Use of public switched telephone network for authentication and authorization in on-line transactions
First Claim
Patent Images
1. A security enhancing system comprising:
- a telephone network-type communication system and a second system different from the telephone system at least in part;
executable instructions for communicating with a party via the second system;
executable instructions for requesting a telephone number from the party, usable to initiate communications via the telephone system,executable instructions for interrogating at least one database to verify that any provided telephone number is associated with the party;
wherein the interrogating instructions include instructions for carrying out a geographic correlation between a provided telephone number and a geographical identifier associated with the party and subsequent to establishing the geographic correlation, transmitting additional randomly generated confirmatory information to the user via the second system.
6 Assignments
0 Petitions
Reexamination
Accused Products
Abstract
A system for authentication and/or authorization which incorporates two communication channels, and at least one of third-party data sources, geographic correlation algorithms, speech recognition algorithms, voice biometric comparison algorithms, and mechanisms to convert textual data into speech. A site visitor'"'"'s identity can be verified using one or all of such features in combination with a visitors address on one of the channels.
-
Citations
66 Claims
-
1. A security enhancing system comprising:
-
a telephone network-type communication system and a second system different from the telephone system at least in part; executable instructions for communicating with a party via the second system; executable instructions for requesting a telephone number from the party, usable to initiate communications via the telephone system, executable instructions for interrogating at least one database to verify that any provided telephone number is associated with the party; wherein the interrogating instructions include instructions for carrying out a geographic correlation between a provided telephone number and a geographical identifier associated with the party and subsequent to establishing the geographic correlation, transmitting additional randomly generated confirmatory information to the user via the second system.
-
-
2. A system as in claim 1 wherein the geographical identifier comprises a postal zone code associated with the party.
-
3. A system as in claim 2 which includes executable instructions for correlating the postal zone code with a network location, associated with the telephone number, which is part of the telephone system.
-
4. A system as in claim 1 which includes executable instructions for requesting a verbal recitation of prompted data via the network-type communication system, and wherein the system includes executable instructions for recognizing the verbal recitation and using that recognized recitation as entered data from the party.
-
5. A system as in claim 4 wherein the system includes executable instructions for using some or all of the recognized recitation to create a voice biometric.
-
6. A system as in claim 4 wherein the system includes executable instructions for comparing some or all of the recognized recitation to a previously created voice biometric.
-
7. A system as in claim 4 wherein the verbal recitation corresponds to a verbal authorization for a transaction.
-
8. A system as in claim 1 wherein the system includes executable instructions for capturing an audio record of at least a part of an audio interaction for later audit purposes.
-
9. A system as in claim 1 wherein the system includes executable instructions for audibly sending to the party, via the network-type communication system, a selected security credential.
-
10. A system as in claim 9 wherein the selected security credential comprises a personal identifier enabling the party to carry-out a predetermined transaction.
-
11. A security enhancing system comprising:
-
a telephone network-type communication system and a second system different from the telephone system at least in part; executable instructions for communicating with a party via the second system; executable instructions for requesting, via the second system, a telephone number from the party, usable to initiate communications via the telephone system, and executable instructions, responsive to a provided telephone number, for interrogating at least one database to verify that the provided telephone number is associated with the party wherein the interrogating instructions include additional instructions for carrying out a geographical correlation between the provided telephone number and a geographic identifier associated with the party; executable instructions responsive to the results of the geographical correlation for subsequently placing a call, via the telephone network, to the provided and verified telephone number of the party; additional executable instructions to determine that the call has been answered and another communication link has been opened; and which includes executable instructions for forwarding to the party, randomly generated identity confirmatory information.
-
-
12. A system as in claim 11 which includes executable instructions for requesting that the party feedback the identify confirmatory information via the telephone system.
-
13. A system as in claim 12 which includes executable instructions for evaluating the fedback identity confirmatory information.
-
14. A system as in claim 13 which includes executable instructions for evaluating the fedback identity confirmatory information by comparing it to the information forwarded to the party.
-
15. A system as in claim 12 wherein the instructions request a verbal recitation of the identity confirmatory information forwarded via the second system.
-
16. A system as in claim 12 which includes executable instructions for audibly forwarding to the party, via the telephone system, a selected security credential.
-
17. A system as in claim 11 which includes executable instructions for requesting a verbal recitation of prompted data via the network-type communication system, and wherein the system includes executable instructions for recognizing the verbal recitation and using that recognized recitation as entered data from the party.
-
18. A system as in claim 17 wherein the system includes executable instructions for using some or all of the recognized recitation to create a voice biometric.
-
19. A system as in claim 17 wherein the system includes executable instructions for comparing some or all of the recognized recitation to a previously created voice biometric.
-
20. A system as in claim 17 wherein the verbal recitation corresponds to a verbal authorization for a transaction.
-
21. A system as in claim 11 wherein the system includes executable instructions for capturing an audio record of at least a part of an audio interaction for later audit purposes.
-
22. A system as in claim 11 wherein the system includes executable instructions for audibly sending to the party, via the network-type communication system, a selected security credential.
-
23. A system as in claim 22 wherein the selected security credential comprises a personal identifier enabling the party to carry-out a predetermined transaction.
-
24. A security enhancing system comprising:
-
a voice network-type communication channel and a second communication channel different at least in part by providing separate identifying methods for device addressing; executable instructions for accepting a request message to initiate communications with a party from a requesting site; executable instructions for simultaneously communicating with a party via both communication channels; executable instructions for sending real-time randomly generated confirmation data to the party, via one communication channel, and prompting the party to enter the same data via the other communication channel, to ensure the party'"'"'s real-time access to both communication channels; executable instructions for prompting the party to enter additional data based on the request message; and executable instructions for comparing data entered by the party to expected results to verify the accuracy of the entered data and wherein the system includes executable instructions for interrogating at least one database to obtain additional information related to at least one of the communication channels'"'"' device address identifiers wherein the additional information obtained is geographic location information.
-
-
25. A system as in claim 24 wherein communication to the party via one channel is indirect thru the requesting site.
-
26. A system as in claim 24 wherein the entered data is available only to the party and the requesting site.
-
27. A system as in claim 24 wherein the system includes executable instructions for requesting a verbal recitation of the prompted data via the voice communication channel.
-
28. A system as in claim 27 wherein the system includes executable instructions for recognizing the verbal recitation and using that recognized recitation as the entered data from the party.
-
29. A system as in claim 28 wherein the system includes executable instructions for using some or all of the recognized recitation to create a voice biometric.
-
30. A system as in claim 28 wherein the system includes executable instructions for comparing some or all of the recognized recitation to a previously created voice biometric.
-
31. A system as in claim 28 wherein the verbal recitation corresponds to a verbal authorization for a transaction.
-
32. A system as in claim 24 wherein the system includes executable instructions for capturing an audio record of at least a part of an audio interaction for later audit purposes.
-
33. A system as in claim 24 wherein the system includes executable instructions for audibly sending to the party, via the voice communication channel, a selected security credential.
-
34. A system as in claim 33 wherein the selected security credential comprises a personal identifier enabling the party to carry-out a predetermined transaction.
-
35. A security enhancing system comprising:
-
a voice network-type communication channel and a second communication channel different at least in part by providing separate identifying methods for device addressing; executable instructions for accepting a request message to initiate communications with a party from a requesting site; executable instructions for simultaneously communicating with a party via both communication channels; executable instructions for sending real-time randomly generated confirmation data to the party, via one communication channel, and prompting the party to enter the same data via the other communication channel, to ensure the party'"'"'s real-time access to both communication channels; executable instructions for prompting the party to enter additional data based on the request message; executable instructions for comparing data entered by the party to expected results to verify the accuracy of the entered data; wherein the system includes executable instructions for interrogating at least one database to obtain additional information related to at least one of the communication channels'"'"' device address identifiers; and wherein the system includes executable instructions for correlating the additional information related to the device address identifier of the first communication channel with the additional information related to the device address identifier of the second communication channel.
-
-
36. A system as in claim 35 wherein the correlating instructions compares geographic location information related to both of the device address identifiers.
-
37. A system as in claim 36 wherein the geographic identifier associated with the party comprises a postal address.
-
38. A system as in claim 35 which includes executable instructions for requesting a verbal recitation of prompted data via the network-type communication channel, and wherein the system includes executable instructions for recognizing the verbal recitation and using that recognized recitation as entered data from the party.
-
39. A system as in claim 38 wherein the system includes executable instructions for using some or all of the recognized recitation to create a voice biometric.
-
40. A system as in claim 38 wherein the system includes executable instructions for comparing some or all of the recognized recitation to a previously created voice biometric.
-
41. A system as in claim 38 wherein the verbal recitation corresponds to a verbal authorization for a transaction.
-
42. A system as in claim 35 wherein the system includes executable instructions for capturing an audio record of at least a part of an audio interaction for later audit purposes.
-
43. A system as in claim 35 wherein the system includes executable instructions for audibly sending to the party, via the network-type communication channel, a selected security credential.
-
44. A system as in claim 43 wherein the selected security credential comprises a personal identifier enabling the party to carry-out a predetermined transaction.
-
45. A security enhancing system comprising:
-
a voice network-type communication channel and a second communication channel different at least in part by providing separate identifying methods for device addressing; executable instructions for accepting a request message to initiate communications with a party from a requesting site; executable instructions for simultaneously communicating with a party via both communication channels; executable instructions for sending real-time randomly generated confirmation data to the party, via one communication channel, and prompting the party to enter the same data via the other communication channel, to ensure the party'"'"'s real-time access to both communication channels; executable instructions for prompting the party to enter additional data based on the request message; executable instructions for comparing data entered by the party to expected results to verify the accuracy of the entered data; wherein the system includes executable instructions for interrogating at least one database to obtain additional information related to at least one of the communication channels'"'"' device address identifiers; and wherein the additional information obtained is previously stored geographic location information.
-
-
46. A system as in claim 45 wherein the geographic location information of at least one of the communication channels'"'"' device address identifiers is compared to a geographic identifier associated with the party.
-
47. A system as in claim 45 which includes executable instructions for requesting a verbal recitation of prompted data via the network-type communication channel, and wherein the system includes executable instructions for recognizing the verbal recitation and using that recognized recitation as entered data from the party.
-
48. A system as in claim 47 wherein the system includes executable instructions for using some or all of the recognized recitation to create a voice biometric.
-
49. A system as in claim 47 wherein the system includes executable instructions for comparing some or all of the recognized recitation to a previously created voice biometric.
-
50. A system as in claim 47 wherein the verbal recitation corresponds to a verbal authorization for a transaction.
-
51. A system as in claim 45 wherein the system includes executable instructions for capturing an audio record of at least a part of an audio interaction for later audit purposes.
-
52. A system as in claim 45 wherein the system includes executable instructions for audibly sending to the party, via the network-type communication channel, a selected security credential.
-
53. A system as in claim 52 wherein the selected security credential comprises a personal identifier enabling the party to carry-out a predetermined transaction.
-
54. A security enhancing system comprising:
-
a telephone network-type communication system and a second system different from the telephone system at least in part; executable instructions for communicating with a party via the second system; executable instructions for requesting, via the second system, a telephone number from the party, usable to initiate communications via the telephone system, and executable instructions, responsive to a provided telephone number, for interrogating at least one database to verify that the provided telephone number is associated with the party; executable instructions for subsequently placing a call, via the telephone network, to the provided and verified telephone number of the party; additional executable instructions to determine that the call has been answered and another communication link has been opened; and executable instructions for forwarding to the party, via the second system, randomly generated identity confirmatory information.
-
-
55. A system as in claim 54 which includes executable instructions for requesting that the party feedback the randomly generated identify confirmatory information via the telephone system.
-
56. A system as in claim 55 which includes executable instructions for evaluating the fedback identity confirmatory information.
-
57. A system as in claim 55 which includes executable instructions for evaluating the fedback identity confirmatory information by comparing it to the information forwarded to the party.
-
58. A system as in claim 55 wherein the instructions request a verbal recitation of the identity confirmatory information forwarded via the second system.
-
59. A system as in claim 55 which includes executable instructions for audibly forwarding to the party, via the telephone system, a selected security credential.
-
60. A system as in claim 54 which includes executable instructions for requesting a verbal recitation of prompted data via the network-type communication channel, and wherein the system includes executable instructions for recognizing the verbal recitation and using that recognized recitation as entered data from the party.
-
61. A system as in claim 60 wherein the system includes executable instructions for using some or all of the recognized recitation to create a voice biometric.
-
62. A system as in claim 60 wherein the system includes executable instructions for comparing some or all of the recognized recitation to a previously created voice biometric.
-
63. A system as in claim 60 wherein the verbal recitation corresponds to a verbal authorization for a transaction.
-
64. A system as in claim 54 wherein the system includes executable instructions for capturing an audio record of at least a part of an audio interaction for later audit purposes.
-
65. A system as in claim 54 wherein the system includes executable instructions for audibly sending to the party, via the network-type communication channel, a selected security credential.
-
66. A system as in claim 65 wherein the selected security credential comprises a personal identifier enabling the party to carry-out a predetermined transaction.
Specification