发明名称 |
Telephone caller authentication |
摘要 |
Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including the caller identification information; and simultaneously providing a data carrier signal including the encrypted caller identification information. The receiving device implements receiving the telephone call; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of verifying the authenticity of a certificate used to encrypt the caller identification information; and comparing the decrypted caller identification information with the caller identification information from the voice carrier signal. A telephony device implementing such an authentication technique is also disclosed. |
申请公布号 |
US9288062(B2) |
申请公布日期 |
2016.03.15 |
申请号 |
US201414184775 |
申请日期 |
2014.02.20 |
申请人 |
International Business Machines Corporation |
发明人 |
Feltham Andrew S.;Maple Elizabeth J.;Maple Simon J. |
分类号 |
H04M1/56;H04M15/06;H04L9/32;H04W12/04;H04W12/06;H04W4/16;H04Q3/72;H04M3/38 |
主分类号 |
H04M1/56 |
代理机构 |
Greg Goshorn, P.C. |
代理人 |
Pivnichny John R.;Goshorn Gregory K.;Greg Goshorn, P.C. |
主权项 |
1. A computer program product, comprising a non-transitory computer-readable storage medium having program code embodied therewith, the program code executable by a plurality of processors to:
receive, by the plurality of processors, a telephone call, initiated by a caller device and received at a recipient device, wherein the telephone call is provided by:
encrypting caller identification information; andinitiating the telephone call, said initiating comprising:
providing a voice carrier signal including the caller identification information; andsimultaneously providing a data carrier signal including the encrypted caller identification information; decrypt, by the plurality of processors, the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of a list of verifying techniques, the list consisting of:
verifying, by the plurality of processors, the authenticity of a certificate used to encrypt the caller identification information; andcomparing, by the plurality of processors, the decrypted caller identification information with the caller identification information from the voice carrier signal. |
地址 |
Armonk NY US |