WO1999022362A1 - Non-transferable bio-metric token-based identification methods and devices - Google Patents
Non-transferable bio-metric token-based identification methods and devices Download PDFInfo
- Publication number
- WO1999022362A1 WO1999022362A1 PCT/IB1998/001835 IB9801835W WO9922362A1 WO 1999022362 A1 WO1999022362 A1 WO 1999022362A1 IB 9801835 W IB9801835 W IB 9801835W WO 9922362 A1 WO9922362 A1 WO 9922362A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bio
- token
- voice
- identification
- owner
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 73
- 238000004458 analytical method Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 31
- 239000000523 sample Substances 0.000 description 22
- 230000003068 static effect Effects 0.000 description 18
- 230000005540 biological transmission Effects 0.000 description 11
- 230000001413 cellular effect Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000004044 response Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000012512 characterization method Methods 0.000 description 2
- 238000010367 cloning Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
Definitions
- the present invention relates, generally, to systems, methods and apparatus for personal identification.
- Voice analysis, characterization and recognition technology is a mature field and is referred to herein as Speaker (identity) Verification Software (SVS) and the Speaker Verification Application Programming Interface (SVAPI) projected standard.
- SVS Speaker
- SVAPI Speaker Verification Application Programming Interface
- Use of these current voice characterization and recognition technologies for personal identification purposes has several problems.
- Second, current identification devices require the use of a database wherein each person's voice characteristic (referred to hereinafter as a Voice Print) is stored for comparison purposes. The need to store such information at the identification device necessarily limits the use of current technology for some applications. Accordingly, there is a need for new systems, methods and apparatus which will improve substantially the reliability of personal identification using voice recognition technology, and further will alleviate the need to store voice characteristic data at the decryption or identification device.
- the present invention comprises devices including, but not limited to, a Personalization Machine; a Bio-Token (non-transferable electronic portable device) carried by a person (carrier) to be identified either as the owner/rightful possessor of the Bio-Token or not, which stores the owner's Voice Print or, alternatively, a chip
- an Identification Device e.g., an ID server
- the invention also may comprise any of several device variations described below.
- the invention further comprises a number of methods designed to provide for the identification of a person holding a portable device referred to as a Bio-Token, as being either the owner/rightful possessor or not, as well as methods for certification of voice documents.
- One method encompassed by the present invention preferably comprises the use of Speaker Verification Software, which is commercially available, to obtain the Voice Print of the rightful owner of the portable device (Bio-Token).
- the method further preferably comprises a step of providing the owner's identification data to the Bio-Token device (see FIG.
- the method also may comprise an optional step of encrypting the Voice Print and the owner's identification data, such encryption step referred to hereinafter as Static Encryption.
- the method further may comprise a step of storing into the Bio-Token device carried by the person to be identified (carrier/holder), the carrier's Voice Print, Identification Data and/or Static Encryption results.
- the above steps may be referred to in part or as a whole as a Personalization Procedure.
- the methods of the invention further may comprise a step of distributing Identification Devices and/or Identification Software.
- the same Speaker Verification Software previously used to create the Voice Print during the Personalization Procedure may be installed in such Identification Devices, each Identification Device thereby having the operational capability to decrypt Voice Prints and/or Identification Data.
- Identification Devices alternatively may use any other suitable software or hardware to decrypt Voice Prints and/or identification data.
- the present invention further encompasses methods for identification. Each time that a carrier of a portable device (Bio-Token) needs to be identified, the carrier may activate the Bio-Token device. Activation may require that the carrier first enter a PIN into the Bio-Token device.
- the Bio-Token device then may read from its electronic memory the Voice Print of the rightful owner, previously entered, and then may merge or concatenate such digits with a time stamp or use any other method in order to create a dynamic message (such as a sequential method), wherein the dynamic message is encrypted (referred to hereinafter as Dynamic Encryption) by the Bio-Token, the result of such Dynamic Encryption referred to hereinafter as a Cipher.
- the method also may include an optional step of encoding the Cipher into sound, in which case an Acoustic Message produced by the Bio-Token may be referred to as an Acoustic Cipher.
- Both the audio signals of the Acoustic Cipher (Acoustic Message) and the actual voice (utterance) of the carrier (referred to hereinafter as the Voice String) then may be transmitted to the Identification Device.
- the transmission may be made directly or indirectly, e.g., transmitted by any media of communication such as phone,
- the Cipher encoded or not, should reach an Identification Device, on-line or off-line, together with the actual voice utterance (Voice String) of the Bio-Token's carrier.
- the Voice String may be transmitted in the form of an answer to a variable question or request, e.g., "Please repeat the words: Bill Clinton," or " Say the date and time in minutes, hours, days and years, " or "Please say the transaction data, if any, to be certified by this identification.
- the methods of the present invention also may comprise a step of decrypting the cipher received by the Identification Device.
- the Identification Device decrypts the cipher (Dynamic Decryption), thereby obtaining the Statically Encrypted Voice Print and, then, Statically Decrypts the Statically Encrypted Voice Print to recuperate the Voice Print (referred to herein as the "Computed Result").
- the methods of this invention also may include the step of analyzing the Voice
- the Identification Device then may conclude that the rightful Owner of the portable device
- Bio-Token is the present Carrier of the Bio-Token, whose voice response has been analyzed. Due to the fact that the Cipher also includes the authorized owner's ID Data and/or the transaction data, such as his name, and/or address, and/or driver license and/or passport number, etc., the Identification Device will have the ID Data certified with some certainty that the data corresponds to the present Carrier of the
- an alternative method for remote identification is provided wherein the Bio-Token generates a scrambled sample of the Owner's voice. More precisely, the Bio-Token may reproduce a sample of the Owner's voice which was pre-recorded by the
- This sample may be scrambled, before being converted into sound, by mixing it with an encoded number.
- the encoded number preferably is a variable number, with a very large cycle for repetitions, referred to hereinafter as a pseudo- random number.
- the Owner's voice sample mixed with the pseudo-random number is referred to hereinafter as a Scrambled Owner Voice Sample.
- the Bio-Token may compute a new dynamic password or digital signature.
- the dynamic password/digital signature then preferably is embedded with the Owner's ID Data and the data preferably is used as a "seed" to compute the pseudo random number for scrambling purposes.
- the Bio-Token may then encode the dynamic password/digital signature and scrambled Owner's Voice Sample into sound, referred to hereinafter as a Scrambled Acoustic Message.
- This Scrambled Acoustic Message may then be transmitted, directly or indirectly, to the Identification Device together with the Carrier's voice
- the Voice String comprises the same words or phrase as the Owner's Voice Sample.
- the Identification Device may then decode the dynamic password/digital signature and decrypt it, recuperating the Owner's ID Data and the Seed.
- the Seed then preferably is used by the Identification Device to compute the pseudo random number and, with such information, de- scramble the received scrambled Owner's Voice Sample thereby recuperating the Owner's voice sample.
- the Identification Device then may analyze the sample together with the carrier's Voice Sample, by means of Speaker Verification Software, and conclude whether they are similar or not. In a positive case, the Identification Device may display or transmit the owner's received ID Data.
- the present invention further may comprise a number of suitable devices such as Personalization Machines, a multitude of Bio-Token devices, and a multitude of Identification Devices (e.g., ID Servers).
- a Personalization Machine is a machine capable of reading from one or more media, for example, Hard Disks, floppy disks, RAM, ROM, Dangles, PCMCIA, Chip cards or others; recording and analyzing voice samples, e.g., running Speaker (identity) Verification Software; generating Voice Prints; elaborating Voice Prints; and writing into the electronic memory of a Bio- Token device.
- Bio-Token devices are portable electronic devices with memory, having the capability to read from the memory, to compute, to encrypt, and to encode results into sound.
- the Identification Devices preferably are devices capable of reading from one or several media, e.g., Hard Disks, floppy disks, RAM, ROM, Dangles, PCMCIA, Chip cards or others; recording, digitizing and analyzing voice samples, e.g., running Speaker (identity) Verification Software; generating Voice Prints; elaborating Voice Prints; and/or recording, digitizing and analyzing Acoustic Messages generated by the Bio-Token devices, including Acoustic Ciphers.
- media e.g., Hard Disks, floppy disks, RAM, ROM, Dangles, PCMCIA, Chip cards or others
- recording, digitizing and analyzing voice samples e.g., running Speaker (identity) Verification Software
- generating Voice Prints elaborating Voice Prints
- recording, digitizing and analyzing Acoustic Messages generated by the Bio-Token devices including Acoustic Ciphers.
- Fig. 1 is a block flow diagram representing the functionality of the Personalization Machine (PM) for one particular case referred in the following;
- PM Personalization Machine
- Fig . 2 is a block flow diagram representing the functionality of the Personalization Machine (PM) for another case referred in the following, which includes Static Encryption;
- PM Personalization Machine
- Fig. 3 is a block flow diagram representing the functionality of the Bio-Token device for another case referred in the following;
- Fig. 4 is a block flow diagram representing the functionality of the Bio-Token device for another case referred in the following which includes Static Encryption
- Fig. 5 is a block flow diagram representing the functionality of the Bio-Token device for another case referred in the following, which includes Static Encryption and further includes the generation of calibration signals to correct distortion effects;
- Fig. 6 is a block flow diagram representing the functionality if the Identification Device;
- Fig. 7 is a block flow diagram representing the functionality of the Identification
- Fig. 8 is a block flow diagram representing the functionality of the Identification Device with Static Encryption and further including the use of calibration signals to correct distortion effects;
- Fig. 9 is a block flow diagram representing the Identification Process, including
- Fig. 10 is a block flow diagram representing the Identification Process, including Bio-Token and Identification Device functionality, wherein the Identification Device reads secrets keys from a chip-card
- Fig. 1 1 is a block flow diagram representing the Identification Process, including Bio-Token and Identification Device functionality, wherein the Identification Device reads the secrets keys from a chip-card and performs Static decryption;
- Fig. 1 2 is a block flow diagram representing the functionality of the invention wherein the Bio-Token is implemented in a cellular phone to eliminate the cloning fraud;
- Fig. 1 3 is a block flow diagram of the functionality of the invention wherein the Bio-Token is implemented in a Debit-Card;
- Fig. 1 4 is a block diagram of the Bio-Token/ROV-Bio-Token components
- Fig. 1 5 is a block flow diagram representing the functionality of the invention wherein the Bio-Token is implemented in one type of Travelers Check application;
- Fig. 1 6 is a block flow diagram representing the functionality of the invention wherein the Bio-Token is implemented in one type of Debit-Card application;
- Fig. 1 7 is a block flow diagram representing the functionality of the invention wherein the Bio-Token is implemented in one type of Debit-Card application;
- Fig. 1 8 is a block flow diagram representing the functionality of a
- Fig. 1 9 is a block flow diagram representing the functionality of an ROV-Bio- Token, Static Encryption is not shown in order to simplify the diagram;
- Fig. 20 is a block flow diagram representing the steps for scrambling a Real
- ROV Owner's Voice
- Fig. 21 is a block flow diagram representing the functionality of an Identification Device for use with an ROV-Bio-Token, Static Encryption is not shown in order to simplify the diagram;
- ROV Real Owner's Voice
- the present invention more generally encompasses remote identification systems, methods and devices which allow the identity of a person (“Owner”) to be compared to that of a holder ("Holder” or “Carrier”) of a portable device ("Bio-Token”). Identification may be performed by a remote device ("Identification Device”) by comparing a voice sample characteristic stored in the Bio-
- the methods of the present invention may further allow for the certification of such Utterances.
- the methods associated with the present invention preferably comprise some or all of the following steps (see Fig. 1 ): personalizing the Bio-Token, comprising the following sub-steps:
- Step 1 connecting the Bio-Token to a specific machine referred to as a Personalization Machine (PM); Step 2: entering a set of the Owner's ID Data into the PM;
- PM Personalization Machine
- Step 3 capturing a sample of the Owner's voice and generating a
- Step 4 writing or registering into the Bio-Token's memory the Owner's Identification Data and Voice Print, or, optionally, registering such information on a chip-card which then can be inserted into the Token; and properly identifying whether the Holder of a Bio-Token is the owner, by an Identification Device (e.g., ID Server) (see Figs. 9 and 10), preferably comprising some or all of the following sub-steps: a) the Bio-Token's Holder actuates the Bio-Token; b) the Holder provides an Utterance to the Identification Device; c) the Identification Device receives an Acoustic Message generated by the Bio-Token, along with the Holder's voice (Utterance) (see Fig.
- an Identification Device e.g., ID Server
- the Identification Device compares the Voice Print in the Acoustic Message provided by the Bio-Token to a voice print of the Utterance.
- a Bio-Token When a Bio-Token is switched on, the Holder may be prompted to enter a Personal Identification Number (optional). Once the Bio-Token is on and operational, it may read the Owner's Voice Print and/or Identification Data from memory, or, alternatively, from a chip card where the Voice Print and/or the Owner's ID Data are stored. The Bio-Token then preferably encrypts the Voice Print, the Owner's
- Cipher Identification Data and the Generation Time (e.g., present GMT time and date) into a Cipher, in a manner such that each and any Cipher is distinct from the previous one, and the repetition cycle is very large (e.g., tens of years) .
- a preferred encryption scheme is described in U.S. Patent No. 5,524,072 (PCT/US92/1 0492), but any suitable encryption scheme may be utilized. This encryption step will be referred to herein as "Dynamic Encryption" (see Fig. 3, Step 4) .
- the Token can encode the Cipher into sound using MODEM techniques or any other method of encoding digits into sound (see Fig.
- an Identification Device e.g., ID Server
- an Identification Device preferably receives an Acoustic Message from the Bio-Token along with the Holder's voice ("Utterance"), and registers the time of arrival ("Capture Time") of such Acoustic Message.
- the Identification Device suitably decrypts the Dynamic Encryption thereby recapturing the Voice Print, the Identification Data and the Generation Time.
- the Identification Device may then analyze the Holder's utterance by means of any suitable software (such software is already commercially available).
- Step 4 the Identification Device may then compare the Voice Print, received within the Cipher, to the results of the analysis. If the Voice Print is similar to the results of the Utterance analysis, within pre-established tolerances, then, as shown in Step 5, the Identification Device preferably goes on to check the Capture Time against the recaptured Generation Time to avoid intercepted Acoustic Messages. If OK, the Identification Device has identified and authenticated the Holder and may then proceed with a particular transaction, e.g., with the display and/or transmission of the Owner's Identification Data.
- these methods comprise the step of personalizing the Bio-Token, which preferably comprises one or more of the following sub-steps (see Fig. 2):
- Step 1 loading the Personalization Machine with encryption keys; Step 2 entering the Bio-Token on the Personalization Machine, Step 3 entering the Owner's Identification Data, Step 4 capturing the Owner's voice, generating the Voice Print, and, optionally, compressing, and/or mathematically elaborating such Voice Print (e.g., averaging or/and hashing the Voice Print); and
- Step 5 Statically Encrypting the Voice Print and/or the Identification
- a system's private key may be used to encrypt the Voice Print.
- a private key (for example, a key referred to herein as SSPrK#l) may be used to encrypt the Owner's name and address; a private key (for example, a key referred to herein as SSPrK#2) may be used to encrypt the
- a private key for example, a key referred to herein as SSPrK#3 may be used to encrypt the Owner's passport data; a private key (for example, a key referred to herein as SSPrK#4) may be used to encrypt the Owner's Credit Card data; a private key (for example, referred to herein as SSPrK#5) may be used to encode the owner's Social Security number; and so on, any appropriate number of keys (e.g., SSPr#n) may be used to encrypt whatever data about the Owner that may be pertinent.
- Step 6 writing or registering into the Bio-Token memory the
- Step 5 Statically Encrypted Owner's Identification Data and Voice Print. Because the encryption described in Step 5 differs fundamentally from the above-described Dynamic Encryption (the encryption of Step 5 is fixed, with no time variable), this step is referred to herein as Static Encryption. Accordingly, any keys utilized by the Static Encryption are referred to herein as Static Encryption Keys.
- These methods further may comprise the step of properly identifying the Holder of the Bio-Token by the Identification Device, preferably comprising one or more of the following sub-steps (see Fig. 1 1 ) : a) the Token's Holder actuates the Bio-Token (see Fig. 4) and the Bio-Token transmits an Acoustic Cipher to the Identification Device; b) the Holder speaks (transmits an Utterance to the Identification Device); and c) the Identification Device receives the Acoustic Message generated by the Bio-Token and the Holder's voice (see Fig. 7).
- the Holder may be required to enter a Personal Identification Number (optional). Once the Bio-Token is on and functional, it may then read the Statically Encrypted Voice Print and/or
- the Bio-Token may then Dynamically encrypt the Voice Print, the Owner's Identification Data and the Generation Time, as discussed above, into a Cipher.
- the Token may then encode the Cipher into sound, in which case an Acoustic Message produced by the Bio-Token may be referred to as an Acoustic Cipher.
- Step 1 the Identification Device (e.g., ID Server) receives the Acoustic
- Step 2 the Identification Device decrypts the Dynamic Encryption, recuperating the Statically Encrypted Voice Print, Identification Data and Generation Time; Step 3: the Identification Device decrypts the Statically Encrypted Voice
- Print e.g., using the system's respective public key
- Step 4 the Identification Device analyzes the Holder's voice (Utterance);
- Step 5 the Identification Device compares the Voice Print with the results of the analysis of the Holder's voice (Utterance); Step 6: if the Voice Print is similar to the analysis of the Holder's voice, within pre-established tolerances, then the Identification Device preferably goes on to check the Capture Time against the recuperated Generation Time, to avoid intercepted Acoustic Messages; and
- Step 7 if OK, the Identification Device preferably proceeds with the transaction, e.g., to Statically Decrypt the Owner's Identification Data, as described below.
