WO2001077991A2 - Authentification vocale sur un canal bruite - Google Patents
Authentification vocale sur un canal bruite Download PDFInfo
- Publication number
- WO2001077991A2 WO2001077991A2 PCT/IL2001/000342 IL0100342W WO0177991A2 WO 2001077991 A2 WO2001077991 A2 WO 2001077991A2 IL 0100342 W IL0100342 W IL 0100342W WO 0177991 A2 WO0177991 A2 WO 0177991A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- channel
- remote
- communication
- encoder
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/20—Pattern transformations or operations aimed at increasing system robustness, e.g. against channel noise or different working conditions
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- the present invention relates to voice-based authentication over a noisy channel.
- Remote communication is a major feature of modern life and it is now common to provide transaction facilities such as telephone banking, which require authentication of the user. Authentication is typically carried out by asking the user for a password.
- the password may be a word or a number or a combination of letters and numbers, which can either be given orally to service provider personnel or can be entered through the telephone keyboard and transferred using DTMF tones. If the communication is made via the Internet or via a messaging system then password entry is equally straightforward and may for example be carried out using an on-screen dialog.
- a development in authentication enables automatic authentication of spoken or voice passwords. Such automatic authentication can be carried out in two ways.
- a first way is to use conventional voice recognition and authentication technology to match a spoken password against a stored password to determine that the correct password has been spoken.
- the voice authentication technology retains a copy of the correct password and calculates a statistical distance between a received word and the stored copy. Provided that the statistical distance is below a predetermined threshold the password is considered recognized.
- an alternative authentication system it is not a password but rather the speaker himself that is identified in the authentication process. Every speaker has a distinct voiceprint, which is machine identifiable, and the speaker is requested to speak a word or phrase, allowing distinctive features of the speech, namely the voiceprint to be identified.
- voice channels are configured to provide a level of protection against noise and distortion which is sufficient for comprehension by the human ear.
- the voice channel does not necessary provide a quality of received signal that is sufficient for automatic voice recognition and authentication.
- cellular channels are configured to maximize the number of users by minimizing bandwidth, thus effectively working at maximal acceptable levels of noise and distortion within the channel.
- a remote communication terminal for verified communication comprising: a sound input, a password encoder connected to said sound input for encoding a voice password identified from said sound input to provide said password with resilience for transmission in a noisy channel, and a password output connected to said password encoder for sending said resiliently encoded password over a channel to an authenticator.
- a preferred embodiment comprises a sound output connected to said sound input for sending sound data over a channel to a communication destination.
- said password output is operable to send said resiliently encoded password using a first communication protocol and said sound output is operable to send said sound data using a second communication protocol.
- said password output is operable to send said resiliently encoded password using a first communication channel and said sound output is operable to send said sound data using a second communication channel.
- said first communication channel uses a first communication protocol and said second communication channel uses a second communication protocol.
- said password encoder comprises a digitizer.
- said password encoder comprises a channel encoder.
- said channel encoder comprises a cyclic redundancy check encoder.
- said cham el encoder comprises a Huffman encoder.
- said channel encoder comprises a turbo encoder.
- said channel encoder comprises a block encoder.
- said password encoder further comprises a compressor for compressing said digitized password.
- said password encoder further comprises an encryptor for encrypting said password.
- said first communication channel is a digital communication channel and said second communication channel is an analog communication channel.
- said first communication channel is a cellular digital communication channel.
- said first communication protocol is the Wireless Application
- said second communication channel is GSM.
- said second communication channel is a third generation cellular telephony channel.
- remote authentication apparatus for authenticating a voice message comprising a separately transmitted channel encoded password and message body, the apparatus comprising: a password receiver for receiving said channel encoded password, a password decoder for decoding said password, a password authenticator for authenticating said decoded password, and and a message body receiver for receiving said message body for processing in accordance with said authentication.
- said password receiver is operable to receive said channel encoded password using a first communication protocol and said message body receiver is operable to receive said sound data using a second communication protocol.
- said password receiver is operable to receive said resiliently encoded password using a first communication channel and said message body receiver is operable to receive said sound data using a second communication channel.
- said first communication channel uses a first communication protocol and said second communication channel uses a second communication protocol.
- said password receiver comprises a digital to analog converter.
- said password decoder comprises a channel decoder.
- said channel decoder comprises a cyclic redundancy check decoder.
- said channel decoder comprises a Huffman decoder.
- said channel decoder comprises a turbo decoder.
- said channel decoder comprises a block decoder.
- said channel decoder comprises a Viterbi decoder.
- channel encoded password is receivable in compressed format and said password decoder comprises a decompressor for decompressing said digitized password.
- said channel encoded password is receivable in encrypted format and said password decoder comprises a decryptor for decrypting said digitized password.
- said first communication channel is a digital communication channel and said second communication channel is an analog communication channel.
- said first communication channel is a cellular digital communication channel.
- said first communication protocol is the Wireless Application
- said second communication channel is GSM.
- said password authenticator comprises a stored sample password and a distance measurer, wherein said distance measurer is operable to measure a distance between said received password and said stored sample password, and wherein said authenticator further comprises a comparator for comparing said measured distance against a threshold, thereby to determine whether said received password is the same as said stored password.
- remote authentication apparatus for authenticating a voice message comprising a separately transmitted channel encoded authentication phrase and message body
- the apparatus comprising: an authentication phrase receiver for receiving said channel encoded password, an authentication phrase decoder for decoding said authentication phrase, an authenticator for authenticating said decoded authentication phrase by determining that said authentication phrase contains an expected voiceprint, and a message body receiver for receiving said message body for processing in accordance with said authentication.
- a method of obtaining or providing a password for remote authorization comprising: connecting to a remote server using a first level of channel protection, receiving a vocal password from a user, and encoding said vocal password for transmission using a second level of channel protection, wherein said second level of channel protection is higher than said first level of channel protection.
- Fig. 1 is a simplified diagram of a system for reliable voice-based authorization according to a first embodiment of the present invention
- Fig. 2 is a simplified block diagram of the communication device of Fig. 1
- Fig. 3 is a simplified block diagram of the receiving location of Fig. 1
- Fig. 4 is a simplified flow diagram of a communication procedure involving voice authorization.
- Fig. 1 is a simplified diagram of a system according to a first embodiment of the present invention.
- a communication device 10 is located at a sending location 12.
- the communication device comprises a client module 14 which comprises the standard functionality of the communication device 10, such as GSM cellular telephony functionality.
- a password processor 16 which is operable to identify password or other authentication material of a communication and process the password for secure transfer separately from the message body.
- the password may be transferred either over a different channel from the message body or over the same channel but in a more secure manner.
- third generation mobile telephony standards support different levels of error protection over a single channel.
- Fig. 1 shows an embodiment in which two separate channels, channel A and channel B are used.
- Channel A is used for transferring the message body and channel B is for transferring the password or other authentication information.
- the channels are standard communication channels, which may involve radio or cellular links at various stages and are liable to add noise or introduce distortion into any signal transferred.
- the communication is preferably set up on the two channels simultaneously.
- one of the channels is a voice channel and the other channel is a data channel.
- data channels have higher levels of protection against noise and distortion as opposed to voice channels since data-based applications generally require close to perfect data transfer.
- a receiving location 18 preferably comprises two servers, a communication server 20 and an authentication server 22.
- the communication server 20 processes the body of the communication, for example it carries out an interactive process or obtains information for a user.
- the communication server 20 may be a server that holds bank account or other personal information of a user or may be an e-commerce site or any other example of a server for which reliable authentication may be required.
- the authentication server receives the password and, as will be explained below, decodes it to remove noise and distortion.
- the decoded password is then used in a process involving voice recognition and authentication to identify either the password or the user, again as will be explained below.
- an authorization is provided to communication server 20.
- Communication server 20 may require the authorization to permit data access or to permit a transaction or for any other purpose to obtain positive identity of a user.
- Fig. 2 is a simplified block diagram of the communication device 10 of Fig. 1. Parts that are identical to those shown above are given the same reference numerals and are not referred to again except as necessary for an understanding of the present embodiment.
- the client module 14 comprises a sound input 30 which may be a standard microphone.
- a message body processor 32 processes the entirety of a message in the normal way, for example as a GSM — based cellular telephone call and the message is output via a standard output 34 for transmission.
- a password extractor 36 is able to extract the part of the sound input data comprising the password for processing separately from the rest of the message. It is noted that the password bearing part may be cut, that is to say removed, from the message body, or it may simply be copied so that the message body remains intact.
- the password extractor may extract the password.
- One way is for the user to press on a button at the time he is saying the password.
- Another possibility is for the authentication server 22 to send a control signal to the device 10 at the time that it requests the password, which control signal switches on the password extractor for a predetermined amount of time.
- the data extracted should preferably include the entire password but it is less critical as to whether it contains only the password or whether it contains other parts of the message in additional since the authentication part of the password authorization process is able to recognize the password from amongst other data.
- the extracted password, or voice stream containing the password or authentication phrase, is then sent to a password encoder 38.
- the password encoder preferably comprises an A/D converter for digitizing the voice stream. Alternatively digitization may be incorporated into the sound input 30 for digitization of the message body and password before they are separated.
- the password encoder further comprises a channel encoder 42 for encoding the password in a form suitable for robust transmission over a noisy channel. Encoding may involve any known channel encoding scheme, for example CRC codes of various kinds including trellis codes, block codes, turbo codes and the like. Many channel encoding schemes allow selectable levels of protection. Generally, the higher the level of protection the higher the bandwidth required by the transmission and thus many transmission systems try to limit the level of protection to the minimum necessary for successful receipt.
- channel encoder 42 preferably provides a high level of channel protection to the password and the password is sent as protected digitized data.
- the password encoder 38 further comprises an encryptor 44 for encrypting the password.
- the password may be sent as a separately identifiable unit and an eavesdropper able to identify the unit is able to copy it and hack into the system.
- the password-bearing data unit is encrypted in such a way that simple copying would not put an eavesdropper in possession of the password.
- the password may be encrypted such that successive encryptions of the same password are never the same.
- the password encoder 38 also preferably comprises a data compressor 46.
- the data compressor may use any data compression scheme in order to compress the extracted signal bearing the password.
- Compression schemes include vocoder-based schemes which are specifically intended for compression of voice data. In using such compression schemes the skilled person should preferably bear in mind the need to maintain voice quality.
- One way of maintaining voice quality is to use a vocoder scheme for voice compression that corresponds to the voice recognition and authentication technology used by the authenticator, thereby retaining all the voice information that is used in the recognition part of the authentication process.
- the processed signal bearing the password is then sent to a password output 48.
- the password output may send data over the same channel as the message body but more robustly encoded as a result of the channel encoding above, or it may send the data over a different channel.
- many current mobile telephones are enabled for data communications using such schemes as WAP as well as voice communication over standard GSM.
- WAP wireless personal area network
- voice communication over standard GSM.
- the message body may be transmitted in the normal way over the voice channel and the password processor may simply make use of the standard WAP functionality for encoding and output.
- a communication server 18 comprises a message body receiver 50 for receiving the main body of the message.
- a message body processor 52 carries out a procedure that requires authorization, the procedure itself based on interaction with the main body of the message.
- the authentication server 22 comprises an authentication phrase receiver 54 for receiving the channel encoded authentication phrase or password or message segment containing the same, hereinafter referred to as the password.
- the authentication phrase receiver 54 receives the password and buffers it as necessary.
- the password is passed to an authentication phrase decoder 56 where channel decoding, decompression and decryption are preferably carried out by channel decoding unit 58, decryptor 60 and decompressor 62 so that the original password phrase is recovered.
- a D/A converter 64 is also shown. If the voice recognition and authentication apparatus is analog-based then the password is reconverted into analog form before processing, but if the voice recognition and authentication technology is digitally based then the D/A converter may be dispensed with.
- decompressor 62 may also be dispensed with.
- the output of the authentication phrase decoder is passed to authenticator 66.
- Authenticator 66 may comprise voice recognition functionality intended to match a, received password to a template stored in an associated sample memory 68.
- the authenticator uses voice analysis to produce a reduced form of the received password which is then matched against a sample using distance measuring techniques. If the distance between the template and the spoken password is below a predetermined threshold then authorization is given, otherwise the user is requested to repeat the password. Preferably after a predetermined number of unsuccessful repetitions the session is terminated.
- the template is a recorded and processed sample of the user speaking the password.
- the distance between the spoken password and the template is generally speaker dependent in that a different user speaking the same password will often achieve a greater distance from the template than the original user.
- suitable setting of the predetermined threshold may effectively make the password user specific, meaning that another user, even if he/she discovers what the password is, will not be able to reproduce it to the satisfaction of the authenticator.
- the authenticator obtains a voice print.
- a voice print comprises characteristics of the user's voice which are entirely speaker dependent and are independent of the words spoken. Thus the user need not speak a predetermined password but rather speaks a phrase of sufficient length to enable voice print information to be extracted. The user is either identified or not and authorization issued or denied accordingly.
- FIG. 4 is a simplified flow chart showing a procedure for setting up a process requiring authorization according to an embodiment of the present invention.
- the flow chart shows stages divided into those that occur at the user location and those that occur at the server location.
- a user sends a unique identifier which serves as a user name.
- a request for authentication is then sent to the user via either of the channels involved in the communication.
- the user responds by speaking the password or an authentication phrase which is extracted, as explained above, by the password extractor.
- the password is optionally compressed and encrypted and then is channel encoded for a WAP channel.
- the password is sent via the WAP channel and decoded as necessary at the authorization server.
- the password is used to verify the identity of the user and authorization is granted or denied.
- the communication device is prompted as to whether authentication is successful and authorization has been granted. If authorization is not granted then the user may be prompted to repeat the password up to a predetermined number of times until a final denial is issued and the communication session is terminated.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
- Transceivers (AREA)
- Telephonic Communication Services (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU50620/01A AU5062001A (en) | 2000-04-12 | 2001-04-12 | Voice-based authentication over a noisy channel |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19686400P | 2000-04-12 | 2000-04-12 | |
US60/196,864 | 2000-04-12 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001077991A2 true WO2001077991A2 (fr) | 2001-10-18 |
WO2001077991A3 WO2001077991A3 (fr) | 2002-02-28 |
Family
ID=22727077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2001/000342 WO2001077991A2 (fr) | 2000-04-12 | 2001-04-12 | Authentification vocale sur un canal bruite |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU5062001A (fr) |
WO (1) | WO2001077991A2 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103346882A (zh) * | 2013-06-17 | 2013-10-09 | 深圳市宏电技术股份有限公司 | 一种播报系统的电话权限认证方法及装置 |
WO2014179268A1 (fr) * | 2013-05-03 | 2014-11-06 | Citrix Systems, Inc. | Perturbation d'attaque de mot de passe à l'aide d'une compression |
WO2019013770A1 (fr) * | 2017-07-11 | 2019-01-17 | Hewlett-Packard Development Company, L.P. | Authentification vocale basée sur une modulation vocale |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5907597A (en) * | 1994-08-05 | 1999-05-25 | Smart Tone Authentication, Inc. | Method and system for the secure communication of data |
US5897616A (en) * | 1997-06-11 | 1999-04-27 | International Business Machines Corporation | Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases |
US5953700A (en) * | 1997-06-11 | 1999-09-14 | International Business Machines Corporation | Portable acoustic interface for remote access to automatic speech/speaker recognition server |
US5913196A (en) * | 1997-11-17 | 1999-06-15 | Talmor; Rita | System and method for establishing identity of a speaker |
-
2001
- 2001-04-12 WO PCT/IL2001/000342 patent/WO2001077991A2/fr active Application Filing
- 2001-04-12 AU AU50620/01A patent/AU5062001A/en not_active Abandoned
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014179268A1 (fr) * | 2013-05-03 | 2014-11-06 | Citrix Systems, Inc. | Perturbation d'attaque de mot de passe à l'aide d'une compression |
US8949617B2 (en) | 2013-05-03 | 2015-02-03 | Citrix Systems, Inc. | Disrupting password attack using compression |
US9237009B2 (en) | 2013-05-03 | 2016-01-12 | Citrix Systems, Inc. | Disrupting offline password attacks |
CN105359155A (zh) * | 2013-05-03 | 2016-02-24 | 思杰系统有限公司 | 使用压缩破坏口令攻击 |
KR101805878B1 (ko) | 2013-05-03 | 2017-12-07 | 사이트릭스 시스템스, 인크. | 압축을 사용하여 패스워드 공격 방해 |
CN105359155B (zh) * | 2013-05-03 | 2018-01-02 | 思杰系统有限公司 | 使用压缩破坏口令攻击 |
CN103346882A (zh) * | 2013-06-17 | 2013-10-09 | 深圳市宏电技术股份有限公司 | 一种播报系统的电话权限认证方法及装置 |
WO2019013770A1 (fr) * | 2017-07-11 | 2019-01-17 | Hewlett-Packard Development Company, L.P. | Authentification vocale basée sur une modulation vocale |
US11475113B2 (en) | 2017-07-11 | 2022-10-18 | Hewlett-Packard Development Company, L.P. | Voice modulation based voice authentication |
Also Published As
Publication number | Publication date |
---|---|
WO2001077991A3 (fr) | 2002-02-28 |
AU5062001A (en) | 2001-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7970611B2 (en) | Speaker authentication in digital communication networks | |
US6393305B1 (en) | Secure wireless communication user identification by voice recognition | |
KR100276846B1 (ko) | 휴대용 음성 인식 장치, 음성 인식 시스템 및 음성에 의한 유효클라이언트 인증 방법 | |
US8082448B2 (en) | System and method for user authentication using non-language words | |
KR100386044B1 (ko) | 음성 트랜잭션을 보안하기 위한 시스템 및 방법 | |
JP2001320780A (ja) | 無線ネットワークにおいて用いる移動局および無線ネットワークにおいて移動局と基地局との間で信号を送信する際に用いる方法 | |
US6122271A (en) | Digital communication system with integral messaging and method therefor | |
US20040215968A1 (en) | Determining identity data for a user | |
EP1686825A2 (fr) | Procédé et terminal mobile permettant la transmission sécurisée d'un identificateur d'abonné mobile | |
US6185536B1 (en) | System and method for establishing a communication link using user-specific voice data parameters as a user discriminator | |
JP2006527528A (ja) | 音声チャネルを介してデータを伝送するための方法及び装置 | |
JP2009237774A (ja) | 認証サーバ、サービス提供サーバ、認証方法、通信端末、およびログイン方法 | |
KR20070105072A (ko) | 인터넷 전자결제 서비스 시스템에서 음성신호를 이용한일회용 비밀번호 인증 시스템 및 그 방법 | |
EP1129537B1 (fr) | Traitement de donnees re ues dans un processus de reconnaissance de la parole reparti | |
CN104901808A (zh) | 基于时间型动态口令的声纹认证系统及方法 | |
WO2001077991A2 (fr) | Authentification vocale sur un canal bruite | |
JP2002269047A (ja) | 音声ユーザ認証システム | |
EP1189208B1 (fr) | Détection d'erreurs de transmission dans un décodeur de parole | |
US20080198991A1 (en) | Telephone and method of transmitting caller token | |
US11562746B2 (en) | System and methods for speaker identification, message compression and/or message replay in a communications environment | |
Hou et al. | Taes: Two-factor authentication with end-to-end security against voip phishing | |
US20070276663A1 (en) | Robust speaker recognition | |
KR100587100B1 (ko) | 멀티모달 방식의 보안인증 방법, 보안인증 시스템 그리고암호화/복호화 방법 | |
EA004378B1 (ru) | Способ и устройство для уменьшения влияния ошибок передачи в распределенной системе и в распределенном процессе распознавания речи | |
KR100428717B1 (ko) | 무선 데이터 채널상에서의 음성파일 송수신 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |