WO2001013195A2 - Protection system for internet type networks - Google Patents

Protection system for internet type networks Download PDF

Info

Publication number
WO2001013195A2
WO2001013195A2 PCT/BR2000/000097 BR0000097W WO0113195A2 WO 2001013195 A2 WO2001013195 A2 WO 2001013195A2 BR 0000097 W BR0000097 W BR 0000097W WO 0113195 A2 WO0113195 A2 WO 0113195A2
Authority
WO
WIPO (PCT)
Prior art keywords
telephone
internet provider
origin
telephone terminal
microcomputer
Prior art date
Application number
PCT/BR2000/000097
Other languages
French (fr)
Other versions
WO2001013195A3 (en
Inventor
Alexsandro Nicolai
Original Assignee
Alexsandro Nicolai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alexsandro Nicolai filed Critical Alexsandro Nicolai
Publication of WO2001013195A2 publication Critical patent/WO2001013195A2/en
Publication of WO2001013195A3 publication Critical patent/WO2001013195A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Definitions

  • the present invention refers to a solution related to a World problem of lack of privacy protection and liability which are associated to the data transmission networks, particularly associated to the INTERNET. BACKGROUND OF INVENTION
  • Serious user's right problems are caused by the absence of a network protection, problems related to the immediate identification and elimination of unauthorized persons from the data network, i.e., telephone companies and internet providers are continuosly risen because the above companies have no immediate and confident identification control systems for blockage and /or elimination of unauthorized users from the data network.
  • the present invention permits a full use of the internet provider equipment; medical, legal, industrial and commerce information and also govern information which are declared confidential, secret and/or ultrasecret must be duly protected.
  • the methods of the art for user data protection are based on a password registry, automatic terminals, antivirus computer programs, criptography, etc.; said methods are easily broken by data system invaders and hackers, causing a drastic reduction of the internet type data network possibilities, e.g., avoid connection between confidential data networks and the internet, or the use the firewall protection system, comprising softwares prepared to eliminate unauthorized user access to private networks.
  • the claimed matter aims to enhance the present protection systems and not replace them or other services like the anonimous message service, but our invention aims identify the message origin and if the message origin exceeds the acceptable limitis as in child sex user's case, etc., said origin is immediately identified, advised or legally charged; the recommended methods for password protection involve a key combination, but this system is easily broken by hackers and the combination is hard to remember in some cases.
  • the present invention defines the hacker as a simple JOKE MESSAGE SENDER in the data base and in the internet; this makes possible create an ample data protection shield against several types of invaders like unauthorized persons, hackers (individuals or groups), industrial and govern information spy.
  • invaders act based on the fact of an immediate localization is hard to be done; thus if we consider the invader as a simple joke message sender in data base and internet systems, we can overcome the above mentioned problem by adding a novel password component, i.e., the identification of the calling number telephone terminal which is the origin of the call operation.
  • the identification password which is created in the origin telephone center and sent prior the telephone call be full performed, is hard to the invader reproduce by pretending the real call operation.
  • Adopt or add the terminal telephone number, the origin of the telephone call, as password or call orgin identifier for other national and/or international internet providers is not contrary to any Law or national/international user's privacy right, in view of the fact that the method of the present invention just add the password to the other information normally sent in the message/operation label.
  • the user can send the message protected by any name, but the this will cause an origin registration of the real user identification in the origin internet provider and the the contacted internet provider for permit the immediate identificationon, if necessary.
  • the present invention comprises hardware and software modifications in the origin internet provider operations center for collect, store and make analysis of the address (e-mail) and password of the performing call user and also will have to direct and automatically receive the terminal telephone number of said user from the telephone operation center.
  • the present systems of the art have low liability in view of the legal aspect of authorization of orgin user identification due the fact of the origin internet provider equipment just stores the data from the provider computer which are sent yb the call operator, therefore the above service does not detect if the telephone call is started by the real authorized user, or by a hacker/invader.
  • the objective of the present invention is provide technical and operation conditions for surely define the orgin of a telephone call.
  • the PROTECTION SYSTEM FOR INTERNET TYPE NETWORKS is to provide novel concepts and facilities related to telephone network operations, but without making changes in the present technology of the art.
  • the previously mentioned problems are solved by fitting the origin and/or receiving internet provider equipment to a simple protection system which permits maintain said equipment but increasing the liability of the corresponding service, i.e., data base access and operational control of this service. All equipment of the art is complex and is also associated to a high cost of operation, but this cannot protect the user's right against hackers or other type of invaders.
  • a good type of proteciton system shall meet the following requirements:
  • the system shall be integrated to the telephone operation system for permit the complete use of the technical features and facilites of the latter, the operation system does not require a technically skilled user;
  • the system shall be easy to be operated by the user and the cost of the service shall be charged when the user really request the service.
  • the invention has provided a complement of the present systems of the art by an external fitting of the hardware architeture and internal fitting in the software equipment of the internet providers; when a fixed or movable telephone operation center is is prepared to permit access to the invention system, the telephone call is conducted to the origin telephone operation center having the internet provider equipment and after the telephone call is sent to the receiving telephone terminal and the receiving internet provider.
