
US9990674B1 (en) 2007-12-14 2018-06-05 Consumerinfo.Com, Inc. Card registry systems and methods
US8127986B1 (en) 2007-12-14 2012-03-06 Consumerinfo.Com, Inc. Card registry systems and methods
US8463674B2 (en) * 2008-01-03 2013-06-11 Mocapay, Inc. System and method for distributing mobile gift cards
US8744940B2 (en) 2008-01-03 2014-06-03 William O. White System and method for distributing mobile compensation and incentives
US20090265270A1 (en) * 2008-04-18 2009-10-22 Ncr Corporation Token activation
US8374588B2 (en) 2008-06-02 2013-02-12 Mocapay, Inc. Method and system for sending marketing messages to mobile-device users from a mobile-commerce platform
US10373198B1 (en) 2008-06-13 2019-08-06 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US7991689B1 (en) 2008-07-23 2011-08-02 Experian Information Solutions, Inc. Systems and methods for detecting bust out fraud using credit data
US9256904B1 (en) 2008-08-14 2016-02-09 Experian Information Solutions, Inc. Multi-bureau credit file freeze and unfreeze
US8060424B2 (en) 2008-11-05 2011-11-15 Consumerinfo.Com, Inc. On-line method and system for monitoring and reporting unused available credit
WO2010094331A1 (en) * 2009-02-19 2010-08-26 Nokia Siemens Networks Oy Authentication to an identity provider
CN101834834A (en) * 2009-03-09 2010-09-15 华为软件技术有限公司 Authentication method, device and system
US20100269162A1 (en) 2009-04-15 2010-10-21 Jose Bravo Website authentication
US8683609B2 (en) 2009-12-04 2014-03-25 International Business Machines Corporation Mobile phone and IP address correlation service
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US10453093B1 (en) 2010-04-30 2019-10-22 Lmb Mortgage Services, Inc. System and method of optimizing matching of leads
US8931058B2 (en) 2010-07-01 2015-01-06 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8744956B1 (en) 2010-07-01 2014-06-03 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8489071B2 (en) * 2010-10-27 2013-07-16 Mobilesphere Holdings LLC System and method for assuring identity on a mobile device
US8782217B1 (en) 2010-11-10 2014-07-15 Safetyweb, Inc. Online identity management
US8484186B1 (en) 2010-11-12 2013-07-09 Consumerinfo.Com, Inc. Personalized people finder
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US9235728B2 (en) 2011-02-18 2016-01-12 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US8838988B2 (en) 2011-04-12 2014-09-16 International Business Machines Corporation Verification of transactional integrity
US8538845B2 (en) 2011-06-03 2013-09-17 Mozido, Llc Monetary transaction system
US9665854B1 (en) 2011-06-16 2017-05-30 Consumerinfo.Com, Inc. Authentication alerts
CN102857653A (en) * 2011-06-30 2013-01-02 富泰华工业(深圳)有限公司 Recharge system with SIM (subscriber identity module) card recharging function and mobile phone
US9483606B1 (en) 2011-07-08 2016-11-01 Consumerinfo.Com, Inc. Lifescore
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
US8738516B1 (en) 2011-10-13 2014-05-27 Consumerinfo.Com, Inc. Debt services candidate locator
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US10438196B2 (en) 2011-11-21 2019-10-08 Mozido, Inc. Using a mobile wallet infrastructure to support multiple mobile wallet providers
US9208488B2 (en) 2011-11-21 2015-12-08 Mozido, Inc. Using a mobile wallet infrastructure to support multiple mobile wallet providers
US9853959B1 (en) 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
US9838493B2 (en) * 2012-08-21 2017-12-05 Extreme Networks, Inc. Dynamic routing of authentication requests
SG2012082863A (en) 2012-11-08 2014-06-27 Voxp Pte Ltd System and method of associating and transferring financially valuable information recorded against an unregistered mobile phone number to a new mobile phone number
US9654541B1 (en) 2012-11-12 2017-05-16 Consumerinfo.Com, Inc. Aggregating user web browsing data
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
US9916621B1 (en) 2012-11-30 2018-03-13 Consumerinfo.Com, Inc. Presentation of credit score factors
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US8972400B1 (en) 2013-03-11 2015-03-03 Consumerinfo.Com, Inc. Profile data management
US10102570B1 (en) 2013-03-14 2018-10-16 Consumerinfo.Com, Inc. Account vulnerability alerts
US9870589B1 (en) 2013-03-14 2018-01-16 Consumerinfo.Com, Inc. Credit utilization tracking and reporting
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9406085B1 (en) 2013-03-14 2016-08-02 Consumerinfo.Com, Inc. System and methods for credit dispute processing, resolution, and reporting
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US20140297435A1 (en) * 2013-03-28 2014-10-02 Hoiling Angel WONG Bank card secured payment system and method using real-time communication technology
US10685398B1 (en) 2013-04-23 2020-06-16 Consumerinfo.Com, Inc. Presenting credit score information
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US9443268B1 (en) 2013-08-16 2016-09-13 Consumerinfo.Com, Inc. Bill payment and reporting
US10325314B1 (en) 2013-11-15 2019-06-18 Consumerinfo.Com, Inc. Payment reporting systems
US9477737B1 (en) 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10176542B2 (en) * 2014-03-24 2019-01-08 Mastercard International Incorporated Systems and methods for identity validation and verification
USD760256S1 (en) 2014-03-25 2016-06-28 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
USD759689S1 (en) 2014-03-25 2016-06-21 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
USD759690S1 (en) 2014-03-25 2016-06-21 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
US9892457B1 (en) 2014-04-16 2018-02-13 Consumerinfo.Com, Inc. Providing credit data in search results
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US9430630B2 (en) * 2014-07-31 2016-08-30 Textpower, Inc. Credential-free identification and authentication
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10242019B1 (en) 2014-12-19 2019-03-26 Experian Information Solutions, Inc. User behavior segmentation using latent topic detection
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
EP3139329A1 (en) * 2015-09-03 2017-03-08 Mobile Elements Corp Contactless mobile payment system
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US20200074541A1 (en) 2018-09-05 2020-03-05 Consumerinfo.Com, Inc. Generation of data structures based on categories of matched data items
US11315179B1 (en) 2018-11-16 2022-04-26 Consumerinfo.Com, Inc. Methods and apparatuses for customized card recommendations
US11238656B1 (en) 2019-02-22 2022-02-01 Consumerinfo.Com, Inc. System and method for an augmented reality experience via an artificial intelligence bot
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001045562A (en) * 1999-07-30 2001-02-16 Komu Square:Kk User authentication method, user authentication system and recording medium
JP2001184310A (en) * 1999-12-27 2001-07-06 Landscape:Kk User identifying facility
AU2002100106A4 (en) * 2000-11-22 2002-05-02 Simta System Pty Ltd Secure internet monetary transaction authorisation method
WO2003024061A2 (en) 2001-09-08 2003-03-20 Abulgassim Abdelkader A method and system of crediting a pre-paid amount
US20030159068A1 (en) * 2002-02-20 2003-08-21 Halpin Eamus James Personal identification system and method for carrying it out
EP1359736A1 (en) 2002-05-01 2003-11-05 Markport Limited Protection for pre-paid mobile terminals

