Intermediary device initiated caller identification
First Claim
1. A method for externally identifying a particular incoming caller, said method comprising:
- receiving, at a server external to a trusted telephone network, a request for a caller identity authentication service from said trusted telephone network in response to said trusted telephone network receiving an indication of an incoming call from the particular incoming caller;
prompting said caller to provide identifying information;
receiving, from said trusted telephone network, a voice utterance of said caller at said server through a PBX; and
identifying a caller identity associated with said voice utterance at said server, such that said caller identity is transmittable within said trusted telephone network as an authenticated identity of said caller for said call to reach the PBX;
transferring said caller identity to said trusted telephone network through a secure channel;
wherein the PBX transfers the authenticated identity to a destination device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and program for intermediary device initiated caller identification are provided. A trusted telephone network detects a call initiation connection from an origin device. The trusted telephone network then brokers a connection between the origin device and an external server enabled to perform a caller identity authentication service. A voice utterance for a caller is received at the external server from the origin device. The server authenticates a caller identity associated with the voice utterance and transfer the authenticated caller identity to the trusted telephone network. The trusted telephone network then specifies services available for the call according to a caller profile for the authenticated caller identity.
-
Citations
24 Claims
-
1. A method for externally identifying a particular incoming caller, said method comprising:
-
receiving, at a server external to a trusted telephone network, a request for a caller identity authentication service from said trusted telephone network in response to said trusted telephone network receiving an indication of an incoming call from the particular incoming caller; prompting said caller to provide identifying information; receiving, from said trusted telephone network, a voice utterance of said caller at said server through a PBX; and identifying a caller identity associated with said voice utterance at said server, such that said caller identity is transmittable within said trusted telephone network as an authenticated identity of said caller for said call to reach the PBX; transferring said caller identity to said trusted telephone network through a secure channel; wherein the PBX transfers the authenticated identity to a destination device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for externally identifying a particular incoming caller, said system comprising:
-
a server system communicatively connected to a trusted telephone network by an external network, the server being configured to receive a request for a caller identity authentication service from said trusted telephone network in response to said trusted telephone network receiving an indication of an incoming call from the particular incoming caller; means for prompting said caller to provide identifying information; means for receiving, from said trusted telephone network, a voice utterance of the caller at said server system through a PBX; means for identifying a caller identity associated with said voice utterance, such that said caller identity is transmittable within said trusted telephone network as an authenticated identity of said caller for said call to reach the PBX; and means for transmitting said caller identity to said trusted telephone network as an authenticated identity of said caller for said call; wherein the PBX transfers the authenticated identity to a destination device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product for externally identifying a particular incoming caller, said computer program product comprising a non-transitory computer readable recording medium having stored thereon computer readable instructions which, upon being executed, cause activities to be performed comprising:
-
receiving, at a server external to a trusted telephone network, a request for a caller identity authentication service from said trusted telephone network in response to said trusted telephone network receiving an indication of an incoming call from the particular incoming caller; prompting said caller to provide identifying information; receiving, through a PBX from said trusted telephone network, a voice utterance of said caller at said server system, the server system being communicatively connected to the trusted telephone network via an external network; identifying a caller identity associated with said voice utterance, such that said caller identity is transmittable within said trusted telephone network as an authenticated identity of said caller for said call to reach the PBX; and transmitting said caller identity to said trusted telephone network as an authenticated identity of said caller for said call; wherein the PBX transfers the authenticated identity to a destination device. - View Dependent Claims (21, 22, 23, 24)
-
Specification