Method and apparatus for identifying a voice caller
First Claim
1. A method for identifying a voice caller in a voice call network including a call originating apparatus and a called party apparatus, the method comprising the steps of:
- forming a trusted user identity comprising an identity label and a cryptographically generated identity key;
initiating a voice call; and
providing the trusted user identity from the call originating apparatus to the called party apparatus.
5 Assignments
0 Petitions
Accused Products
Abstract
A voice call system and a method and apparatus for identifying a voice caller are disclosed. The system includes a call originator apparatus 10 and a called party apparatus 20. At least one trusted user identity is formed at the call originator apparatus 10, ideally in a trusted platform module 12 configured according to a Trusted Computing Platform Alliance (TCPA) specification. The called party apparatus 20 checks the trusted user identity when establishing a new voice call. Advantageously, an identity of the voice caller using the call originator apparatus is confirmed in a reliable and trustworthy manner, even when the voice call is transported over an inherently insecure medium, e.g. an open computing system like the internet 30. Preferred embodiments of the invention use IP telephony, such as SIP (session initiation protocol) or H.323 standard voice telephony.
-
Citations
26 Claims
-
1. A method for identifying a voice caller in a voice call network including a call originating apparatus and a called party apparatus, the method comprising the steps of:
-
forming a trusted user identity comprising an identity label and a cryptographically generated identity key;
initiating a voice call; and
providing the trusted user identity from the call originating apparatus to the called party apparatus. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for identifying a voice caller, for use in a computing network arranged to carry a voice call from a call originating apparatus to a called party apparatus, the method comprising the steps of:
-
forming a user identity at the call originating apparatus, the user identity being a cryptographic identity according to an encryption algorithm; and
initiating a IP telephony voice call, including supplying the user identity from the call originating apparatus to the called party apparatus. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A call originating user apparatus arranged to originate a voice call over a computing network to a called party apparatus, the call originating user apparatus comprising:
-
a call unit arranged to initiate a voice call over the computing network; and
an identity unit arranged to form a cryptographic user identity, and to provide the cryptographic user identity to the called party apparatus. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A called party user apparatus arranged to receive a voice call from a call originating apparatus across a computing network, the called party user apparatus comprising:
-
a call unit arranged to receive an incoming voice call that includes a cryptographically-formed user identity; and
a check unit arranged to cryptographically check the user identity to identify a voice caller. - View Dependent Claims (22, 23)
-
-
24. A voice call system for use in IP telephony, the system comprising:
-
a call originator apparatus adapted to form and send a cryptographic caller identity that includes an identity label and a public identity key, the public identity key being one part of a public key and private key encryption; and
a called party apparatus arranged to receive and check the caller identity, using the public key. - View Dependent Claims (25, 26)
-
Specification