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1320236A1 (en) * 2001-12-12 2003-06-18 Markport Limited Access control for network services for authenticating a user via separate link
DE10310527B4 (en) * 2003-03-11 2008-11-20 Christian Hogl A method for initiating and / or performing a payment transaction
US20050199709A1 (en) * 2003-10-10 2005-09-15 James Linlor Secure money transfer between hand-held devices
US7257388B2 (en) * 2003-11-10 2007-08-14 Bayne Anthony J Pre-paid mobile phone with temporary voice mail

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001045562A (en) * 1999-07-30 2001-02-16 Komu Square:Kk User authentication method, user authentication system and recording medium
JP2001184310A (en) * 1999-12-27 2001-07-06 Landscape:Kk User identifying facility
AU2002100106A4 (en) * 2000-11-22 2002-05-02 Simta System Pty Ltd Secure internet monetary transaction authorisation method
WO2003024061A2 (en) 2001-09-08 2003-03-20 Abulgassim Abdelkader A method and system of crediting a pre-paid amount
US20030159068A1 (en) * 2002-02-20 2003-08-21 Halpin Eamus James Personal identification system and method for carrying it out
EP1359736A1 (en) 2002-05-01 2003-11-05 Markport Limited Protection for pre-paid mobile terminals

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1714424A4

Also Published As

Publication number Publication date
EP1714424A1 (en) 2006-10-25
TW200530868A (en) 2005-09-16
US20080281737A1 (en) 2008-11-13
AR047593A1 (en) 2006-01-25
GB2426104A (en) 2006-11-15
EP1714424A4 (en) 2010-12-15
GB0615071D0 (en) 2006-09-06

Similar Documents

Publication Publication Date Title
US20080281737A1 (en) System and Method for Authenticating the Identity of a User
US8055558B2 (en) Method and system for authentication via communication terminal using short message
US9083680B2 (en) Systems, methods, and computer readable media for application-level authentication of messages in a telecommunications network
CN101582762B (en) Method and system for identity authentication based on dynamic password
EP1922681B1 (en) Mobile account management
US8352360B2 (en) Method and system for secured transactions over a wireless network
EP2248295B1 (en) System and method for wireless device based user authentication
CN101795454B (en) Method and system of double identity authentication based on mobile communication independent channel
CN1478260A (en) Method for securing transaction on computer network
US20100063935A1 (en) Multi-Factor Authorization System and Method
CN101512576A (en) Method and computer system for ensuring authenticity of an electronic transaction
KR20120068759A (en) Transaction system and method
CN103944737A (en) User identity authentication method, third-party authentication platform and operator authentication platform
WO2010082960A1 (en) Multi-factor authorization system and method
WO2010012362A1 (en) Method for authentication
CN102197407A (en) System and method of secure payment transactions
CN1418355A (en) Method of performing transaction
US20130046689A1 (en) System and Method for Facilitating Transactions
CN105246058A (en) Short message verification method and short message server
CN101071492A (en) Mobile phone fee payment method and system based on mobile phone bank
US20160026991A1 (en) Mobile account management
WO2004049621A1 (en) Authentication and identification system and transactions using such an authentication and identification system
US20030050898A1 (en) Method and arrangement for the transmission of an electronic sum of money from a credit reserve
US20080261558A1 (en) System and Method for Transferring Credit Between Mobile Phone Subscribers
WO2008015637A2 (en) Mobile payment method and system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 0615071.8

Country of ref document: GB

Ref document number: 0615071

Country of ref document: GB

WWE Wipo information: entry into national phase

Ref document number: 12006501474

Country of ref document: PH

WWE Wipo information: entry into national phase

Ref document number: 4447/DELNP/2006

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: PA/a/2006/008851

Country of ref document: MX

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 2005704846

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2005704846

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10597628

Country of ref document: US