Method and system for the secure communication of data
First Claim
1. A remote access system comprising:
- a generating device generating a predetermined signal;
a transmitter transmitting said predetermined signal to a user communication device;
a receiver receiving, from said user communication device, a response signal representing a response of a user of said communication device;
an analyzer determining if said response signal includes a signal substantially identical to said predetermined signal previously transmitted by said transmitter; and
a processor determining if said user is an authorized user based on the results of said determination and at least one other determination made by said analyzer.
3 Assignments
0 Petitions
Accused Products
Abstract
A user-authentication system includes an authorized user device (AUD) for transmission of dtmf tones to a user-verification system (UVS) over a telephone network, where user-verification is performed and authorized users are granted access to a desired service. In a memory module of the AUD, a plurality of passphrases and identifying data are stored for subsequent transmission to the UVS. The UVS includes a memory module for receiving and storing the passphrases and identifying data, and a processor for determining whether user-stated passphrases correspond to the stored passphrases, and for prompting the user with knowledge-based questions and determining whether the identifying data corresponds to answers given by a user in response to the knowledge-based questions. The UVS further includes security safeguards such a transmitter transmitting a signal relating to time while a user is stating a passphrase, to determine whether a user-stated passphrase comprises a previously recorded passphrase, and an analyzer device determining whether the access number used to reach the user-verification system are appropriate for the specific user-device.
-
Citations
27 Claims
-
1. A remote access system comprising:
-
a generating device generating a predetermined signal; a transmitter transmitting said predetermined signal to a user communication device; a receiver receiving, from said user communication device, a response signal representing a response of a user of said communication device; an analyzer determining if said response signal includes a signal substantially identical to said predetermined signal previously transmitted by said transmitter; and a processor determining if said user is an authorized user based on the results of said determination and at least one other determination made by said analyzer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of performing user-verification comprising the steps of:
-
transmitting to a user communication device from a user verification system a signal related to clock time; transmitting from said user communication device to said user verification system, a signal characteristic of a verbal response of a user of said user communication device; determining if said signal characteristic of a verbal response includes said signal related to clock time previously transmitted from said user verification system; and processing the results of said determining step and at least one other determination to determine if said user is an authorized user. - View Dependent Claims (9, 10)
-
-
11. A method of using a user-authentication system to perform password sufficiency screening comprising:
-
receiving a signal at a verification system representing a passphrase stated by a user; determining whether an impairment adversely affecting said signal exists in said communications medium; determining if an audio characteristic of said passphrase stated by a user satisfies predetermined criteria, wherein said predetermined criteria is adjusted in response to the existence of an impairment in said communications medium; and validating said passphrase if said passphrase stated by a user satisfies said predetermined criteria. - View Dependent Claims (12, 13, 14)
-
-
15. A method for performing user-verification comprising:
-
transmitting from a user device a plurality of tone signals, said plurality of tone signals representing a telephone number; receiving said plurality of tone signals at a user-verification system; comparing said plurality of tone signals with stored tone signals previously received, said stored tone signals representing telephone numbers previously used by said user-device; determining if said plurality of tone signals match said stored tone signals; and determining whether a user is an authorized user in response to a match between said plurality of tone signals and said stored tone signals.
-
-
16. The method of claim 16, further comprising the step of:
performing voice verification when said plurality of tone signals do not match said stored tone signals. - View Dependent Claims (17)
-
18. A method for performing user verification comprising:
-
obtaining a user'"'"'s electronic verification file in response to a signal received from a user device, said file comprising data relating to at least one recorded passphrase and data identifying the user; prompting said user to speak a passphrase into a microphone; receiving signals relating to said passphrase at said user verification system; retrieving data relating to prior receipt of signals relating to said passphrase; creating a predetermined degree of match in response to said data relating to prior receipt of said signals relating to said passphrase; determining a degree of match between said data relating to said recorded passphrase and said signals relating to said passphrase; and comparing said degree of match with said predetermined degree of match. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A method of performing user verification comprising:
-
transmitting tone signals from a user device in communication with a user verification system; receiving tone signals at said user verification system, said tone signals representing a number transmitted to reach said user verification system; determining a security level associated with said number; determining whether a degree of noise accompanies said tone signals; and adjusting a stringency requirement for user verification in response to said security level or said degree of noise.
-
-
26. A user-verification system comprising:
-
a storage module storing identifying data relating to a user, said identifying data comprising a plurality of characteristics identifying said user; a processor communicating a query signal to a transmitter; said transmitter in communication with said processor transmitting said query signal to the user, said query signal comprising a prompt to the user to answer a question relating to one of said plurality characteristics; a receiver receiving user-stated information responsive to said query signal; an analyzer in communication with said receiver, comparing said user-stated information with said one of said plurality of characteristics; and a repeater in communication with said analyzer, assigning said one of said plurality of characteristics for a repetition in a successive query signal when said user-stated information does not match said one of said plurality of characteristics. - View Dependent Claims (27)
-
Specification