ImageVerifierCode 换一换
格式:PDF , 页数:5 ,大小:334.12KB ,
资源ID:593336      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-593336.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(CEPT T SF 68 E-1992 International Validation of Automatic Telecommunications Charge Cards《自动电信收费卡国际验证》.pdf)为本站会员(figureissue185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

CEPT T SF 68 E-1992 International Validation of Automatic Telecommunications Charge Cards《自动电信收费卡国际验证》.pdf

1、CEPT T/SF*btl*E 92 232b414 0012b08 523 (3 TSF68 Page E 1 Recommendation T/SF 68 (by correspondence 1990) INTERNATIONAL VALIDATION OF AUTOMATIC TELECOMMUNICATIONS CHARGE CARDS Recommendation proposed by Working Group T/WG 7 “Services and Facilities” (SF) Text of the Recommendation adopted by “Telecom

2、munications” Commission: “The European Conference of Posts and Telecommunications Administrations, 1. 2. 3. 3.1. 3.2. 3.3. 3.4. 3.5. 3.6. 3.7. CONTENTS LIST INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . , . . . . . . . . SCOPE TELECOMMUNICATIONS CHARGE CARD SERVICE . . . . . . . .

3、 . . . . . . . . . . Background . . . . . . . . . , . . . . . . . . . . . . . . . . . . . . . . . . . . . . CCITT Recommendations . . . , . . . . . . . . . . . . . . . , . . . . . . . . . . . . Card Technologies . . . . . . , . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input of card data

4、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Validationofcarddata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . International validations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recommendations . . . . . . . , . . . . . . . , .

5、. , . . . . . . . . . . . . . . . . . 2 2 2 2 2 3 3 3 4 4 Edition of April 10, 1992 CEPT T/SF*b8*E 92 2326414 0032609 4bT T/SF 68 E Page 2 1. INTRODUCTION This annex describes the Telecommunications Charge Card (TCC) service and considers the implications of international intervorking of the TCC ser

6、vice with reference to validation and fraud protection. It then recommends action by CEPT members to allow international validation of automatic TCC services. 2. SCOPE A history of the service is given and current card technologies explained. Details are given of how card data can be entered into a

7、system and validated on a world wide scale so as to offer a useful service to the customer in a fraud free environment. Current CCIT documents are explained and the way forward proposed. 3. TELECOMMUNICATIONS CHARGE CARD SERVICE 3.1. Background Telecommunications Charge Cards have been available fro

8、m Administrations for many years. In some countries the service evolved in the early days of the telephone service when payphones were not widely available. The service allowed business travellers to make calls from a telephone other than their own and to transfer the call charges to their own bill.

9、 The use of the card in countries other than the country of origin has been slower to develop as a bilateral agreement is required between Administrations to allow this to happen. However, a typical holder of a card today is able to use the card in over 120 countries to make calls back to the countr

10、y of card origin. (To simplify this text, “external” will be used to refer to the use of TCCs outside the country of origin.) Because international use of the card requires a degree of standardisation, CCITT Recommendation E. 116 was produced (see section 4). This Recommendation has been the basis o

11、f external use of charge cards for many years. Until the 1980s all charge card calls were placed via the operator. The caller asks the operator for a charge card call and quotes the card number verbally. After a suitable check of the cards validity, the operator connects the call and records the det

12、ails for subsequent inclusion on the appropriate bill. During the 1980s, some Administrations introduced automatic charge cards. These cards can usually still be used via the operator, but, in addition, the caller may set up the call by automatic means. In this case the receipt of the card data and

13、its validation is by a machine .rather than by an operator. CCITT Recommendation E. i 18 has been written to standardise the operation of automatic telecommunications charge cards so that they can also be used externally. It is anticipated that more Administrations will issue automatic cards in the

14、future. A serious problem which Administrations face is the fraudulent use of cards. There is a need to ensure that the card validation system used is the best that can be made available so as to minimise potential losses. This is particularly true when cards are used externally and is the main reas

15、on why external calls are restricted by E. 11 6 to call back to the country of card origin only. Despite this, there is a real customer need for the restrictions on card usage in other countries to be relaxed so that internal calls and third country calls can be made externally. CCITT Recommendation

