Authentication method and system for screening network caller ID spoofs and malicious phone calls
First Claim
1. An authentication system for screening network caller ID spoofs and malicious phone calls, comprising:
- a login register interface for inputting a caller telephone number and caller login identification data;
a registry coding module for generating first authentication data, according to preset coding rules, from the input caller telephone number and configured input caller login identification data input, and for storing the first authentication data in a data searching and comparing database; and
a server including;
a data accessing interface for receiving a network calling signal from a caller sending device, the network calling signal including a configured corresponding caller telephone number and a corresponding caller login identification data;
a data searching coding module for generating second authentication data, according to said preset coding rules, from the received network calling signal including the configured corresponding caller telephone number and the configured corresponding caller login identification data;
a data searching and comparing program implemented by a processor in the server for comparing the first authentication data stored in the data searching database and the second authentication data in the received network calling signal; and
a labeling indication program implemented by a processor in the server for sending a failed authentication indication to a callee receiving device if the first identification data does not match the second identification data.
0 Assignments
0 Petitions
Accused Products
Abstract
An authentication method and system for screening network caller ID spoofs and malicious phone calls includes a screening authentication system with a server that includes a login register interface, a data accessing interface, a data searching and comparing program, a data searching database, a labeling indication program, a registry coding module and a data searching coding module. Authentication data is generated by the registry coding module from a caller telephone number and caller login identification data input during registration. Corresponding authentication data contained in a network calling signal from a caller sending device is generated by a data searching coding module. A data searching and comparing program compares the authentication data and, if any discrepancy is found, a labeling indication program sends a “failed authentication” signal to the target network receiving callee so that a fraudulent call is detected.
-
Citations
24 Claims
-
1. An authentication system for screening network caller ID spoofs and malicious phone calls, comprising:
-
a login register interface for inputting a caller telephone number and caller login identification data; a registry coding module for generating first authentication data, according to preset coding rules, from the input caller telephone number and configured input caller login identification data input, and for storing the first authentication data in a data searching and comparing database; and a server including; a data accessing interface for receiving a network calling signal from a caller sending device, the network calling signal including a configured corresponding caller telephone number and a corresponding caller login identification data; a data searching coding module for generating second authentication data, according to said preset coding rules, from the received network calling signal including the configured corresponding caller telephone number and the configured corresponding caller login identification data; a data searching and comparing program implemented by a processor in the server for comparing the first authentication data stored in the data searching database and the second authentication data in the received network calling signal; and a labeling indication program implemented by a processor in the server for sending a failed authentication indication to a callee receiving device if the first identification data does not match the second identification data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 20, 21, 22, 23, 24)
-
-
8. An authentication method for screening network caller ID spoofs and malicious phone calls, comprising the steps of:
-
a. instructing each network calling user to input his/her caller telephone number and configured caller login identification data; b. processing the input caller telephone number and configured caller login identification data to verify proper use of the input telephone number, and generating first authentication data via preset coding rules from the input caller telephone number and the configured input caller identification data, and then storing the first authentication data in a data searching database; c. through the Internet or a telecommunication network, receiving a network calling signal from a caller sending device and extracting a corresponding caller telephone number contained in the network calling signal and corresponding configured caller login identification data also contained in the network calling signal;
sending to the extracted corresponding caller telephone number and extracted configured caller login identification data to a data searching coding module to generate second authentication data according to the same preset coding rules used to generate the first authentication data; and
then comparing the first authentication data stored in the data searching database and the second authentication data generated from the received network calling signal; andd. if any discrepancy between the first authentication data and the second authentication data is found, sending a failed authentication indication signal to a target network receiving callee. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification