METHOD AND SYSTEM FOR AUTHENTICATING TELEPHONE CALLERS AND AVOIDING UNWANTED CALLS
First Claim
1. A method of authenticating a source of a call from a caller to a recipient in a screening service, comprising:
- generating a caller account with the service including registration of a caller identity and registration of a digital signature associated with the caller;
recording the registered caller identity and the digital signature with an authenticator;
intercepting the call by a screener;
receiving a proposed caller identity by the screener from the caller during the call including a phone number associated with the source of the caller;
issuing a challenge by the screener to the caller;
encrypting the issued challenge and the proposed caller identity by the caller using the digital signature;
sending the encrypted challenge and the proposed caller identity from the caller to the authenticator;
decrypting the encrypted challenge and the proposed caller identity at the authenticator and authenticating the source of the encrypted challenge by comparing the digital signature sent with the encrypted challenge against the digital signature registered in the caller account;
forwarding the decrypted challenge and the proposed caller identity to the screener;
verifying the decrypted challenge and the caller'"'"'s registered caller identity match the issued challenge and the proposed caller identity received during the call; and
passing the call to the recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
A service that handles incoming telephone calls without bothering the telephone subscriber is disclosed. The service permits a call to go through to a subscriber if the service determines that the call is not unwanted and the caller has been unauthenticated. The authentication is based on challenging the caller to prove its identity rather than relying on caller ID displays. Prospective callers pre-register with the service providing caller account information. When a caller is issued a challenge, the caller may prove its authenticity by supplying the challenge back to the service along with its registered information.
50 Citations
23 Claims
-
1. A method of authenticating a source of a call from a caller to a recipient in a screening service, comprising:
-
generating a caller account with the service including registration of a caller identity and registration of a digital signature associated with the caller; recording the registered caller identity and the digital signature with an authenticator; intercepting the call by a screener; receiving a proposed caller identity by the screener from the caller during the call including a phone number associated with the source of the caller; issuing a challenge by the screener to the caller; encrypting the issued challenge and the proposed caller identity by the caller using the digital signature; sending the encrypted challenge and the proposed caller identity from the caller to the authenticator; decrypting the encrypted challenge and the proposed caller identity at the authenticator and authenticating the source of the encrypted challenge by comparing the digital signature sent with the encrypted challenge against the digital signature registered in the caller account; forwarding the decrypted challenge and the proposed caller identity to the screener; verifying the decrypted challenge and the caller'"'"'s registered caller identity match the issued challenge and the proposed caller identity received during the call; and passing the call to the recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of authenticating a source of a call from a caller to a recipient in a screening service, including:
-
intercepting the call by a screener; receiving a caller identity by the screener from the caller; verifying that the caller is registered to a phone number shown in the caller identity; issuing a challenge by the screener to the caller and hanging up the call; sending a return phone call from the screener to the caller using the phone number shown in the caller identity; verifying the caller is in possession of the challenge; and passing the caller to the recipient. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer readable medium for authenticating a source of a communication from a sender to a recipient using a screening service, including:
-
software instructions for generating a sender account sender registration service information with the service including registration of a sender identification, a sender communication address a sender public key and a sender private key; software instructions for storing the sender registration information with an authenticator; software instructions for intercepting the communication by using a screener; software instructions for receiving from the sender the sender identification and the sender communication address; software instructions for issuing an electronic challenge from the screener to the sender; software instructions for encrypting the electronic challenge using the sender private key, encrypted by the sender; software instructions for receiving the encrypted electronic challenge by the authenticator from the sender; software instructions for applying the registered sender public key to the sender private key of the encrypted electronic challenge to decrypt the encrypted electronic challenge; software instructions for blocking the communication if the step of applying the registered sender public key to the private key of the encrypted electronic challenge fails to decrypt the challenge; software instructions for forwarding the decrypted electronic challenge to the screener; software instructions for verifying with the screener the decrypted electronic challenge matches the challenge issued by the screener; and software instructions for routing the call to the recipient.
-
-
20. A system for authenticating a source of a telecommunication from a sender sent to a subscriber, comprising:
-
a data bank for storing subscriber information and sender registration data; a screener in electronic intermediate communication between the sender and the subscriber for intercepting the telecommunication, issuing a challenge to the sender and forwarding authenticated telecommunications to the subscriber; an authenticator in electronic communication with the data bank and screener for authenticating the source of the telecommunication by comparing the sender registration data stored in the data bank to an encrypted message transmitted from the sender including the challenge issued by the screener and for forwarding an authentication status to the screener; and telecommunication lines for forming a telecommunication network between the sender, the screener, the authenticator, the data bank, and the subscriber. - View Dependent Claims (21, 22, 23)
-
Specification