发明名称 |
Telephone Caller Authentication |
摘要 |
Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including the caller identification information; and simultaneously providing a data carrier signal including the encrypted caller identification information. The receiving device implements receiving the telephone call; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by at least one of verifying the authenticity of a certificate used to encrypt the caller identification information; and comparing the decrypted caller identification information with the caller identification information from the voice carrier signal. A telephony device implementing such an authentication technique is also disclosed. |
申请公布号 |
US2015236857(A1) |
申请公布日期 |
2015.08.20 |
申请号 |
US201414337145 |
申请日期 |
2014.07.21 |
申请人 |
International Business Machines Corporation |
发明人 |
Feltham Andrew S.;Maple Elizabeth J.;Maple Simon J. |
分类号 |
H04L9/32;H04Q3/72;H04W4/16;H04W12/04;H04W12/06 |
主分类号 |
H04L9/32 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method of authenticating the identity of a caller in a telephone call between a caller device and a recipient device, the method comprising:
receive a telephone call, initiated by a caller device and received at a recipient device, wherein the telephone call is provided by:
encrypting caller identification information; andinitiating the telephone call, said initiating comprising:
providing a voice carrier signal including the caller identification information; andsimultaneously providing a data carrier signal including the encrypted caller identification information; decrypting the encrypted caller identification information at the recipient device; and verifying the identity of at least an unknown caller at the recipient device by one of a list of verifying techniques, the list consisting of:
verifying the authenticity of a certificate used to encrypt the caller identification information; andcomparing the decrypted caller identification information with the caller identification information from the voice carrier signal. |
地址 |
Armonk NY US |