首页>
外国专利>
Implementing security system involves distributing authentication information via mobile radio system(s); first data record is transmitted via mobile radio network, third record via another path
Implementing security system involves distributing authentication information via mobile radio system(s); first data record is transmitted via mobile radio network, third record via another path
The method involves the user terminal (200) forming a third data record from a first data record transmitted to the terminal and a second identity data record associated with the user terminal and sending the third data record to the security system (400) for user authentication. The first data record is sent to the terminal using at least one mobile radio network (300) and the third record is sent using another communications path (R2). Independent claims are also included for the following: (a) a security system for implementing the inventive method (b) a user terminal for implementing the inventive method (c) a security module for a user terminal (d) and a mobile radio network for implementing the inventive method.
展开▼