  • Fig. 1 is a sequence block diagram of the invention system wherein a telephone call from a fixed or movable telephone operation center (4) is prepared to be connected to the system, the telephone call is started from a telephone terminal (1) which is connected to a telephone network and also to a microcomputer (3) and modem (2), thus the telephone call is extended from the telphone operation center (4) to the internet provider equipment (10) via a identification system of the caller telephone terminal (5), the identification system (5) receives the identifying origin telephone terminal (1) number and said identifier (5) is network connected to a microcomputer via communication closure (6).
  • the microcomputer (7) having the identification number (5) of the origin telephone terminal (1) informs to the origin internet provider equipment (10) via serial or parallel communication (9), that the modem (8) inlet has a subscriber connection duly identified by the identification number. At this point, the origin internet provider equipment can authorize, or not, the connection; if not, the telephone call is cancelled. If the connection is authorized, a standard communication is made between the microcomputer (3) and the origin internet provider equipment (10).
  • the origin microcomputer (3) having the identification number of the origin telelphone terminal and the corresponding registration information transmits said identification information and the password to the origin internet provider equipment (10) which will verify the data. If the data is accepted, the commercial and particular operations are permitted; these operations are limited by an agreement of the internet provide sevice and the user.
  • This information is stored in the receiving internet provider equipment (12); the receiving user (21), corresponding to the address (e-mail) called by the origin user (1), when contacting the receiving provider shall follow the same procedure, i.e., the telephone terminal (21) is connected to the telephone network and also to the microcomputer (20) and modem (19).
  • the telephone call is extended to the receiving internet provider equipment (12) via receiving telephone operration center (18) having a identifiacation system of the caller telephone terminal number (14), which receive the identification number of the origin telephone terminal (21), in which the identifier (14) is network connected to the microcomputer (16) via communication closure (15).
  • receiving internet provider equipment (12) can decide for authorize, or not, the connection. If the connection is not accepted, the telephone call is cancelled and if the connection is accepted, the standard communications between the receiving microcomputer (20) and and the receiving internet provider equipment is (12) is performed. Accordingly, the microcomputer (20), having identification number of the telephone terminal (21) and its respective registration information, transmits the identification information and the password, in order to be verified at the internet provider equipment (12) and, if the data is correct, the message is accepted.
  • the Fig. 2 has the same architeture and operational sequence of Fig. 1 , but having novel modem hardware configuration, by using a modem system having a new condition, i.e., the modem and the origin telephone call terminal identification in a single unit.
  • the Fig. 2 has the same architeture and operational sequence of Fig. 1 , but having novel modem hardware configuration, by using a modem system having a new condition, i.e., the modem and the origin telephone call terminal identification in a single unit.
  • FIG. 2 corresponds to a sequence block diagram of the present invention system, wherein a telephone call from a fixed or moveble telephone operation center (4) is prepared to be connected to the system, the telephone call is started in a telephone terminal (1), which is connected to a telephone network and a microcomputer (3) and modem (2), thus the telephone call is extended to the origin internet provider equipment (10) via origin telephone operation center (4) and modem/caller telephone terminal number identification system (5), which receive the identification number of the origin telephone terminal (1) and the modem/identifier (5), having the identification number of the telephone terminal (1), transmits to the origin internet provider equipment (6) at the inlet connection of the modem (5) and also connected to the subscriber of the identified and informed telephone terminal number.
  • the origin internet provider equipment (6) can decide for authorize or not the connection, if not, the telephone call is cancelled; if the connection is accepted the standard communications are performed between the microcomputer (3) and the origin internet provider equipment (6).
  • the microcomputer (3) having the origin telephone terminal identification number (1) and its corresponding registration information, transmits the identifying data and the password, in order to be verified by the internet provider equipment (6); if the data is correct, the commercial and particular operations are allowed but being limited by the internet provider service and user agreement.
  • the internet provider equipment (6) having the content transmitted from the microcomputer (3), contacts the internet (7), extending the telephone call to the receiving internet provider (8) and sending all the stored information with the traditional identifications (e-mail, etc) and also the identification number of the origin telephone terminal, in order to be stored in the receiving internet provider equipment (8).
  • the modem/identifier (9) system having the identification number of the caller telephone terminal (13), informs to the receiving internet provider equiment (8), that the corresponding inlet of the modem/identifier (9) has a subscriber conneciton corresponding to the identified and informed telephone terminal number.
  • the internet provider equipment (8) can decide for authorize or not the connection, if not, the telephone call is cancelled; if the connection is authorized, the standard communications between the microcomputer (12) and the internet provider equipment (8) is performed.
  • the microcomputer (12) having the identification of the receiving telephone terminal (13) and its corresponding registration information, transmits the identification data and the password, in order to be verified by the receiving internet provider equipment (8), if the data is correct, the messages are accepted.

Abstract

The present invention refers to a protection system which is employed against hackers and invaders attack to telephone network (4) and data network by using the telephone terminal (1) number as a password which is checked with the registration and identification data when a subscriber (21) accesses the data network and or a telephone network (4).

Description

PROTECTION SYSTEM FOR INTERNET TYPE NETWORKS
The present invention refers to a solution related to a World problem of lack of privacy protection and liability which are associated to the data transmission networks, particularly associated to the INTERNET. BACKGROUND OF INVENTION
Serious user's right problems are caused by the absence of a network protection, problems related to the immediate identification and elimination of unauthorized persons from the data network, i.e., telephone companies and internet providers are continuosly risen because the above companies have no immediate and confident identification control systems for blockage and /or elimination of unauthorized users from the data network.
The present invention permits a full use of the internet provider equipment; medical, legal, industrial and commerce information and also govern information which are declared confidential, secret and/or ultrasecret must be duly protected. The methods of the art for user data protection are based on a password registry, automatic terminals, antivirus computer programs, criptography, etc.; said methods are easily broken by data system invaders and hackers, causing a drastic reduction of the internet type data network possibilities, e.g., avoid connection between confidential data networks and the internet, or the use the firewall protection system, comprising softwares prepared to eliminate unauthorized user access to private networks. SUMMARY OF THE INVENTION The claimed matter aims to enhance the present protection systems and not replace them or other services like the anonimous message service, but our invention aims identify the message origin and if the message origin exceeds the acceptable limitis as in child sex user's case, etc., said origin is immediately identified, advised or legally charged; the recommended methods for password protection involve a key combination, but this system is easily broken by hackers and the combination is hard to remember in some cases.
The present invention defines the hacker as a simple JOKE MESSAGE SENDER in the data base and in the internet; this makes possible create an ample data protection shield against several types of invaders like unauthorized persons, hackers (individuals or groups), industrial and govern information spy. The above invaders act based on the fact of an immediate localization is hard to be done; thus if we consider the invader as a simple joke message sender in data base and internet systems, we can overcome the above mentioned problem by adding a novel password component, i.e., the identification of the calling number telephone terminal which is the origin of the call operation.
The identification password, which is created in the origin telephone center and sent prior the telephone call be full performed, is hard to the invader reproduce by pretending the real call operation. Adopt or add the terminal telephone number, the origin of the telephone call, as password or call orgin identifier for other national and/or international internet providers is not contrary to any Law or national/international user's privacy right, in view of the fact that the method of the present invention just add the password to the other information normally sent in the message/operation label. The user can send the message protected by any name, but the this will cause an origin registration of the real user identification in the origin internet provider and the the contacted internet provider for permit the immediate identificaton, if necessary.
DETAILED DISCLOSURE OF THE INVENTION
The present invention comprises hardware and software modifications in the origin internet provider operations center for collect, store and make analysis of the address (e-mail) and password of the performing call user and also will have to direct and automatically receive the terminal telephone number of said user from the telephone operation center.
The present systems of the art have low liability in view of the legal aspect of authorization of orgin user identification due the fact of the origin internet provider equipment just stores the data from the provider computer which are sent yb the call operator, therefore the above service does not detect if the telephone call is started by the real authorized user, or by a hacker/invader. The objective of the present invention is provide technical and operation conditions for surely define the orgin of a telephone call.
For switched network cases, the identification is performed by the telephone operation center, in private telephone line cases, this procedure for creating a telephone terminal number is automatic as in public telephone apparatus. The PROTECTION SYSTEM FOR INTERNET TYPE NETWORKS is to provide novel concepts and facilities related to telephone network operations, but without making changes in the present technology of the art. The previously mentioned problems are solved by fitting the origin and/or receiving internet provider equipment to a simple protection system which permits maintain said equipment but increasing the liability of the corresponding service, i.e., data base access and operational control of this service. All equipment of the art is complex and is also associated to a high cost of operation, but this cannot protect the user's right against hackers or other type of invaders.
A good type of proteciton system shall meet the following requirements:
The system shall be integrated to the telephone operation system for permit the complete use of the technical features and facilites of the latter, the operation system does not require a technically skilled user;
The system shall be easy to be operated by the user and the cost of the service shall be charged when the user really request the service.
According to the above stated, the invention has provided a complement of the present systems of the art by an external fitting of the hardware architeture and internal fitting in the software equipment of the internet providers; when a fixed or movable telephone operation center is is prepared to permit access to the invention system, the telephone call is conducted to the origin telephone operation center having the internet provider equipment and after the telephone call is sent to the receiving telephone terminal and the receiving internet provider. The features of the present invention are best defined in the following description of the enclosed figures:
Fig. 1 is a sequence block diagram of the invention system wherein a telephone call from a fixed or movable telephone operation center (4) is prepared to be connected to the system, the telephone call is started from a telephone terminal (1) which is connected to a telephone network and also to a microcomputer (3) and modem (2), thus the telephone call is extended from the telphone operation center (4) to the internet provider equipment (10) via a identification system of the caller telephone terminal (5), the identification system (5) receives the identifying origin telephone terminal (1) number and said identifier (5) is network connected to a microcomputer via communication closure (6).
The microcomputer (7) having the identification number (5) of the origin telephone terminal (1), informs to the origin internet provider equipment (10) via serial or paralel communication (9), that the modem (8) inlet has a subscriber connection duly identified by the identification number. At this point, the origin internet provider equipment can authorize, or not, the connection; if not, the telephone call is cancelled. If the connection is authorized, a standard communication is made between the microcomputer (3) and the origin internet provider equipment (10).
Thus, the origin microcomputer (3) having the identification number of the origin telelphone terminal and the corresponding registration information transmits said identification information and the password to the origin internet provider equipment (10) which will verify the data. If the data is accepted, the commercial and particular operations are permitted; these operations are limited by an agreement of the internet provide sevice and the user.
The origin internet provider equipment (10), having the trasnmissions performed by the microcomputer (3), contacts the internet (11 ) for extend the telephone call to the receive telephone operation center (12), sending all stored information with the traditional identification (e-mail, etc.) having attached the origin telephone terminal number identification. This information is stored in the receiving internet provider equipment (12); the receiving user (21), corresponding to the address (e-mail) called by the origin user (1), when contacting the receiving provider shall follow the same procedure, i.e., the telephone terminal (21) is connected to the telephone network and also to the microcomputer (20) and modem (19).
The telephone call is extended to the receiving internet provider equipment (12) via receiving telephone operration center (18) having a identifiacation system of the caller telephone terminal number (14), which receive the identification number of the origin telephone terminal (21), in which the identifier (14) is network connected to the microcomputer (16) via communication closure (15).
The microcomputer (16) having the identification number of the origin telephone terminal (21) and its corresponding modem (13), informs to the receiving internet provider (12) equipment via serial or paralel communication (17) that the corresponding inlet of the modem (13) is connected to the subscriber of the identified telephone termnal number. At this point, receiving internet provider equipment (12), can decide for authorize, or not, the connection. If the connection is not accepted, the telephone call is cancelled and if the connection is accepted, the standard communications between the receiving microcomputer (20) and and the receiving internet provider equipment is (12) is performed. Accordingly, the microcomputer (20), having identification number of the telephone terminal (21) and its respective registration information, transmits the identification information and the password, in order to be verified at the internet provider equipment (12) and, if the data is correct, the message is accepted.
The Fig. 2 has the same architeture and operational sequence of Fig. 1 , but having novel modem hardware configuration, by using a modem system having a new condition, i.e., the modem and the origin telephone call terminal identification in a single unit. The Fig. 2 corresponds to a sequence block diagram of the present invention system, wherein a telephone call from a fixed or moveble telephone operation center (4) is prepared to be connected to the system, the telephone call is started in a telephone terminal (1), which is connected to a telephone network and a microcomputer (3) and modem (2), thus the telephone call is extended to the origin internet provider equipment (10) via origin telephone operation center (4) and modem/caller telephone terminal number identification system (5), which receive the identification number of the origin telephone terminal (1) and the modem/identifier (5), having the identification number of the telephone terminal (1), transmits to the origin internet provider equipment (6) at the inlet connection of the modem (5) and also connected to the subscriber of the identified and informed telephone terminal number.
At this point, the origin internet provider equipment (6) can decide for authorize or not the connection, if not, the telephone call is cancelled; if the connection is accepted the standard communications are performed between the microcomputer (3) and the origin internet provider equipment (6). The microcomputer (3), having the origin telephone terminal identification number (1) and its corresponding registration information, transmits the identifying data and the password, in order to be verified by the internet provider equipment (6); if the data is correct, the commercial and particular operations are allowed but being limited by the internet provider service and user agreement.
The internet provider equipment (6), having the content transmitted from the microcomputer (3), contacts the internet (7), extending the telephone call to the receiving internet provider (8) and sending all the stored information with the traditional identifications (e-mail, etc) and also the identification number of the origin telephone terminal, in order to be stored in the receiving internet provider equipment (8). The respective receiving user (13), corresponding to the address sent by the origin user (1), shall follow the same procedure, i.e., the telephone terminal (13) is connected to the telephone network and the microcomputer (12) and modem (11), thus the telephone call is extended via the receiving telephone operation center (10) to the internet provider equipment (8) by a system of modem/identifier (9), for receive the telephone terminal identification number (13). The modem/identifier (9) system, having the identification number of the caller telephone terminal (13), informs to the receiving internet provider equiment (8), that the corresponding inlet of the modem/identifier (9) has a subscriber conneciton corresponding to the identified and informed telephone terminal number. At this point, the internet provider equipment (8), can decide for authorize or not the connection, if not, the telephone call is cancelled; if the connection is authorized, the standard communications between the microcomputer (12) and the internet provider equipment (8) is performed.
The microcomputer (12), having the identification of the receiving telephone terminal (13) and its corresponding registration information, transmits the identification data and the password, in order to be verified by the receiving internet provider equipment (8), if the data is correct, the messages are accepted.

Claims

WHAT IS CLAIMED IS:
1 - PROTECTION SYSTEM FOR INTERNET TYPE NETWORKS, wherein a telephone call from a fixed or movable telephone operation center (4) is prepared to be connected the protection system, the telephone call is started in telephone terminal (1), which is connected to the telephone network and also to a computer (3) and modem (2), the telephone call is thus extended via origin telephone operation center (4) to the origin internet provider equipment (10) by a identification system of the caller telephone terminal number (5), which receives the identification number of the origin telephone terminal (1) and the identifier (5) is network connected to the microcomputer (7) via communication closure (6).
2 - SYSTEM, according to claim 1 , wherein the microcomputer (7), having the identification number of the caller telephone terminal (5) and its corresponding modem (8), informs to the origin internet provider equipment (10) via serial or paralel communication (9), that the inlet corresponding to the modem (8) is connected to a subscriber of the identified and informed number.
3 - SYSTEM, according to any one of the preceding claims, wherein the origin internet provider equipment (10) can decide for authorize connection or not , if the connection is not accepted, the telephone call is cancelled, if the connection is accepted the standard communications between the microcomputer (3) and the internet provider equipment (10) is performed.
4 - SYSTEM, according to the preceding claims, wherein the microcomputer (3), having the identification number of the origin telephone terminal (1) and its respective registratin information, transmits the identifying data and the password, in order to be verified in the origin internet provider equipment (10), if the data is correct, the commercial or particular operation are allowed.
5 - SYSTEM, according to any preceding claims, wherein the origin internet provider equipment (10), having the content sent by the origin micromputer (3), contacts the internet (11), extending the telephone call to the receiving internet provider equipment (12), transmitting all stored information with the traditional information, but adding the identification number of the origin telephone terminal, said information is stored in the receiving internet provider (12).
6 - SYSTEM, according to any one of the preceding claims, wherein the receiving user (21), corresponding to the called address, will follow the same procdure when accessing the internet provider (12).
7 - SYSTEM, according to any one of the preceding claim, wherein the procedure related to the receiving user (21) comprises a telephone terminal (21) connected to a micro computer (20) and modem (19), extending the telephone call via the receiving telephone operation center (18) to the receiving internet provider equipment (12) by a identification system of the caller telephone terminal (14), which receives the identification number of the telephone terminal (21).
8 - SYSTEM, according to any one of the preceding claims wherein the identifier (14) is network connected to the microcomputer (16) by communication closure (15). 9 - SYSTEM, according to any one of the preceding claims, wherein the microcomputer (16), having telephone terminal (21) identification number and its corresponding modem (13), informs to the receivng internet provider equipment (12) via serial or paralel communication (17) that the inlet connection corresponding to the modem (13) is connected to a subscriber having an telephone terminal identification number.
10 - SYSTEM, according to any one of the preceding claims, wherein the internet provider equipment (12), can decide for auhorize the connection or not; if the connection is not authorized, the telephone call is cancelled and if the connection is accepted the standard coommunications between the receiving microcomputer (20) and the receiving internet provider equipment (12) are performed.
11 - SYSTEM, according to any preceding claim, wherein the origin microcomputer (20) having the identification number of the receiving telephone terminal (21) and its respective registration information, transmits the identifying data and the password, in order to be verified in the receiving internet provider equipment (12); if the data is correct, the message is accepted.
12 - PROTECTION SYSTEM FOR INTERNET TYPE NETWORKS wherein a telephone call from a fixed or movable telephone operation center (4) is prepared to be connectd to the system, the telephone call is started in a telephone terminal (1) which is connected to the telephone network and also connected to a microcomputer (3) and modem (2), extending the telephone call to theorigin internet provider equipment (10) via a system comprising modem and telephone terminal number identifier (5) for receive the telephone terminal (1) identification number.
13 - SYSTEM, according to claim 12, wherein the modem/identifier system (5), having the identification number of the caller telephone terminal (1), informs to the origin internet provider equipment (6) that the inlet connection corresponding to the modem (5) is connected to a subscriber having an identified telephone terminal number.
14 - SYSTEM, according to any one of claims 12 and 13, wherein the internet provider equipment (6) can decide for authorize the connection or not; if the connection is not authorized, the telephone call is cancelled, if the connection is authorized the standard communications between the microcomputer (3) and the internet provider equipment (6) is performed.
15 - SYSTEM, according to any one of the claims 12, 13 and 14, wherein the microcomputer (3) having the identification number of the telephone terminal (1) and its respective registration information, transmits the identifying data and the password, in order to be verified at the origin internet provider equipment (6) and if the data is correct, the commercial and particular operations are allowed.
16 - SYSTEM, according to any one of the claims 12 to 15, wherein the origin internet provider equipment (6) having the content sent by the origin microcomputer (3), contacts the internet (7), sending all stored information and the traditional information to the receiving internet provider (8), but adding the telephone terminal identification number, which are stord in the provider (8).
17 - SYSTEM, according to any one of claims 12 to 16, wherein the receiving user (13), corresponding to the called address performs the same procedure as stated above when accessing the internet provider (8).
18 - SYSTEM, according to claim 17, wherein the procedure comprises a telephone terminal (13) which is connected to the telephone network and also connected to a microcomputer (12) and modem (11), extending the telephone call via the receiving telephone operation center (10) to the receiving internet provider equipment (8) by a modem/caller terminal identifier system (9) for receive the identification number of the telephone terminal (13).
19 - SYSTEM, according to any one of claims 12 to 18, wherein the modem/identifier system (9), having the identification number of the caller telephone terminal (13), informs to the internet provider equipment (8) that the connection inlet corresponding to the modem/identifier (9) is connected to a subscriber having the informed number.
20 - SYSTEM, according to any one of claims 12 to 19, wherein the receiving internet provider can decide for authorize the connection or not; if the connecion is not authrized, the telephone call is cancelled, if the connection is authorized, the standard communications between the microcomputer (12) and the internet provider equipmment (8) are performed.
21 - SYSTEM, according to any one of claims 12 to 20, wherein, the microcomputer (12), having the identification number of the origin telephone terminal, transmits the the identifying data and the password, in order to be verified int receiving internet provider equipment (8) and if the data is correct the message is accepted.
PCT/BR2000/000097 1999-08-18 2000-08-18 Protection system for internet type networks WO2001013195A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
BR9903761A BR9903761A (en) 1999-08-18 1999-08-18 System for protection and security of internet networks
BRPI9903761-0 1999-08-18

Publications (2)

Publication Number Publication Date
WO2001013195A2 true WO2001013195A2 (en) 2001-02-22
WO2001013195A3 WO2001013195A3 (en) 2002-12-12

Family

ID=4073303

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/BR2000/000097 WO2001013195A2 (en) 1999-08-18 2000-08-18 Protection system for internet type networks

Country Status (2)

Country Link
BR (1) BR9903761A (en)
WO (1) WO2001013195A2 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5570465A (en) * 1993-07-22 1996-10-29 Tsakanikas; Peter J. Apparatus, method and system for printing of legal currency and negotiable instruments
US5872779A (en) * 1994-09-16 1999-02-16 Lucent Technologies Inc. System and method for private addressing plans using community addressing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5570465A (en) * 1993-07-22 1996-10-29 Tsakanikas; Peter J. Apparatus, method and system for printing of legal currency and negotiable instruments
US5872779A (en) * 1994-09-16 1999-02-16 Lucent Technologies Inc. System and method for private addressing plans using community addressing

Also Published As

Publication number Publication date
WO2001013195A3 (en) 2002-12-12
BR9903761A (en) 2001-04-17

Similar Documents

Publication Publication Date Title
US9264539B2 (en) Authentication method and system for screening network caller ID spoofs and malicious phone calls
EP1484892B1 (en) Method and system for lawful interception of packet switched network services
EP1058872B2 (en) Method, arrangement and apparatus for authentication through a communications network
EP1314078B1 (en) Automatic network user identification
US6499108B1 (en) Secure electronic mail system
US20110211682A1 (en) Telephony fraud prevention
WO2000021242A2 (en) Adaptive communication system enabling dissimilar devices to exchange information over a network
CA2172566A1 (en) User-transparent security method and apparatus for authenticating user terminal access to a network
EP1075748B1 (en) Method, arrangement and apparatus for authentication
KR100661776B1 (en) System and method for network connection
US8510822B2 (en) Communication system, reliable communication mechanism, and communication method used for the same
WO2001013195A2 (en) Protection system for internet type networks
TW202006586A (en) System and method for managing certification for cloud service system
WO2011074878A2 (en) Service security system and method for same
JPH11341151A (en) Dial-up connection authentication system
JPH1127750A (en) Access authentication method, connection controller and communication system
EP2204030B1 (en) Transmission of messages
JP2000209284A (en) Device and method for authentication
JP2001211479A (en) Data communication system
JP3478962B2 (en) How to prevent unauthorized remote access
JP3521837B2 (en) Location information service system and method, and storage medium storing location information service program
JP3656176B2 (en) Heterogeneous network communication equipment
KR100276696B1 (en) Authentication and Secret Exchange Method for Secret Communication in Permanent Virtual Circuit Environment
Caelli et al. Communications security
KR20000064199A (en) Internet security system for providing notification service of server connection states and sever security to the user at real time and the management method thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): CA ES JP MX PT US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): CA ES JP MX PT US

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP