Validating automatic number identification data
DCFirst Claim
Patent Images
1. A system, comprising:
- a verification service provider, configured to, using one or more processors;
enroll a first device with the verification service provider, wherein enrolling the first device includes associating, by the verification service provider, the first device with a device fingerprint that is generated based at least in part on a set of configuration information associated with the first device;
store, at the verification service provider, the device fingerprint associated with the first device;
obtain, at the verification service provider, information transmitted by a second device associated with a communications connection;
perform, at the verification service provider, a security determination at least in part by determining whether the obtained information transmitted by the second device matches at least a portion of the stored device fingerprint that was generated based at least in part on the set of configuration information associated with the enrolled first device; and
based at least in part on the security determination, select an action comprising at least one of blocking the communication, requesting additional authentication, and permitting the communication.
0 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Verifying caller identification information is described. A query to verify a first communications connection associated with an observed caller ID is received. Using a second communications channel, a message to a device associated with the observed caller ID is transmitted. A response to the message is received. The message is evaluated to perform a security determination. The security determination is provided as output.
-
Citations
23 Claims
-
1. A system, comprising:
a verification service provider, configured to, using one or more processors; enroll a first device with the verification service provider, wherein enrolling the first device includes associating, by the verification service provider, the first device with a device fingerprint that is generated based at least in part on a set of configuration information associated with the first device; store, at the verification service provider, the device fingerprint associated with the first device; obtain, at the verification service provider, information transmitted by a second device associated with a communications connection; perform, at the verification service provider, a security determination at least in part by determining whether the obtained information transmitted by the second device matches at least a portion of the stored device fingerprint that was generated based at least in part on the set of configuration information associated with the enrolled first device; and based at least in part on the security determination, select an action comprising at least one of blocking the communication, requesting additional authentication, and permitting the communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method, comprising:
-
enrolling a first device with a verification service provider, wherein enrolling the first device includes associating, by the verification service provider, the first device with a device fingerprint that is generated based at least in part on a set of configuration information associated with the first device; storing, at the verification service provider, the device fingerprint associated with the first device; obtaining, at the verification service provider, information transmitted by a second device associated with a communications connection; performing, at the verification service provider, a security determination at least in part by determining whether the obtained information transmitted by the second device matches at least a portion of the stored device fingerprint that was generated based at least in part on the set of configuration information associated with the enrolled first device; and based at least in part on the security determination, selecting, at the verification service provider, an action comprising at least one of blocking the communication, requesting additional authentication, and permitting the communication. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product embodied in a tangible and non-transitory computer readable storage medium and comprising computer instructions for:
-
enrolling a first device with a verification service provider, wherein enrolling the first device includes associating, by the verification service provider, the first device with a device fingerprint that is generated based at least in part on a set of configuration information associated with the first device; storing, at the verification service provider, the device fingerprint associated with the first device; obtaining, at the verification service provider, information transmitted by a second device associated with a communications connection; performing, at the verification service provider, a security determination at least in part by determining whether the obtained information transmitted by the second device matches at least a portion of the stored device fingerprint that was generated based at least in part on the set of configuration information associated with the enrolled first device; and based at least in part on the security determination, selecting, at the verification service provider, an action comprising at least one of blocking the communication, requesting additional authentication, and permitting the communication. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification