WO2006018892A1 - Telephone authentication system preventing spoofing even when personal information is leaked - Google Patents

Telephone authentication system preventing spoofing even when personal information is leaked Download PDF

Info

Publication number
WO2006018892A1
WO2006018892A1 PCT/JP2004/011977 JP2004011977W WO2006018892A1 WO 2006018892 A1 WO2006018892 A1 WO 2006018892A1 JP 2004011977 W JP2004011977 W JP 2004011977W WO 2006018892 A1 WO2006018892 A1 WO 2006018892A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
user
telephone
input information
authentication
authentication system
Prior art date
Application number
PCT/JP2004/011977
Other languages
French (fr)
Japanese (ja)
Inventor
Yoshiaki Kosaka
Original Assignee
Yoshiaki Kosaka
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Interconnection arrangements between switching centres
    • H04M7/0024Services and arrangements where telephone services are combined with data services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Interconnection arrangements between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services, time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals

Abstract

It is possible to reduce personal information required for authentication, prevent spoofing even when personal information is leaked to a third person, and immediately find a user who has intended spoofing without requiring a special device to be attached to a user terminal. Thus, it is possible to provide a highly reliable authentication system by using a telephone device. A user terminal requests authentication to a WWW server via the Internet. According to the WWW server request, an interactive audio response device calls a user telephone. The user receives the telephone call and enters the number indicated by automatic audio through pushing buttons or dialing. The input information inputted from the user telephone is acquired and returned to the WWW server. The server correlates the returned input information with the value requested. When they are equivalent, the user is authenticated. Otherwise, there is a possibility that the user who has made the access is performing spoofing and an alarm is issued.

Description

Specification

Telephone authentication system that personal information can be prevented spoofing even if the leakage

Technical field

[0001] The present invention, through the network to means and system that authenticates a user has accessed by the user terminal.

BACKGROUND

[0002] The power theft and theft 聴又 was considered a variety of means in the authentication method on a conventional network after the personal information has been leaked by an internal crime, and measures taken to pretending it was difficult

[0003] First, as a typical authentication method in the first, there are authentication method using a user ID and a password, flame theft user ID and a password to a third party directly from the user in this way, eavesdropping If, easily disguise allows, it can occur a situation that can be viewed easily the user registration information, and the like. In addition, the user ID of the user who is using the Internet banking, etc., the password is that can be easily moved in the account balance state if it is stolen. In addition, if you use the Internet auction site and Internet shopping malls, etc. have registered a credit card of the user, also if the user ID and password is stolen, the purchase of goods in the easy credit card you have registered it becomes possible. Ru services mower that the prevention means by issuing a password two or more, but does not make sense after being still stolen.

[0004] in the second, as an authentication means to be used in carrying out the settlement by using a credit card on the Internet, credit card number and the user in addition to Sekiru information to the credit card expiration date, such as address and phone number, the only such individual 2 contacts to input a large number of information without obtaining the component force is a method of preventing spoofing by Rukoto. Certainly physically credit force over de large amount of Moe physician personal information data is because of the internal crime, such as from a database of such force Internet service providers as possible to prevent the spoofing of the case that itself has been stolen if that means If you have, it would allow a large amount of spoofing. Also, it is thought to be higher in proportion to the risk information amount in the personal information leaks for personal information amount managed by the Internet service provider increases for inputting a lot of information in the authentication unit. In addition, if a third party makes a spoofing exploit others credit card, because it takes the date and time of a few weeks force several months until the cardholder is aware, early detection is difficult. For this reason, the user of the fugitive exploiting be to have tracked have to leave the log, such as the user terminal access destination IP address for example is easy. Because you can not particularly recover the product as a service provider to perform the digital content delivery, ease will be subject to spoofing Les,. It is difficult to sagging JIT card payment only to determine the Shi sorry become the same forces that also exist service providers to perform specialized.

[0005] As a third means, there is an authentication method according to a fingerprint or voiceprint. Certainly personal information is also impersonation is difficult as was leaked to a third party force S, the information necessary to verify your identity on the means, that is necessary to pre-register on the server to authenticate a fingerprint or voiceprint is there. When this hand stage and service providers to target hundreds of thousands scale of an unspecified number user on the Internet is used, fingerprint, when data of the voiceprint information was good Moe in large quantities because of the internal and the like, Internet service provider that operates a service is likely to bear a great responsibility. That fingerprint of all users, considered risk at information leakage is large to save a voice print.

[0006] Other, set up a special unit to each user terminal, but there is an authentication method using the same, want Les made it is assumed that this time the are installed special equipment to all of the user terminal ,, a service on the Internet to target unspecified number would summer that would limit the Interview monodentate terminal apparatus are installed.

[0007] In addition, security measures such as SSL and cryptographic key system to prevent eavesdropping on the network, but there Ru, is independent of the measures after the personal information has been leaked.

[0008] The above-mentioned personal information, refer to individual's name, phone number, address, credit card information, gender, age, user ID, password, fingerprint, the information about the voice print, etc. individual.

Patent Document 1: JP 2002 - 258974 discloses

Patent Document 1: JP 2004 - 13274 JP

Disclosure of the Invention

INVENTION Problems [0009] which is going cane resolved as described above, at present, poor means that can resolve the impersonation after personal information leaks without using special equipment. Also, if the personal information leakage occurs can be input to the user more than the necessary personal information to prevent impersonation, the risk of the Internet service provider large les. In order to suppress the risks as much as possible, the Internet service provider requires the utmost reduction personal information amount held.

[0010] An object of the present invention, that the Internet service provider to reduce the personal information required for authentication, to prevent spoofing even if personal information to third parties even have leaked, was spoofing user to immediately discover is that Nag that the user who has accessed via the network requires a special apparatus to each user terminal using the telephone to provide a highly reliable authentication system.

Means for Solving the Problems

[0011] To achieve the above object, in the first aspect of the present invention, in the authentication system when receiving service from various servers via a network by the user terminal, to authenticate the user through the network , call the addressed user telephone number to a user of the telephone, it comprises the interactive voice response unit that acquires input information from the user's phone, authentication means for authenticating the user from the input information, and a method and equipment It is referred to as Features.

[0012] the user telephone number, the or telephone number input from the user terminal, or telephone number acquired data storage device force, based on a telephone number received from the server via the network. Further the interactive voice response unit, said can can be obtained by the telephone number from the server, public telephone line, a cellular phone line, function to make a call to the user of the phone without depending on the communication line via the Internet telephone line and , a function of reproducing an automatic voice, or push button phone, characterized by comprising a function of acquiring the input information inputted from the dial and a function of transmitting the acquired input information to the server.

[0013] Interactive voice response system by a server request for making a call to the user. The user receives a phone call that has One written, the indicated number automated voice push button or input from Daiyanore. It obtains the input information input by a user of the phone returns to the server. The returned input information server collates equal to or the requested value. If equal to authenticate the user. If equal access to allow users have doing impersonation be permanently because, tracking and network path of the user terminal accessing, corresponding to such an alarm on the spot.

Effect of the invention

[0014] As above described, in the present invention, based on the user telephone number input from said user terminal, a call, since so as to verify the user identity by an input from a push button or dial , credit card information and user ID for example, you get leakage personal information such as a password, and then the phone push button of even went impersonation or, such can impersonation for input from the dial is required Les,. In addition, it is effective personal information that has been extra to input in order to prevent the impersonation at the time of credit card settlement until now because also become unnecessary, to reduce risk of personal information leakage. Phone advantage that most users already it is considered to have coercive can you to easily authenticate users Nag that requires a special apparatus is obtained.

BEST MODE FOR CARRYING OUT THE INVENTION

[0015] The configuration of the authentication method and system using a telephone set of the present invention will be described in detail using the drawings.

Example 1

[0016] The present invention using the drawings as an example of the authentication means of the Internet banking will be described in detail. Figure 1 is a block diagram showing the applied communication system constituting the authentication means of the present invention to login to the Internet banking.

[0017] In FIG. 1, the user terminal 10 may be a personal computer, a PDA, or etc. cellular phone terminal is connected to the Internet 20 consists connectable information processing devices to the Internet. WWW server 31 Internet banking 30, the data storage device 32, consisting of an interactive voice response unit 50. WWW server 31, the data storage device 32, interactive voice device 50 may be composed of a plurality of server devices in a single server device. The user terminal 10 has a browser function for browsing Web pages provided from the WWW server 31 on the Internet. Further, the telephone 80 is made fixed telephone or mobile telephone for use in a user, is connected to the telephone line 70 by wired or wireless. Here, the user terminal 10 and the telephone 80 may be the same. In addition, phone lines are generally telephone line, a cellular phone line, I even Re Baise if the line that lets you apply an Internet telephone line or the like phone records,. Is that is stored in advance information about the user is correct in the data storage device 32.

[0018] Interactive voice device 50 has a phone or kick function to the specified telephone number by requesting the WWW server, it is possible to flow the automatic speech after the user has answered the phone, pushbutton users phone or, a function and a device returns the input information to the WWW server acquires the input information inputted from the dial-les, Ru.

[0019] Next, detailed description will be made of operation of the present embodiment. Here, FIG. 2 is a sequence diagram illustrating the operation of the present embodiment.

[0020] First, in the user terminal 10 accesses the WWW server 31 via the Internet 20 by the browser (Sl). WWW server 31 presents the user ID as user identification information Web pages determined Mel form to the user terminal 10 (S2). In the user terminal 10, the user ID is entered in the form by the user, it is sent into the stomach W server 31 (S3). In here, even good record as the telephone number of the user directly without using the user ID as user identification information,.

[0021] WWW server 31 requests the telephone number of the user from the user ID from the user information stored in the data storage device 32 (S4), and acquires the telephone number (S5). In this case, if the user information of the corresponding user ID does not exist, it displays a message, prompting the user again ID. (Back to S2)

[0022] Next, WWW server 31, the interactive voice response unit 50 transmits the telephone number of the requests to make a call to the user (S6). It requests an interactive voice response unit 50 which has received make a call to the telephone number addressed received (S7). Meanwhile interactive voice response unit 50 waits for the response of Interview troupe. (S8)

[0023] The user receives a phone call from a user telephone 80 (S9), it waits for the automatic speech from interactive voice response equipment 50.

[0024] flows automatic speech as follows from an interactive voice response unit 50 (S10). "Thank you for using this Internet theft banking. 1 if you want to allow the login, the 2 case is to cancel, please enter from the push button of 3 those who do not clue to access." In this case, as input information to allow login, number of user ID, password, it is possible to further enhance security by the date of birth and the like. Here, it is assumed 1.

[0025] The user presses a dial instructed by the user telephone 80 (Sl l). Dial number pressed is received by the interactive voice response unit 50. Interactive voice response unit 50 at the time the dial is pressed to end a phone call flow automatic speech such as "Thank you Gozare, beneath".

[0026] Interactive voice response unit 50 transmits the received input information to the WWW server 31 (S12)

[0027] WWW server 31 receives the input information transmitted, it confirms the number (S13). In the case of number force ^ access is allowed, and redirected to a page that notifies the login is complete, the authentication is completed. (S14)

[0028] number in the case of 2 to redirect to a page that indicates that a login has been denied access to the user terminal 10 is canceled, terminated.

[0029] Here, if the number is 3, for the accessing user is that could have done a third party impersonating, and redirected to a page showing the warning by the user terminal 10, the § click Sesurogu save. (S15) IP address or network route discovery of criminal accessed by tracking the user terminal 10, deny access can be performed immediately. In addition, it is possible to know immediately that his user ID is used by a third party is also genuine Interview troupe itself.

[0030] The user ID and password even if According to this authentication means, a large amount leaked by reason of personal information is any force such as a telephone number, also need to be sure to input information of the user telephone 80 as passed to a third party to become, unable to disguise. Furthermore, holding information such as fingerprint or voiceprint Shinare, for data leakage Jer, also extra personal information upon the leakage Jer, worry away. Example 2

[0031] Hereinafter, the configuration of the authentication method and system using a telephone set of the present invention, described in detail credit card payment service provider on inter one net using drawings real 施例 in the case of utilizing the present invention to.

