Method, apparatus and computer program product for verifying caller identification in voice communications
First Claim
1. A method for detecting a spoofed call, comprising:
- receiving, by processing circuitry, a request to establish a voice call between communications devices, the request comprising encrypted information, a plaintext identifier identifying a caller associated with the request to establish the voice call, and a time stamp, the encrypted information comprising an encrypted identifier and an encrypted time stamp;
in response to receiving the request, retrieving, by processing circuitry, a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the plaintext identifier;
utilizing, by processing circuitry, the decryption key to decrypt the encrypted information and produce decrypted information that includes a decrypted identifier and a decrypted time stamp;
performing, by processing circuitry, a comparison to determine a similarity between (i) the decrypted identifier and the plaintext identifier and (ii) the decrypted time stamp and the time stamp; and
based on the comparison, providing, by processing circuitry, an indication of whether or not the request is deemed associated with fraud.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for verifying caller identification in voice communications. In one embodiment, there is disclosed a method comprising receiving a request to establish a voice call between communications devices. The request comprising encrypted information and an identifier identifying a caller associated with the request to establish the voice call. The method further comprises retrieving, in response to receiving the request, a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the identifier. The method further comprises utilizing the decryption key to decrypt the encrypted information and produce decrypted information as well as comparing the decrypted information and the identifier to determine a similarity therebetween. The method further comprises providing, based on the comparison, an indication of whether or not the request is deemed associated with fraud.
16 Citations
15 Claims
-
1. A method for detecting a spoofed call, comprising:
-
receiving, by processing circuitry, a request to establish a voice call between communications devices, the request comprising encrypted information, a plaintext identifier identifying a caller associated with the request to establish the voice call, and a time stamp, the encrypted information comprising an encrypted identifier and an encrypted time stamp; in response to receiving the request, retrieving, by processing circuitry, a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the plaintext identifier; utilizing, by processing circuitry, the decryption key to decrypt the encrypted information and produce decrypted information that includes a decrypted identifier and a decrypted time stamp; performing, by processing circuitry, a comparison to determine a similarity between (i) the decrypted identifier and the plaintext identifier and (ii) the decrypted time stamp and the time stamp; and based on the comparison, providing, by processing circuitry, an indication of whether or not the request is deemed associated with fraud. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for detecting spoofed call, comprising:
-
memory; and processing circuitry coupled to the memory, the memory storing instructions which, when executed by the processing circuitry, cause the processing circuitry to; receive a request to establish a voice call between communications devices, the request comprising encrypted information, a plaintext identifier identifying a caller associated with the request to establish the voice call, and a time stamp, the encrypted information comprising an encrypted identifier and an encrypted time stamp; in response to receiving the request, retrieve a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the plaintext identifier; utilize the decryption key to decrypt the encrypted information and produce decrypted information that includes a decrypted identifier and a decrypted time stamp; perform a comparison to determine a similarity between (i) the decrypted identifier and the plaintext identifier and (ii) the decrypted time stamp and the time stamp; and based on the comparison, provide an indication of whether or not the request is deemed associated with fraud. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product for detecting a spoofed call having a non-transitory computer readable medium which stores a set of instructions, the set of instructions, when carried out by processing circuitry, causing the processing circuitry to perform a method of:
-
receiving a request to establish a voice call between communications devices, the request comprising encrypted information, a plaintext identifier identifying a caller associated with the request to establish the voice call, and a time stamp, the encrypted information comprising an encrypted identifier and an encrypted time stamp; in response to receiving the request, retrieving a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the plaintext identifier; utilizing the decryption key to decrypt the encrypted information and produce decrypted information that includes a decrypted identifier and a decrypted time stamp; performing a comparison to determine a similarity between (i) the decrypted identifier and the plaintext identifier and (ii) the decrypted time stamp and the time stamp; and based on the comparison, providing an indication of whether or not the request is deemed associated with fraud. - View Dependent Claims (12, 13, 14, 15)
-
Specification