16、 E.113 has been produced as a first step towards the achievement of the removal of restrictions while maintaining adequate fraud control. This area requires further study. 3.2. CCITT Recommendations The following Recommendations covering the use of Telecommunications Charge Card appear in the CCITT

17、Blue Book: E. 116 This Recommendation covers the use of Charge Cards in the manual environment (i.e. via the operator). It was modified in the last study period to reflect the changes brought about by the introduction of automatic cards, and in particular a new numbering system was introduced. A tra

18、nsition period from the old to the new numbering scheme is specified. This new Recommendation has been introduced for the first time in the Blue Book. It covers the use of automatic charge cards. This Recommendation was also introduced for the first time in the Blue Book. It gives details of the inf

19、ormation which must be passed between Administrations in order to validate an automatic charge card in another country. E.113 opens the way to the use of cards externally to make calls other than back to the country of origin. However, this Recommendation does not give details of the CCITT 7 signall

20、ing protocols required. These protocols require further study. E.118 E.113 Edition of April 10, 1992 CEPT T/SF*b8*E 92 m 232b4L4 OOL2bLO L8L m T/SF 68 E Page 3 3.3. Card technologies There are a wide variety of card technologies available. The following list divides card types into four groups. This

21、 does not claim to be a complete list of all technologies, but is typical of those which Administrations may consider for charge card applications: PAPER (OR PLASTIC) - NON MACHINE READABLE MACHINE READABLE - MAGNETIC STRIPE - OPTICAL CHARACTER READER - BAR CODE ALTERABLE - CARD WITH STRORAGE - READ

22、 AND REWRITTEN BY TERMINAL SMART - CARD WITH INTEGRATED CIRCUIT INTELLIGENCE - STORAGE With the exception of the paper card, all of these card technologies require suitable terminals to interact with the card. However, all charge cards will have a number printed on the front which the customer can e

23、ither quote to an operator or can input to an automatic system via the telephone keypad. In this way, all technologies are compatible with E. 1 16 and E. 1 18. O O O 3.4. Input of card data For a charge card to be really useful to a customer, it is essential that the card can be used from as many te

24、lephones as possible so that the call can be made from any place at any time. It is not realistic to fit card readers to all telephones and so input of data either verbally or by dialling on a telephone keypad will be the most important methods of data input. Where a terminal is fitted with a card r

25、eader this will be a bonus to the customer making the input of data simpler and quicker. Further facilities may also be made available to the customer as a result of interaction with a card reading terminal. A typical sequence of events for the setting up of a manual charge card call is as follows:

26、Caller identifies a suitable terminal Dials access code for the operator Operator answers Caller asks for a charge card call Operator asks for charge card number Caller quotes number to operator Operator validates card number (operator may ask the caller for a secret code or validation digits in ord

27、er to carry out this process) Operator asks the caller for telephone number required Caller quotes number Operator connects call At the end of the call operator notes call details for billing The equivalent sequence for setting up an automatic charge card call is as follows: Caller identifies a suit

28、able terminal Caller dials an access code Automatic equipment answers and prompts caller for card number Caller dials card number on keypad Automatic equipment may optionally ask the caller for a PIN number at this point Card is validated Automatic equipment prompts caller for telephone number requi

29、red Call is connected At the end of the call the call details are transmitted to the billing system If the caller is at a card reading terminal, the set up sequence is similar, but the terminal may automatically read the card number and transmit it to the central equipment without any input being re

30、quired from the calle?. 3.5. Validation of card data Fraud is the greatest risk which faces any Administration.which issues charge cards. In order to minimise the risk of fraud the card number has to be validated before the call is allowed to proceed. There are many ways of validating a card and som

31、e of the main ways are listed below: CHECK OF NUMBER FORMAT, LENGTH AND RANGE. This is the simplest method to implement especially in the manual environment where operators do not have access to databases. However it offers little security and is easily defrauded. Edition of April 10, 1992 CEPT T/SF

32、*bB*E 92 m 232bV1V 0012611 01B m T/SF 68 E Page 4 ALGORITHMIC CHECK. In a check of this type, one or more of the digits in the card number or PIN is related to the other digits in the number by means of a secret algorithm. A mathematical formula or table is used to validate the number. This system g

33、uards against numbers being invented but does not prevent the use of stolen numbers. The check digit may be part of the card number, may be a separate digit or digits requested by an operator, or may be part or all of the PIN number. STOP (BLACK) LIST. This system is often combined with one or more

34、of the other validation methods. The card number is checked against a list of known stolen cards and is rejected if on the list. The check may be manual or by means of a computer. This method is very useful as it enables stolen cards to be “stopped”, but fraudulent calls can be made until the number

35、 appears on the list. This system is sometimes called negative validation. POSITIVE VALIDATION. This type of validation is the most complex and costly to provide, but it does offer the best security against fraud. A database of all card numbers is set up and when a service request is made, the card

36、number is checked against its entry in the database to ensure it is valid and can be used for the requested purpose. A PIN number is often used in conjunction with such a check. PIN VALIDATION WITHIN THE TERMINAL. Smart cards offer the opportunity to validate PIN numbers within the terminai without

37、having to search a database. Such calls can only be made from suitable terminals so access to the service is restricted. 3.6. International validations Telecommunication Charge Cards carry the risk of international fraud unless adequate validation systems are put in place. This is the main reason wh

38、y E. 116 restricts calls made abroad only to those back to the country of card origin. However, there is a customer need to be able to make internal or third country calls when away from originating country. This requires a system of international validation to be set up. Administrations must also m

39、ake bilateral agreements before international use can start. In order to perform an international validation, it is necessary for the card and PIN number to be verified against data supplied by the card issuing Administration. Usually the card and PIN numbers are referred to a database in order to c

40、arry out the validation. There are various ways in which this can be done including the following: 1. The database contains information about the card numbers of foreign cards and so is able to make a local validation. 2. The database does not contain details of foreign cards so a message is sent to

41、 an appropriate distant database in order to obtain validation. 3. The database contains information about the card numbers of certain Administrations and so is able to make a local validation. For card numbers of other Administrations a message is sent to an appropriate distant database in order to

42、 obtain validation. 4. The database contains information about the card numbers of certain Administrations and the card numbers of other Administrations which have been validated recently within a certain time limit (to be agreed upon by bilateral agreement or to be indicated in the “Request respons

43、e” as described in E. 1 13) and so is able to make a local validation, thus avoiding message transfer time. For card numbers for which no recent validation is present a message is sent to an appropriate distant database in order to obtain validation. This validation should then be stored during the

44、time limit agreed upon in the bilateral agreement. 5. The database contains a stop (black) list supplied by the card issuing Administration. Any card number on this list cannot be used. 6. The card and PIN numbers are related by an algorithm. In this case no database is required as the validation ca

45、n be carried out in the local telephone exchange or even in the terminal. These different options vary considerably in cost and complexity to set up. Also they offer different levels of security against fraud. Administrations should make bilateral agreements choosing the method of validation which o

46、ffers the required level of security against fraud. Option 2 is complex to set up as it requires all Administrations to interconnect their databases and to provide real time validation of card numbers on request from abroad. Despite this complexity, this option appears to offer the best way forward

47、and the most security against fraud. It is recommended that this method is adopted. CCITT Recommendation E. 11 3 has been written to define the messages which must pass between databases in order to perform validations. These messages may be passed over any suitable communications link, but it is pr

48、oposed to develop CCITT 7 protocols to be the interqational standard. This method will allow the integration of charge card systems with the emerging Intellikent Network. Edition of April 10, 1992 CEPT T/SF*b8*E 92 m 232b414 0012bL2 T54 m T/SF 68 E Page 5 3.7. Recommendation O In order to allow Auto

49、matic Telecommunications Charge Cards to be accepted in the networks of other Administrations for the purposes of making calls other than those back to the country of card origin, Administrations must take the following actions: 1. Implement the new “89” numbering scheme as laid down by CCITT Recommendation E.118 on their 2. Make a bilateral agreement concerning the method of card validation to be used. 3. Put into place the systems necessary to carry out the validation. Referring to the options listed in Option 1. Arrange for a copy of the card and PIN data required for card validation t

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1