[0032] Figure 3, the digital content sales service provider 60, a credit card payment service provider 90, and block showing a configuration of a configured digital content sales system the telephone authentication service provider 100 according to the authentication means of the present invention it is a diagram.

[0033] digital content sales service provider 60 is sells software and music, the digital content, such as video as a commodity on the Internet. Digital Conte N'-sales service provider 60 is entrusted to the sauce JIT card payment service provider 90 to carry out the settlement process credit card payments to expert. Telephone authentication service provider 100 implements the present invention, over the request by telephone to the user via the telephone line 70 from the credit card payment service provider 90, an input that is input from the push button or dial user telephone 80 perform a service that returns the information to the credit card payment service provider 9 0.

[0034] Next, detailed description will be given of the operation of this embodiment. Here, FIG. 4 is a sequence diagram illustrating the operation of the present embodiment.

[0035] First, in the user terminal 10, to § access for requesting product information through the Internet 20 by the browser to the WWW server 61 of the digital co Nten' sales service provider 60 (S21). Stomach W server 61, presents a Web page that product information is displayed in the Interview troupe terminal 10 (S22). In the user terminal 10, to select the item you want to buy to send to the WWW server 61 (S23).

[0036] The WWW server 61 redirects the user terminal 10 from the WWW server 91 of a credit card payment service provider 90 to the settlement page displayed for performing settlement (S2 4).

[0037] Next, WWW server 91, the credit card information and phone number to present the Web page of the required Mel form to the user terminal 10 as financial information (S25). In the user terminal 10, credit card information and telephone number on the form by the user is inputted, it is sent to the WWW server 9 1 (S26). WWW server 91 collates the credit card information and telephone number of the Interview monodentate stored in the data storage device 92, interactive voice response via the WWW server 101 of telephone authentication mono- bis provider 100 if the information is correct to apparatus 50 transmits the telephone number of the requests to make a call to the user (S27).

[0038] Hereinafter, multiplying the aforementioned interactive voice response unit 50 which has received the request in the same manner as in Example 1 for implementing a telephone authentication means of the present invention is a telephone to the telephone number addressed received (S28). Meanwhile interactive voice response unit 50 waits for the response of the user. (S29) The user telephones 80 receives a telephone call from the interactive voice response unit 50 (S9). The user receives a call to the phone, wait for the automatic voice from the interactive voice response unit 50. Interactive voice response unit 50 or colleagues flows automatic speech as follows (S31). "There There you will find using this credit card is shaken. 1 if you want to allow the credit card settlement, should the case to cancel 2, those who do not clue to access and input from the push button of 3 Les, . "in this case, as the input information to allow credit card payment, it is possible to further enhance security by the credit card number and date of birth and the like. Here, it is assumed 1.

[0039] The user presses a dial instructed by the user telephone 80 (S32). Dial number pressed is received by the interactive voice response unit 50. Interactive voice response unit 50 at the time the dial is pressed to end a phone call flow automatic speech such as "Thank you Gozare, beneath".

[0040] then sends to the WWW server 91 of a credit card payment service provider 90 via an interactive voice response unit 50WWW server 101 inputs information from the user (S33).

[0041] WWW server 91 receives the input information, to confirm the number (S34). Number is a credit card payment is established in the case of 1, and sends the settlement result to the WWW server 61 of the digital content sales service provider 60 (S35). WWW server 61, which has received the settlement results to save the purchase information to the data storage medium 62, a user to the user terminal 10 to allow the start of the download of digital content is a trade you select (S37).

[0042] number in the case of 2 to redirect to a page that indicates that the user terminal 10 login is canceled credit card payment has been rejected, to the end.

[0043] Here, in the case number is 3, the user who requested the credit card settlement is likely to have done the Shi sorry become the third person. Therefore, it is possible to discover the impersonation before downloading the digital content. In addition, it is possible to know immediately that their credit card has been used by a third party is also a real credit card held by the user himself.

[0044] In this way, it specialized equipment such as a card reader can such ku authentication facility to the user terminal. Credit card information for example according to the authentication means, even One passed to a third party can not disguise. In addition, spoofing can be early detection of the user who attempts to, it is possible to notify the user that has been illegally using a credit card at the same time. As a result it can be expected that the unauthorized use of credit card is reduced. In addition, it 卬帘 I "that hold the extra personal information because there is no need to enter a user's address, such as for credit card settlement.

[0045] or more, without requiring a special apparatus by the above-mentioned authentication means as described, spoofing can be prevented, it is possible to further impersonation third party early detection of an attempt to. While embodiments of the invention have been described in detail with reference to the drawings, the specific configuration is limited to the above-described type condition are also included design within a scope Nag without departing from the spirit of the invention. For example, it can always be used as a means of authentication in do not need to hear the personal information system, such as a restaurant or facility reservation is not limited to the above example. In addition, as possible out to be an authentication means at the time of confirmation by to enter the address and phone number in the home delivery orders system of pizza home delivery and the like.

Industrial Applicability

[0046] authentication means at the time of login on the Internet, authentication means at the time of the settlement using a credit card, and restaurants and facilities of the reservation system of personal information necessary and Shinare, if the authentication means, home delivery order also be used as an authentication device in the system are possible.

BRIEF DESCRIPTION OF THE DRAWINGS

[0047] is an explanatory view showing a practice of [1] telephone authentication system. (Example 1)

FIG. 2 is an explanatory diagram showing the implementation of the telephone authentication system. (Example 1)

FIG. 3 is an explanatory diagram showing the implementation of the telephone authentication system. (Example 2)

FIG. 4 is an explanatory diagram showing the implementation of the telephone authentication system. (Example 2)

DESCRIPTION OF SYMBOLS

[0048] 10 user terminal

20 Internet

30 Internet banking

50 interactive voice response unit

70 telephone line

80 user phone

Claims

The scope of the claims
[1] Slight authentication system when over the network by the user terminal receives service from various servers Te, and order to authenticate the user and the user input information via the network, addressed to the user telephone number to the user's telephone telephone authentication system to make a call, the interactive voice response unit that acquires input information from the user's phone, authentication means for authenticating the user from the input information, characterized by comprising a method and equipment.
[2] the user telephone number, claims, characterized in that based on said or a telephone number input from the user terminal, the telephone number or obtained from the data storage device, a telephone number or the like received from the server over the network 1 telephone authentication system described.
[3] The interactive voice response unit, said can obtain the telephone number from the server, public telephone line, a cellular phone line, a call to the telephone of the dependent Sezuyu monodentate the communication line via the Internet telephone line a function of applying, according to the function of reproducing the automated voice, telephone push buttons or characterized by comprising a function of acquiring the input information inputted from the dial and a function of transmitting the acquired input information to the server telephone authentication system of claim 2, wherein the.
[4] The authentication unit, telephone authentication system of claim 3, wherein authenticating the user and the user input information based on the input information.
[5] The authentication unit, telephone authentication system according to claim 4, wherein the discovering spoofing based on the input information.
PCT/JP2004/011977 2004-08-20 2004-08-20 Telephone authentication system preventing spoofing even when personal information is leaked WO2006018892A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/011977 WO2006018892A1 (en) 2004-08-20 2004-08-20 Telephone authentication system preventing spoofing even when personal information is leaked

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006531138A JPWO2006018892A1 (en) 2004-08-20 2004-08-20 Telephone authentication system that personal information can be prevented spoofing even if the leakage
PCT/JP2004/011977 WO2006018892A1 (en) 2004-08-20 2004-08-20 Telephone authentication system preventing spoofing even when personal information is leaked

Publications (1)

Publication Number Publication Date
WO2006018892A1 true true WO2006018892A1 (en) 2006-02-23

Family

ID=35907289

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/011977 WO2006018892A1 (en) 2004-08-20 2004-08-20 Telephone authentication system preventing spoofing even when personal information is leaked

Country Status (2)

Country Link
JP (1) JPWO2006018892A1 (en)
WO (1) WO2006018892A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5655246B2 (en) * 2009-12-15 2015-01-21 BizMobile株式会社 Mobile authentication agency system and mobile authentication proxy method
US8953480B2 (en) 2010-02-05 2015-02-10 Telefonaktiebolgaet L M Ericsson (Publ) Method and arrangement in a wireless communication system
JP2018026090A (en) * 2016-08-08 2018-02-15 株式会社Isao System, method, and program for authentication and recording medium with program recorded
WO2018030421A1 (en) * 2016-08-08 2018-02-15 株式会社Isao System for authentication, method, program, and recording medium whereupon program is recorded

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002261940A (en) * 2001-02-28 2002-09-13 Daiwa Securities Group Inc Voice response device, voice response system, voice response method and its program, and recording medium with its program recorded
JP2004013273A (en) * 2002-06-04 2004-01-15 Ntt Comware Corp System, method and program for user authentication, and recording medium
JP2004038912A (en) * 2002-07-04 2004-02-05 Masao Asada User authentication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002261940A (en) * 2001-02-28 2002-09-13 Daiwa Securities Group Inc Voice response device, voice response system, voice response method and its program, and recording medium with its program recorded
JP2004013273A (en) * 2002-06-04 2004-01-15 Ntt Comware Corp System, method and program for user authentication, and recording medium
JP2004038912A (en) * 2002-07-04 2004-02-05 Masao Asada User authentication system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5655246B2 (en) * 2009-12-15 2015-01-21 BizMobile株式会社 Mobile authentication agency system and mobile authentication proxy method
US8953480B2 (en) 2010-02-05 2015-02-10 Telefonaktiebolgaet L M Ericsson (Publ) Method and arrangement in a wireless communication system
US9871619B2 (en) 2010-02-05 2018-01-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement in a wireless communication system
JP2018026090A (en) * 2016-08-08 2018-02-15 株式会社Isao System, method, and program for authentication and recording medium with program recorded
WO2018030421A1 (en) * 2016-08-08 2018-02-15 株式会社Isao System for authentication, method, program, and recording medium whereupon program is recorded

Also Published As

Publication number Publication date Type
JPWO2006018892A1 (en) 2008-05-01 application

Similar Documents

Publication Publication Date Title
US8332323B2 (en) Server device for controlling a transaction, first entity and second entity
US7574733B2 (en) System and method of using the public switched telephone network in providing authentication or authorization for online transaction
US6782080B2 (en) Arrangement for authenticating user and authorizing use of secured system
US6327348B1 (en) Method and system for controlling authorization of credit card transactions
US7188110B1 (en) Secure and convenient method and apparatus for storing and transmitting telephony-based data
Clarke et al. Authentication of users on mobile telephones–A survey of attitudes and practices
US7104444B2 (en) Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US20080010687A1 (en) Registration, verification and notification system
US6671358B1 (en) Method and system for rewarding use of a universal identifier, and/or conducting a financial transaction
US7708194B2 (en) Virtual wallet
US20020026419A1 (en) Apparatus and method for populating a portable smart device
US20020194128A1 (en) System and method for secure reverse payment
US20100049654A1 (en) System and methods for a multi-channel payment platform
US20110231911A1 (en) Methods and systems for authenticating users
US20080046988A1 (en) Authentication Method
US20010016835A1 (en) Method of payment by means of an electronic communication device
US20040250085A1 (en) Distributed network system using biometric authentication access
US8751801B2 (en) System and method for authenticating users using two or more factors
US20120089514A1 (en) Method of authentication
US20020107007A1 (en) Method for wireless telephony payment and an apparatus therefor
US20020143634A1 (en) Wireless payment system
US20130085941A1 (en) Systems and methods for secure wireless financial transactions
US20040088551A1 (en) Identifying persons seeking access to computers and networks
US20030204725A1 (en) Method and system for verifying identity
US20110047605A1 (en) System And Method For Authenticating A User To A Computer System

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2006531138

Country of ref document: JP

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase