主权项 |
1. A computer-implemented method for verifying an identity of a caller, comprising:
receiving, by one or more computer processors, authenticating information associated with a caller, wherein the authenticating information comprises a password, caller ID information, a caller phone number, a recipient phone number, and a URL; creating, by one or more computer processors, a call record based on the authenticating information; retrieving, by one or more computer processors, additional information associated with the caller; updating, by one or more computer processors, the call record based on the additional information associated with the caller; retrieving, by one or more computer processors, based on interfacing with the URL, a digital signature associated with the caller; retrieving, by one or more computer processors, public key information associated with the caller; performing, by one or more computer processors, a digital signature assessment based on the public key information, wherein the digital signature assessment comprises a determination that the digital signature is valid, not valid, or unverifiable; updating, by one or more computer processors, the call record based on the digital signature assessment; adding, by one or more computer processors, timestamp information to the call record; receiving, by one or more computer processors, a request from a call recipient device; communicating, by one or more computer processors, information based on the call record to the call recipient device; and marking, by one or more computer processors, after a predefined length of time from the addition of the timestamp, the call record as expired. |