摘要 |
A method in which a telephony operator acts as a recording authority and certification authority for secured transactions between a subscriber and a provider. Communications between the subscriber ( 101 ) and the operator ( 113 ) are signed with a symmetrical algorithm ( 108 c, 117 C). The communications between the operator and the provider are countersigned according to PKI technologies ( 117 E, 124 A), and an asymmetrical algorithm. Two configurations are possible: either the operator signs the contents of each of the subscriber/provider transactions with his own dual key, after validation, or the operator implements a secure and repudiable signature transfer, in his network, to a remote terminal (using a secret key technology This reduces the resources needed for a subscriber's terminal. It also gives the operator greater visibility of the operations occurring in his network and ensures the validity of the transactions.
|