SECURE COMMUNICATION SYSTEMS AND METHODS
First Claim
1. A computer-implemented method for determining whether a communication session is authorized, the method comprising:
- initiating a communication session between a first user and a second user;
obtaining an identity attribute associated with a third user engaged in the communication session;
determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute; and
determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for determining whether a communication session is authorized are provided. In some aspects, a method includes initiating a communication session between a first user and a second user, and obtaining an identity attribute associated with a third user engaged in the communication session. The method also includes determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute. The method also includes determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user.
159 Citations
40 Claims
-
1. A computer-implemented method for determining whether a communication session is authorized, the method comprising:
-
initiating a communication session between a first user and a second user; obtaining an identity attribute associated with a third user engaged in the communication session; determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute; and determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus comprising:
-
memory comprising instructions for determining whether a communication session between a first user and a second user is authorized; and a processor configured to execute the instructions to; initiate the communication session; obtain an identity attribute associated with a third user engaged in the communication session; determine whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute; and determine whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user. - View Dependent Claims (21, 22, 23)
-
-
24. A machine-readable medium comprising instructions for a method of determining whether a communication session is authorized, the method comprising:
-
initiating a communication session between a first user and a second user; obtaining an identity attribute associated with a third user engaged in the communication session; determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute; and determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user.
-
-
25. A computer-implemented method for determining identity attribute variations of a user, the method comprising:
-
obtaining an identity attribute of a first user; comparing the identity attribute of the first user to a stored identity attribute of an authorized user who is authorized to engage in a communication session; if the identity attribute of the first user matches the identity attribute of the authorized user, determining that the first user is authorized to engage in the communication session; and if the identity attribute of the first user does not match the identity attribute of the authorized user; flagging the identity attribute of the first user for review by an investigator; receiving verification from the investigator that the flagged identity attribute of the first user is or is not a variant of the identity attribute of the authorized user; and determining that the identity attribute of the first user is the variant of the identity attribute of the authorized user if the verification indicates that the flagged identity attribute of the first user is the variant. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A computer-implemented method for identifying users, the method comprising:
-
obtaining an identity attribute of a first user, the identity attribute of the first user comprising a first behavior; comparing the identity attribute of the first user to a stored identity attribute of a second user, the identity attribute of the second user comprising a second behavior; and determining whether the first user is the second user based on the comparison. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A computer-implemented method for enhancing facial recognition accuracy, the method comprising:
-
initiating, by a first device comprising a camera, an interactive session with a first user; surreptitiously directing the first user to engage in one or more activities in front of the camera such that the first user is positioned at a plurality of different angles relative to the camera; capturing, with the camera, a plurality of images of the first user when the first user is positioned at the plurality of different angles; and using the plurality of images to perform facial recognition of the first user. - View Dependent Claims (37, 38, 39, 40)
-
Specification