- a police Department's ID Servers may have all the public keys and, therefore, will be able to Statically decrypt any and all of the Owner's Identification Data.
- an Identification Device of lower accessability may hold only a limited number of public keys, for example, a system may only hold Public Keys #1 and 2 (referred to above SSPuK#l and SSPuK#2) . In that case, the Identification Device will only be able to decrypt two pieces of the
- the method also preferably includes the optional step of displaying or/and transmitting the Statically Decrypted portion of the Owner's ID Data.
- the Bio-Token can store and scramble a specific Owner's voice specimen.
- the Bio-Token is referred to as the Real Owner's Voice (ROV) Storing and Scrambling Token, or ROV-Bio-Token.
- the ROV-Bio-Token preferably is capable of reproducing a specimen of the Owner's voice, which was pre-recorded by the PM (Personalization Machine) and stored in the ROV-Bio-Token during the personalization procedure (see Fig. 1 8, the optional Static Encryption was not included in this diagram to simplify the explanation).
- the Real Owner's Voice specimen may be scrambled, resulting in a "Scrambled ROV Specimen," before being reproduced by the ROV-Bio-Token.
- the above-mentioned scrambling step preferably is a variable-result-scrambling- step, which helps to avoid misuse or fraud, e.g., the recording and subsequent usage of the Scrambled Real Owner's Voice specimen in order to impersonate the Owner.
- the Scrambled ROV Voice specimen becomes obsolete soon after being reproduced by the ROV-Bio-Token due to the fact that is scrambled using a different scrambling factor each time, each factor becoming obsolete soon after its use.
- the Real Owner's Voice specimen may be stored in the token's memory as digits (samples), these samples preferably being the result of the digitization made in the Personalization Machine. Then, a variable number (referred as the Scrambling Number or SN) may be computed by the token's CPU and converted into digits as a first step towards its encodification into sound, (referred to herein as "SN Samples").
- SN Samples a variable number
- the SN Samples After being converted, the SN Samples will become a large set of hex-digits which represents the analog wave sound samples, such as would be obtained if the SN were in DTMF tones and being digitized (a possible method for accomplishing such conversion in a chip is described in a 1 993 document of Microchip Technology Inc referred as AN543).
- SN 567fa34590b5278c7ff45639a567fa34590b5278c7ff45639a.
- SN Samples samples, referred to herein as SN Samples
- each digit represents the amplitude of the analog sound wave sample resulting from the conversion of the number into DTMF.
- the first digit of SN the number 5
- a scrambling procedure can be as simple as summing the corresponding samples of the specimen and SN samples:
- the scrambling procedure may be accomplished by the superposition of the specimen with an encoded number.
- the two sets of numbers may be summed, sample by sample, wherein one of the said sets represents a received and digitized Scrambled Real Owner's Voice specimen Samples and the other set represents the Scrambling Number samples, preferably, but not necessary, made with the same sampling rate (i.e.: 8000 samples/sec) (see Fig. 20).
- sampling rate i.e.: 8000 samples/sec
- the ROV-Bio-Token may compute the SN from a Seed number, creating a distinct number each time, and then embed and transmit the Seed number with the Acoustic Message in a manner which will allow the ROV-ldentification-Device (e.g., ROV-ID-Server) to recuperate the Seed and re-compute the SN.
- the data needed to compute the Scrambling Number is referred to herein as the "Scrambling Number's Seed, " or just "Seed. "
- the ROV-ldentification device may continue with the Identification procedure as described in the block flow diagram shown in Fig. 21 . All of the numbers and methods of scrambling described above are merely exemplary, and that any suitable scrambling methods will suffice.
- modem technology may be utilized to transmit the Acoustic Message, wherein the scrambling procedure may comprise the XORing of the ROV Specimen samples with the SN samples.
- the scrambling procedure may comprise the XORing of the ROV Specimen samples with the SN samples.
- an utterance reproduced by the Bio-Token may be transmitted to the Identification Device (e.g., ID server) where it may then be recorded and unscrambled. More precisely, and according to this aspect of the present invention, each time the ROV-Bio-Token Holder needs to identify himself to the ROV-ldentification Device, the
- ROV-Bio-Token may compute a new Dynamic Message, which carries embedded in it the Owner's ID Data, the Generation Time, and the Seed (see Fig. 1 9).
- the Bio-Token then may encode the Dynamic Message and the Scrambled
- Scrambled Acoustic Message may be transmitted to the ROV-ldentification-Device along with the Holder's voice (utterance), the words of the utterance preferably comprising the same words of the Owner's Voice Specimen.
- the ROV-ldentification- Device then may decode the Dynamic Message and decrypt it, recuperating the Owner's ID Data, the Generation Time and the Seed.
- the Identification Device may then use the Seed to compute the Scrambling Number and, with such information, unscramble the received Scrambled Owner's Voice Specimen thereby recuperating the Owner's voice specimen.
- the Identification Device then may analyze the specimen against the Holder's voice (Utterance), by means of Speaker Verification Software, and thereby conclude whether the Holder's voice (Utterance) and Owner's voice reproduction (emitted by the Bio-Token) are similar or not.
- the ID Server may display or transmit the owner's ID Data received.
- a method of overcoming drift problems is presented wherein two or more acoustic messages may be requested by an Identification Device during a particular transaction, such that the time elapsed between the two acoustic messages will be set by the Identification Device, thereby preventing the possibility of using pre-recorded Acoustic Messages.
- the Bio-Token may concatenate Frequency-Response-Correction-Signals to the Acoustic Message, thereby correcting any distortion that may be created due to lack of linearity. These deformities usually are caused by the sound-to-analog electric signal conversion at microphones, in addition to transmission and amplification generated distortions.
- the Frequency-Response-Correction-Signals e.g., a sample of frequencies with the same amplitude, timely concatenated, may be added at the time the Personalization Machine records the Owner's voice and/or at the time the Acoustic Message is generated by the Bio-Token (see Figs. 5 and 8). Information about the complete transmission complex characteristic (gain vs. frequency) then may be inferred from the signals concatenated to the Cipher. This information then may be used by the
- Identification Device e.g., ID Server
- the said transmission complex including microphone, transmission lines, amplifiers, etc.
- two or more acoustic messages i.e. : at the beginning and at the end of the verbal instructions
- the Bio-Token device may be used as a Debit Card, utilizing a method for Acoustic Confirmation based on the comparison of the Owners Voice Print against the Holder's Voice (utterance) (see Fig.
- the Personalization Machine process may be replaced by a Debit Card process.
- An amount of money to be added to a Debit-Card-Bio-Token credit preferably is registered and/or stored in the Token's memory (e.g., $ 1 ,000.00) (see Fig. 1 3) .
- the Token's owner may then pay an amount (e.g., $55 dollars) entering by the amount (55) into a keypad equipped on Bio-Token device, according to the method described in Fig. 1 6 (Static Encryption not included to simplify the diagram, but is an option).
- the Bio-Token then may transmit an encoded Cipher to the Debiting Machine, which is similar to an Identification Device.
- This Cipher may include the amount to be paid, Dynamically Encrypted, together with the Voice Print, but need not necessarily include the Owner's ID data.
- the Debiting Machine preferably then performs any of the suitable identification methods described above for Identification Devices and/or ROV Identification Devices.
- Dynamic encryption may be utilized to prevent interception, recording and subsequent usage of the acoustic message. Any encrypted amount stored on the Debiting Machine may then be converted to cash at a later time.
- the Token's memory may then contain a credit balance of the remaining $945.00 for future usage.
- the Bio-Token device may be used as an Acoustic Travelers' Check.
- the Cipher preferably includes an amount paid, doubly encrypted, together with a Voice Print and the Owner's ID data.
- This transaction is not anonymous, like in a debit card, but instead is an identified transaction, like a Travelers' Check.
- the Debiting Machine may decrypt only one step of the double encryption and, then, use a part of the result (referred to herein as a "pseudo-random number") as a seed number for generating a Challenge (see Fig. 1 5, static Encryption not shown to simplify the diagram, but is an option).
- the Debiting Machine then may display or voice the Challenge, and the Holder may, in response, voice the Challenge (to be checked by the Debiting Machine) and enter the challenge into the Bio-Token.
- the Bio-Token may then generate a Confirmation Acoustic Message carrying the Transaction Confirmation Number (TCN) coherent with the first.
- TCN Transaction Confirmation Number
- the Bio-Token then may deduct from the balance (stored in the Token) the amount paid.
- the transaction then may only be completed if the Debiting Machine receives a Confirmation Acoustic Message with the correct TCN. As before, this
- Cipher and the Transaction Confirmation Number may be converted to cash at a later time.
- the audio signals which represent the encoded version of the Cipher (Acoustic Cipher), and the voice of the owner (Holder's utterance), may be received by the Identification Server either directly or indirectly, e.g., transmitted by any media of communication, such as phone, Internet, data transmission lines, etc. eventually reaching, either on-line or offline, the Identification Device (e.g., ID Server).
- the Holder's utterance is a response to a variable challenge.
- the Cipher encoded or not, may reach the Identification Device, on-line or off-line, together with the voice of the Device's Holder (Utterance), the Utterance preferably being a voice string answer to a variable question or request, e.g., "Please repeat the words: 'Bill Clinton' ", or "Say the date and time in minutes, hours, days and years, " or "Utter, please, the transaction data, if any, to be certified by this identification.”
- the Holder's utterance then may be analyzed, in addition, by Speech Recognition software.
- Speech Recognition software the Identification Device may be able to check the degree of coherency of the response to the challenge, in addition to the Speaker's identity. This analysis may help to avoid the use pre-recorded strings of the Owner's voice in order to impersonate him/her.
- the methods of the present invention also preferably comprise a step of analyzing the Utterance (Device's Holder response) received by an Identification Device.
- the analysis preferably is performed by Speaker (identity) Verification Software, thereby providing a Computed Result from the comparison made.
- Speaker identity
- a Voice Print may be compressed, averaged, hashed, weight averaged or modified by any other suitable mathematical elaboration in order to reduce the amount of memory places needed to store it and, further, to reduce the time elapsed during transmission.
- the Identification Device may conclude that the Authorized Owner of the portable device is the present Device Holder, whose voice response (Utterance) has been analyzed.
- the Cipher also includes the authorized owner's ID Data and/or the transaction data, e.g., his/her name and/or address and/or driver license and/or passport number, etc.
- the Identification Device has, as a result, the ID Data certified with the some degree of certainty that the data corresponds to the said present Device Holder, helping to avoid the possibility that the Device Holder is an impostor.
- the methods and devices described above may be applied to the field of telecommunications for fighting against impersonation fraud of the caller, for calling cards, cellular phones and the like.
- Implementation of the methods and devices of the present invention in telecommunications, such as for use is cellular phones, is particularly easy because, first, the Identification Device does not need a Database in order to identify the caller and, second, the caller sustains a conversation (series of utterances) in any case. Accordingly, to obtain an Utterance, the present invention can utilize any string of a caller's conversation and/or response to a dialing-by-voice feature, e.g., when a caller responds to the dial-tone by uttering the destination phone number.
- This implementation can be made in a dedicated chip in a cellular phone and/or as software masked or embedded in an existing chip (see Figs. 1 2 and 23).
- Bio-Tokens may be used in conjunction with calling Card Applications and distributed to callers.
- the Bio-Tokens may be configured to work in conjunction with one or more Identification Devices, thereby providing a user-friendly way to identify of the callers.
