Method and apparatus for identifying a voice caller
First Claim
1. A method for identifying a voice caller, for use in a computing network arranged to carry a voice call from a call originating apparatus to a called party apparatus, the method comprising the steps of:
- forming a user identity at the call originating apparatus, the user identity being a cryptographic identity according to an encryption algorithm; and
initiating a IP telephony voice call, including supplying the user identity from the call originating apparatus to the called party apparatus,wherein the step of forming a user identity includes obtaining a signature from a privacy certifying authority.
5 Assignments
0 Petitions
Accused Products
Abstract
A voice call system and a method and apparatus for identifying a voice caller are disclosed. The system includes a call originator apparatus 10 and a called party apparatus 20. At least one trusted user identity is formed at the call originator apparatus 10, ideally in a trusted platform module 12 configured according to a Trusted Computing Platform Alliance (TCPA) specification. The called party apparatus 20 checks the trusted user identity when establishing a new voice call. Advantageously, an identity of the voice caller using the call originator apparatus is confirmed in a reliable and trustworthy manner, even when the voice call is transported over an inherently insecure medium, e.g. an open computing system like the internet 30. Preferred embodiments of the invention use IP telephony, such as SIP (session initiation protocol) or H.323 standard voice telephony.
-
Citations
5 Claims
-
1. A method for identifying a voice caller, for use in a computing network arranged to carry a voice call from a call originating apparatus to a called party apparatus, the method comprising the steps of:
-
forming a user identity at the call originating apparatus, the user identity being a cryptographic identity according to an encryption algorithm; and initiating a IP telephony voice call, including supplying the user identity from the call originating apparatus to the called party apparatus, wherein the step of forming a user identity includes obtaining a signature from a privacy certifying authority. - View Dependent Claims (2)
-
-
3. A call originating user apparatus arranged to originate a voice call over a computing network to a called party apparatus, the call originating user apparatus comprising:
-
a call unit arranged to initiate a voice call over the computing network; and an identity unit arranged to form a cryptographic user identity, and to provide the cryptographic user identity to the called party apparatus, wherein the identity unit is arranged to form a trusted user identity comprising an identity label, a public identity key formed as one part of an asymmetric encryption algorithm, and a signature obtained from a privacy certifying authority.
-
-
4. A call originating user apparatus arranged to originate a voice call over a computing network to a called party apparatus, the call originating user apparatus comprising:
-
a call unit arranged to initiate a voice call over the computing network; and an identity unit arranged to form a cryptographic user identity, and to provide the cryptographic user identity to the called party apparatus, wherein the identity unit comprises a TCPA trusted platform module and is arranged to form a trusted user identity comprising an identity label, and a public identity key, the public identity key being formed as one part of an asymmetric encryption algorithm.
-
-
5. A called party user apparatus arranged to receive a voice call from a call originating apparatus across a computing network, the called party user apparatus comprising:
-
a call unit arranged to receive an incoming voice call that includes a cryptographically-formed user identity; and a check unit arranged to cryptographically check the user identity to identify a voice caller, wherein the user identity comprises a user identity label, a public identity key, and a third-party signature, and the check unit is arranged to check the third-party signature using a signature checking key, cryptographically check the public identity key by interrogating the call originating apparatus, and then identify a voice caller with the user identity label.
-
Specification