发明名称 Telephone caller authentication
摘要 Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including the caller identification information; and simultaneously providing a data carrier signal including the encrypted caller identification information. The receiving device implements receiving the telephone call; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of verifying the authenticity of a certificate used to encrypt the caller identification information; and comparing the decrypted caller identification information with the caller identification information from the voice carrier signal. A telephony device implementing such an authentication technique is also disclosed.
申请公布号 US9288062(B2) 申请公布日期 2016.03.15
申请号 US201414184775 申请日期 2014.02.20
申请人 International Business Machines Corporation 发明人 Feltham Andrew S.;Maple Elizabeth J.;Maple Simon J.
分类号 H04M1/56;H04M15/06;H04L9/32;H04W12/04;H04W12/06;H04W4/16;H04Q3/72;H04M3/38 主分类号 H04M1/56
代理机构 Greg Goshorn, P.C. 代理人 Pivnichny John R.;Goshorn Gregory K.;Greg Goshorn, P.C.
主权项 1. A computer program product, comprising a non-transitory computer-readable storage medium having program code embodied therewith, the program code executable by a plurality of processors to: receive, by the plurality of processors, a telephone call, initiated by a caller device and received at a recipient device, wherein the telephone call is provided by: encrypting caller identification information; andinitiating the telephone call, said initiating comprising: providing a voice carrier signal including the caller identification information; andsimultaneously providing a data carrier signal including the encrypted caller identification information; decrypt, by the plurality of processors, the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of a list of verifying techniques, the list consisting of: verifying, by the plurality of processors, the authenticity of a certificate used to encrypt the caller identification information; andcomparing, by the plurality of processors, the decrypted caller identification information with the caller identification information from the voice carrier signal.
地址 Armonk NY US