- the same can be accomplished with the ROV-Bio- Tokens/ROV-ldentification-Devices.
- each time a caller wishes to place a call he/she will dial an access number and will reach an Identification Device.
- the caller may send the Acoustic Message (according to any of the methods described above) and then may be identified or rejected when he/she speaks or responds to a challenge.
- the methods and devices described above may be utilized in conjunction with military or security agencies applications, providing a method for accomplishing the distribution and usage of non-transferable ID cards or passports.
- an Identification Device/ ROV-ldentification-Device may be installed to identify the holders of Bio-Tokens and/or ROV-Bio-Tokens.
- the system preferably comprises Personalization Machines, a multitude of Bio-Tokens, and a multitude of Identification Devices.
- a Personalization Machine preferably comprises a PC machine, with special slots, preferably with the ability to read from one or several media, such as Hard Disks, floppy disks, RAM, ROM, Dangles, PCMCIA cards, Chip cards or any other suitable media; to record, digitize and analyze sound; to run Speaker (identity) Verification Software and/or Speak recognition Software; to generate Voice Prints, to elaborate Voice Prints; and/or to write into a Bio-Token's memory.
- any suitable computer-based machine comprising the above-stated functionality will suffice.
- Bio-Tokens preferably comprise portable electronic devices with memory, possibly similar to those described in US patent 5,524,072 (PCT/US92/1 0492), and preferably having the ability to read from a keypad (e.g., PINS) or chip-cards, to read from the Bio-Token memory, to compute, to encrypt, to scramble, to display, to measure time and/or to encode results into sound (see Fig. 14).
- a keypad e.g., PINS
- Chip-cards e.g., chip-cards
- Bio-Tokens may be embodied in many different applications, such as cards, hand-held devices, cellular phones, etc., as well as any other suitable portable devices that, as they are or after being modified, can provide the above-described functionality.
- Bio-Tokens further may comprise none, one or more of the following functional elements: a display to instruct users to take certain actions, through prompts and announcements (e.g., "enter password, " or “batteries are low,” etc.); accounting capabilities, e.g., the ability to store transactions amounts, produce balances, etc.; a central processing unit (CPU); a keyboard; a card slot allowing a card to be inserted or extracted and allowing the Bio-Token to read and/or write from and/or to a chip-card, PCMCIA card or magnetic card; an alarm; a voice generator; a power supply; a ROM, a RAM and/or suitable data, address, and control busses; and /or a serial port.
- the Bio-Token may be suitably integrated into a single customized chip, like an integrated circuit chip.
- a serial port or other suitable connection may be suitably configured to permit the direct or indirect connection of a Bio-Token with a standard PC, or any other suitable device, to enter and discharge data to and from the Bio-Token (e.g., personalization data, stored transaction data, etc.).
- a serial port or other suitable connection may be configured to accommodate any convenient communication interface, such as RS232, optical or the like.
- a CPU of the Bio-Token may comprise any suitable general purpose processor.
- ROM of the Bio-Token may be used to store software statements in a conventional manner, which may be introduced via serial input, keypad or any other suitable method.
- the software may comprise system level supervisory programs and instructions.
- the holder of a Bio-Token may be required to enter a password to activate the Bio-Token, and the Bio-Token will then write the information into a card which is in the token at that moment.
- a Bio- Token also may comprise the capability to detect fingerprints, and/or the capability of voice recognition, as means of identifying the user instead of, or as a complement to, requiring a password.
- the Bio-Token device may compute the Dynamic Encrypted version of the Voice Print digits representing the characteristic of the voice of the Device Owner (statically encrypted or not), and, if required, any other data such as the owner's ID Data, and/or card ID Data, and/or any other data entered by the owner before the transaction. This process results in a Cipher.
- the Bio-Token device may encode the Cipher (or the Scrambled Acoustic Message in the case of the ROV-
- Bio-Token into sound, generating the audio signals which represent the encoded version of the Cipher, in which case an Acoustic Message produced by the Bio-Token may be referred to as an Acoustic Cipher.
- the Identification Devices are devices which preferably are able to read from one or several media (e.g., Hard Disks, floppy disks, RAM, ROM, Dangles, PCMCIA, Chip cards and/or other suitable media); to record, digitize and analyze sound; to run Speaker (identity) Verification Software; to run Speak Recognition Soft; to generate Voice Prints; to elaborate such Voice Prints and record, digitize and analyze Bio-Token generated Acoustic Messages, including Acoustic Ciphers; to de-scramble Scrambled ROV Specimens; and/or to measure time.
- media e.g., Hard Disks, floppy disks, RAM, ROM, Dangles, PCMCIA, Chip cards and/or other suitable media
- Speaker (identity) Verification Software to run Speak Recognition Soft
- to generate Voice Prints to elaborate such Voice Prints and record, digitize and analyze Bio-Token generated Acoustic Messages, including Acoustic Ciphers; to de-scramble Scrambled ROV
- Cipher along with the voice of the owner (utterance), is received by the
- Identification Device either directly or indirectly (e.g., transmitted by any media of communication such as phone, Internet, data transmission lines, etc.) eventually reaching, either on-line or off-line, the Identification Device (e.g., ID Server).
- the Identification Device e.g., ID Server
- the Identification Device then may decode the audio signals representing the encoded version of digits (the Cipher), and decrypt the said digits thereby recuperating the characteristic of the voice (the Voice Print) of the specific Bio-Token device owner, together with the additional data sent, if any, within the Cipher.
- the Identification Device also then may receive the voice of the owner
- the ID Server then preferably analyzes and compares the voice string (utterance) to the Voice Print, using the same or similar type of Voice Recognition- Speaker Verification software as used in the PM machine, and compares the results.
- an Identification Device may compare a voice (utterance) analysis result with a relevant part of a result of the decryption of the Cipher generated by the Bio-Token. If the two results are similar, according to certain pre-established tolerances, the Identification Device may conclude that the Holder of the device is the authorized owner. Otherwise, the Holder may be an impostor.
- any of the above- described devices may communicate to each other by IR, optical, electromagnetic, or any other suitable communications means, instead of, or in addition to sound.
- a portable device is presented which accomplishes the functions of both the Bio-Token and the Identification Device.
- the device referred to herein as a Two Way Identifier, may be capable of identifying its owner to other devices and, further, identifying holders of other devices.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU10485/99A AU1048599A (en) | 1997-10-26 | 1998-10-26 | Non-transferable bio-metric token-based identification methods and devices |
CA002307161A CA2307161A1 (en) | 1997-10-26 | 1998-10-26 | Non-transferable bio-metric token-based identification methods and devices |
EP98952949A EP1031139A4 (en) | 1997-10-26 | 1998-10-26 | IDENTIFICATION METHOD AND DEVICES BASED ON NON-TRANSFERABLE BIOMETRIC TOKENS |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL122023A IL122023A (en) | 1997-10-26 | 1997-10-26 | Non-transferable bio-metric token-based identification method and devices |
IL122023 | 1997-10-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999022362A1 true WO1999022362A1 (en) | 1999-05-06 |
Family
ID=11070777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB1998/001835 WO1999022362A1 (en) | 1997-10-26 | 1998-10-26 | Non-transferable bio-metric token-based identification methods and devices |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1031139A4 (en) |
AU (1) | AU1048599A (en) |
CA (1) | CA2307161A1 (en) |
IL (1) | IL122023A (en) |
WO (1) | WO1999022362A1 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1209663A1 (en) * | 2000-11-27 | 2002-05-29 | Siemens Aktiengesellschaft | Device and method for access control |
US6938050B2 (en) | 2002-04-23 | 2005-08-30 | International Business Machines Corporation | Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor |
US6944627B2 (en) | 2002-04-23 | 2005-09-13 | International Business Machines Corporation | Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy |
US6947948B2 (en) | 2002-04-23 | 2005-09-20 | International Business Machines Corporation | Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology |
DE102004013860A1 (en) * | 2004-03-16 | 2005-10-06 | Deutsche Telekom Ag | Digital video, sound and or voice information encryption method, whereby a spoken key is used for encryption and if decryption is incorrect, the video and or sound track is played back in an incorrect manner |
US6999966B2 (en) | 2002-04-23 | 2006-02-14 | International Business Machines Corporation | Content management system and methodology for implementing a complex object using nested/recursive structures |
US7013393B1 (en) | 1999-12-21 | 2006-03-14 | Pierre Stevens | Universal intelligent card for secure access to system functions |
US7035854B2 (en) | 2002-04-23 | 2006-04-25 | International Business Machines Corporation | Content management system and methodology employing non-transferable access tokens to control data access |
US7082455B2 (en) | 2002-04-23 | 2006-07-25 | International Business Machines Corporation | Method and apparatus of parameter passing of structured data for stored procedures in a content management system |
US7280970B2 (en) | 1999-10-04 | 2007-10-09 | Beepcard Ltd. | Sonic/ultrasonic authentication device |
US7383297B1 (en) | 1998-10-02 | 2008-06-03 | Beepcard Ltd. | Method to use acoustic signals for computer communications |
US7467386B2 (en) | 2004-01-16 | 2008-12-16 | International Business Machines Corporation | Parameter passing of data structures where API and corresponding stored procedure are different versions/releases |
WO2011066844A1 (en) * | 2009-12-02 | 2011-06-09 | Agnitio, S.L. | Obfuscated speech synthesis |
US8843057B2 (en) | 1998-09-16 | 2014-09-23 | Dialware Inc. | Physical presence digital authentication system |
US9219708B2 (en) | 2001-03-22 | 2015-12-22 | DialwareInc. | Method and system for remotely authenticating identification devices |
US9361444B2 (en) | 1998-10-02 | 2016-06-07 | Dialware Inc. | Card for interaction with a computer |
US9489949B2 (en) | 1999-10-04 | 2016-11-08 | Dialware Inc. | System and method for identifying and/or authenticating a source of received electronic data by digital signal processing and/or voice authentication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3896266A (en) * | 1971-08-09 | 1975-07-22 | Nelson J Waterbury | Credit and other security cards and card utilization systems therefore |
US4731841A (en) * | 1986-06-16 | 1988-03-15 | Applied Information Technologies Research Center | Field initialized authentication system for protective security of electronic information networks |
US4827518A (en) * | 1987-08-06 | 1989-05-02 | Bell Communications Research, Inc. | Speaker verification system using integrated circuit cards |
US5414755A (en) * | 1994-08-10 | 1995-05-09 | Itt Corporation | System and method for passive voice verification in a telephone network |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
-
1997
- 1997-10-26 IL IL122023A patent/IL122023A/en not_active IP Right Cessation
-
1998
- 1998-10-26 WO PCT/IB1998/001835 patent/WO1999022362A1/en not_active Application Discontinuation
- 1998-10-26 CA CA002307161A patent/CA2307161A1/en not_active Abandoned
- 1998-10-26 EP EP98952949A patent/EP1031139A4/en not_active Withdrawn
- 1998-10-26 AU AU10485/99A patent/AU1048599A/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3896266A (en) * | 1971-08-09 | 1975-07-22 | Nelson J Waterbury | Credit and other security cards and card utilization systems therefore |
US4731841A (en) * | 1986-06-16 | 1988-03-15 | Applied Information Technologies Research Center | Field initialized authentication system for protective security of electronic information networks |
US4827518A (en) * | 1987-08-06 | 1989-05-02 | Bell Communications Research, Inc. | Speaker verification system using integrated circuit cards |
US5414755A (en) * | 1994-08-10 | 1995-05-09 | Itt Corporation | System and method for passive voice verification in a telephone network |
Non-Patent Citations (1)
Title |
---|
See also references of EP1031139A4 * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7568963B1 (en) | 1998-09-16 | 2009-08-04 | Beepcard Ltd. | Interactive toys |
US9830778B2 (en) | 1998-09-16 | 2017-11-28 | Dialware Communications, Llc | Interactive toys |
US9607475B2 (en) | 1998-09-16 | 2017-03-28 | Dialware Inc | Interactive toys |
US8843057B2 (en) | 1998-09-16 | 2014-09-23 | Dialware Inc. | Physical presence digital authentication system |
US9275517B2 (en) | 1998-09-16 | 2016-03-01 | Dialware Inc. | Interactive toys |
US8935367B2 (en) | 1998-10-02 | 2015-01-13 | Dialware Inc. | Electronic device and method of configuring thereof |
US9361444B2 (en) | 1998-10-02 | 2016-06-07 | Dialware Inc. | Card for interaction with a computer |
US7480692B2 (en) | 1998-10-02 | 2009-01-20 | Beepcard Inc. | Computer communications using acoustic signals |
US7383297B1 (en) | 1998-10-02 | 2008-06-03 | Beepcard Ltd. | Method to use acoustic signals for computer communications |
US9489949B2 (en) | 1999-10-04 | 2016-11-08 | Dialware Inc. | System and method for identifying and/or authenticating a source of received electronic data by digital signal processing and/or voice authentication |
US7280970B2 (en) | 1999-10-04 | 2007-10-09 | Beepcard Ltd. | Sonic/ultrasonic authentication device |
US7013393B1 (en) | 1999-12-21 | 2006-03-14 | Pierre Stevens | Universal intelligent card for secure access to system functions |
EP1209663A1 (en) * | 2000-11-27 | 2002-05-29 | Siemens Aktiengesellschaft | Device and method for access control |
WO2002043050A1 (en) * | 2000-11-27 | 2002-05-30 | Siemens Aktiengesellschaft | Access control arrangement and method for access control |
US9219708B2 (en) | 2001-03-22 | 2015-12-22 | DialwareInc. | Method and system for remotely authenticating identification devices |
US6999966B2 (en) | 2002-04-23 | 2006-02-14 | International Business Machines Corporation | Content management system and methodology for implementing a complex object using nested/recursive structures |
US7082455B2 (en) | 2002-04-23 | 2006-07-25 | International Business Machines Corporation | Method and apparatus of parameter passing of structured data for stored procedures in a content management system |
US7035854B2 (en) | 2002-04-23 | 2006-04-25 | International Business Machines Corporation | Content management system and methodology employing non-transferable access tokens to control data access |
US6947948B2 (en) | 2002-04-23 | 2005-09-20 | International Business Machines Corporation | Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology |
US6944627B2 (en) | 2002-04-23 | 2005-09-13 | International Business Machines Corporation | Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy |
US6938050B2 (en) | 2002-04-23 | 2005-08-30 | International Business Machines Corporation | Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor |
US8161495B2 (en) | 2004-01-16 | 2012-04-17 | International Business Machines Corporation | Parameters passing of data structures where API and corresponding stored procedure are different versions/releases |
US7467386B2 (en) | 2004-01-16 | 2008-12-16 | International Business Machines Corporation | Parameter passing of data structures where API and corresponding stored procedure are different versions/releases |
DE102004013860A1 (en) * | 2004-03-16 | 2005-10-06 | Deutsche Telekom Ag | Digital video, sound and or voice information encryption method, whereby a spoken key is used for encryption and if decryption is incorrect, the video and or sound track is played back in an incorrect manner |
WO2011066844A1 (en) * | 2009-12-02 | 2011-06-09 | Agnitio, S.L. | Obfuscated speech synthesis |
Also Published As
Publication number | Publication date |
---|---|
IL122023A0 (en) | 1998-03-10 |
EP1031139A4 (en) | 2000-10-18 |
CA2307161A1 (en) | 1999-05-06 |
IL122023A (en) | 2007-06-17 |
EP1031139A1 (en) | 2000-08-30 |
AU1048599A (en) | 1999-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6957185B1 (en) | Method and apparatus for the secure identification of the owner of a portable device | |
WO1999022362A1 (en) | Non-transferable bio-metric token-based identification methods and devices | |
US6012144A (en) | Transaction security method and apparatus | |
KR100471508B1 (en) | A portable information and transaction processing system and method utilizing biometric authorization and digital certificate security | |
TW394894B (en) | Portable acoustic interface for remote access to automatic speech/speaker recognition server | |
EP0055986B1 (en) | Security system and apparatus for the three-way communication of confidential data | |
US6904520B1 (en) | Method and system for ensuring the securing of computer servers of games | |
US7861092B2 (en) | Personal communication apparatus capable of recording transactions secured with biometric data | |
US20040061593A1 (en) | Self-authenticating indentification substrate with encoded packet output | |
US20020191765A1 (en) | Acoustic encoding of dynamic identification codes | |
IL138109A (en) | Method and devices for digitally signing files by means of a hand-held device | |
JP2001508563A (en) | Security system and method for remote services provided by financial institutions | |
EP2668739A2 (en) | Secure transaction facilitator | |
JP4104171B2 (en) | Security system and method for services provided by telecommunications operators | |
CN112801660A (en) | Secret-free signing method and device for payment protocol | |
CN102150166A (en) | Release of transaction data | |
Çabuk et al. | A Proposal on initial remote user enrollment for IVR-based voice authentication systems | |
CN112954693B (en) | Identity authentication method, identity authentication server and terminal | |
KR20070103816A (en) | Card information delivery system using voice signal and method | |
JP3639797B2 (en) | Electronic passbook recording method and electronic passbook registration system | |
Magedanz | ASPECT ADVANCED SECURITY FOR PERSONAL COMMUNICATIONS TECHNOLOGY |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2307161 Country of ref document: CA Ref country code: CA Ref document number: 2307161 Kind code of ref document: A Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998952949 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09530206 Country of ref document: US |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1998952949 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998952949 Country of ref document: EP |