The invention relates to a method and a system for protecting the Internet connection of telephones of a mobile operator for consulting the services and the electronic messaging services. It also relates to mobile telephones as well as the video on demand terminals implementing such method.
At present, the SIM cards provided in mobile telephones enable the user of a mobile telephone to browse the Internet via the mobile operator's network or networks, which he subscribed to. For this purpose, the Internet sites have a usability and contents developed according to the various browsing technologies of the mobile telephone on the Internet network (browsers such as for example i-mode, WAP, Full-Browsing, etc.).
However, there exists a problem as regards the identification of the equipment used for the connection. The identification of the equipment is the only guarantee that the correct content has been delivered to the correct mobile (a content adapted to the equipment, an appropriate protection level of the content according to the equipment).
A first security level existing consists in checking that the access authorisation is contractually linked to the telephone SIM card, and thus makes it possible to open the points of access to the operator's network authorised by the contract.
Besides, in order to identify the mobile telephone by a “name” with the mobile telephone operator thereof, a parameter of the browser is incorporated in the telephone, the “User-Agent” which makes it possible to identify the model of the telephone requesting an Internet connection. Such identification can be checked by a filtering on the operator's network access gateway.
Besides, on some telephone categories, it is possible to reject some connections if the phone is used as a modem. This makes it possible to limit the access to some access points of the operator to the telephone applications only.
In order to limit the access to the networks of the authorised browsers, the patent document US 20040059937 provides the reduction of the access to a content in a central server to a limited number of browsers identified by an identifier transmitted in a request.
In the patent document WO 2006106270, it is provided to store the utilisation rights in the SIM card of the mobile. The mobile generates ciphering/deciphering keys for transferring a thus protected multimedia content to the mobile.
Other techniques implement an architecture specific to an authentication. For example, the document WO 2005041608 uses a server dedicated to the authentication by means of an electronic signature.
The current issue in the present technique results from the fact that the SIM cards can be removed from the mobile telephone, which they are normally provided for, so as to be inserted into other mobile telephones, smartphones or the PCMCIA card of a PC.
As regards the identification of the “User-Agent” type, the “name” can be changed on most PCs or smartphones browsers, by borrowing the “name” of another network browser (such names being very simple and easily available).
As regards the restriction of certain access points of the operator during the utilisation of the phone as a modem, some mobiles only execute such checking. Most mobiles do not execute such checking and thus, it is easy to use a point of access of the operator reserved to telephones only by replacing the mobile executing the checking of the modem utilisation by a mobile which does not execute this checking to connect a computer via a telephone.
Consequently, during a connection to the Internet, the mobile operator has no means to make the distinction in a certain way, from its network, between one of its subscribers' telephone, and a computer, another telephone or a smartphone. The information supplied by such Internet connections can thus be communicated to other users or devices than the mobile operator's clients using the equipment identified by the identification application. As a matter of fact, the identification of a computer or another telephone can be easily replaced by an identification recognised as being that of one of the mobile operator's clients authorised to browse the Internet.
The existing safety measures do not make it possible for one mobile telephone operator to check the identity of the user of the Internet connection: as a matter of fact, they concern the identification by the operator of the SIM card, or an application of a “User-Agent” type incorporated in the telephone. Thus, when the User Agents are identical, it is impossible to make the distinction between the “Full-Browsing” browsers, and the i-mode or WAP browsers and thus to differentiate the pricing, adapt the content or increase the security thereof.
The present invention aims at solving such identification of the clients' issue by a mobile telephone operator, thanks to means making it possible to identify the mobile telephone and not the SIM card.
More precisely, the object of the invention is a method for protecting the Internet connection of a mobile telephone by a gateway of an operator's network, wherein an identification model code stored in the telephone is ciphered, transmitted as a header of each connection request, identified by the deciphering and validated on the Internet access gateway.
According to particular embodiments:
The invention also relates to a system for protecting the Internet access of a mobile telephone for implementing the previous method, such telephone having a digital data managing module (DRM). Such system includes an application for ciphering the stored model code integrated in the DRM, such application being implemented upon each transmission of a request on a deciphering application incorporated on the Internet network (IN) access gateway.
According to particular embodiments:
Other characteristics and advantages of the invention will appear upon reading the following description of a non-limitative exemplary embodiment and referring to the appended drawings, which show respectively:
Referring to
In this exemplary embodiment, the header is formed of a sequence consisting of the IP addresses of the mobile and the Proxy gateway to the operator's network, the date and time of the emission of the request, as well as the IP address of the network access point (known as APN) and the model code for identifying the mobile.
The request 2, together with its signature, is then transmitted as a header to the Proxy network gateway 3 of its operator after having passed the access point PNA 4 to the network 5 of the operator.
The gateway 3 deciphers the header, then filters the access by checking that the model code is valid for the browser used and the requested services. The filtering is executed by an interrogation (arrow 7) to the database 9 thereof. If the answer is positive, as in this example, the gateway 3 sends a message 11 to the Internet server 13 concerned by the request. The message contains the “authorised terminal” information in this example, as well as the request for the downloading of data to the content 15 provider. The provider's data 15 are then retrieved on the reverse path via the connection 14 up to the server 13, the link 16 up to the gateway 3, then the link 17 up to the mobile data 1. The data are then finally memorised after compression in the module 102.
Depending on the result of the comparison between the model code of the mobile and those of the database 9 of the gateway 3, a message adapted to the profile of the mobile is transmitted to the Internet servers. Advantageously, a profile parameter makes it possible or not to activate the filtering function. The operators having no compatible gateway can deactivate the filter. The browser which appears as an unknown mobile (refer hereinunder) can also deactivate the filter.
The message contains information complying with such comparison: “protected terminal” as in the example above, “unknown terminal” if the code is uncertain, incomplete or unavailable, “embezzled terminal” if a modem type code is identified or eventually “incompatible terminal” for the mobiles of the prior generation. The servers which receive messages other than “authorized terminal” can lock the access to the data provider, start an overpricing or send a return message. An example of treatment is shown hereinafter, while referring to
In
But the Proxy gateway 3 does not detect a model code and the consultation of the database 9 is not executed in this example. In an alternative embodiment, the gateway can optionally consult its database in order to finalise the applicant's profile and transmit a more precise message to the Internet server.
In the illustrated example, a message sent by the gateway to the Internet server 13 concerned by the request contains the “unknown terminal” information, as well as a request for downloading data from the content provider 15, subject to an approval. In the case shown, the Internet server 13 decides not to transfer the information requested to the terminals 20 or 21. The Internet server 13 then sends a rejection message 16, which is relayed by the Proxy gateway 3 and the link 17 up to the terminals 20 or 21.
The invention is not limited to the case of mobile telephones only. It can also be applied to mobile operators and to cable operators, whose clients purchase time for images, films or television programs, generally called “video on demand” (or VOD), and the terminals of the clients, computers, decoders or television sets then have the same identification system, according to the invention, as those of the mobile telephones.
Number | Date | Country | Kind |
---|---|---|---|
0754578 | Apr 2007 | FR | national |