Secure messaging
First Claim
1. A computer implemented method for enabling secure communications between computing devices, the method comprising:
- under control of one or more computer systems configured with executable instructions,receiving, at a first computing device associated with an intended receiver, a communication from a second computing device associated with an indicated sender, the communication associated with information about an actual sender of the communication captured by the second computing device at an approximate time of generating the communication, the information including at least one of an image of the actual sender, voice data captured of the actual sender, or typing pattern information of the actual sender;
identifying, using the communication, profile data associated with the indicated sender;
determining a level of similarity between the information of the actual sender and the profile data associated with the indicated sender;
generating a confidence value for the communication based on the level of similarity, the confidence value represents a metric that indicates a likelihood that the actual sender is same as the indicated sender, wherein an increase in the level of similarity corresponds to an increase in the confidence value;
determining the confidence value is less than a threshold value;
receiving additional information about the actual sender;
modifying the confidence value based at least in part on the additional information; and
displaying, by the first computing device, the communication and a graphical indication of the confidence value.
1 Assignment
0 Petitions
Accused Products
Abstract
Approaches are described for securely sending, receiving, or otherwise processing communications between electronic devices. A communication can be received at a computing device (such as a mobile phone). The communication can include information captured about a person initiating the communication such as an image of the user, voice data of the user, typing pattern information of the user, or any other information that can be used to identify the user generating the communication. The information can be compared against profile data (e.g., contact information such as a phone number or name of the sender) associated with or otherwise stored for an indicated sender of the communication to generate a confidence value, where the confidence value can be used to indicate that the person initiating the communication is the indicated sender.
-
Citations
24 Claims
-
1. A computer implemented method for enabling secure communications between computing devices, the method comprising:
-
under control of one or more computer systems configured with executable instructions, receiving, at a first computing device associated with an intended receiver, a communication from a second computing device associated with an indicated sender, the communication associated with information about an actual sender of the communication captured by the second computing device at an approximate time of generating the communication, the information including at least one of an image of the actual sender, voice data captured of the actual sender, or typing pattern information of the actual sender; identifying, using the communication, profile data associated with the indicated sender; determining a level of similarity between the information of the actual sender and the profile data associated with the indicated sender; generating a confidence value for the communication based on the level of similarity, the confidence value represents a metric that indicates a likelihood that the actual sender is same as the indicated sender, wherein an increase in the level of similarity corresponds to an increase in the confidence value; determining the confidence value is less than a threshold value; receiving additional information about the actual sender; modifying the confidence value based at least in part on the additional information; and displaying, by the first computing device, the communication and a graphical indication of the confidence value. - View Dependent Claims (2)
-
-
3. A computer implemented method, comprising:
-
under the control of one or more computer systems configured with executable instructions, receiving, at a first computing device associated with an intended receiver, a communication from a second computing device associated with an indicated sender, the communication including information about an actual sender of the communication captured by the second computing device at an approximate time of generating the communication; identifying, using the communication, data associated with the indicated sender; determining a level of similarity between the information of the actual sender and the data associated with the indicated sender of the communication; generating a confidence value for the communication based on the level of similarity, the confidence value represents a metric that indicates a likelihood the actual sender is same as the indicated sender, wherein an increase in the level of similarity corresponds to an increase in the confidence value; determining the confidence value is less than a threshold value; requesting additional information about the actual sender; modifying the confidence value based at least in part on the additional information; and displaying, by the first computing device, the communication and a graphical indication of the confidence value. - View Dependent Claims (4, 5, 6, 7, 8)
-
-
9. A computing system, comprising:
-
at least one processor; and a memory including instructions that, when executed by the at least one processor, cause the at least one processor to; receive, at a first computing device associated with an intended receiver, a communication from a second computing device associated with an indicated sender, the communication including information about an actual sender of the communication captured by the second computing device at an approximate time of generating the communication; identify, using the communication, data associated with the indicated sender; determine a level of similarity between the information of the actual sender and the data associated with the indicated sender of the communication; generate a confidence value for the communication based on the level of similarity, the confidence value represents a metric that indicates a likelihood the actual sender is same as the indicated sender, wherein an increase in the level of similarity corresponds to an increase in the confidence level; determine the confidence value is less than a threshold value; request additional information about the actual sender; modify the confidence value based at least in part on the additional information; and display, by the first computing device, the communication and a graphical indication of the confidence value. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable storage medium storing one or more sequences of instructions executable by one or more processors to perform a set of operations comprising:
-
receiving, at a first computing device associated with an intended receiver, a communication from a second computing device associated with an indicated sender, the communication including information about an actual sender of the communication captured by the second computing device at an approximate time of generating the communication; identifying, using the communication, data associated with the indicated sender; determining a level of similarity between the information of the actual sender and the data associated with the indicated sender of the communication; generating a confidence value for the communication based on the level of similarity, the confidence value represents a metric that indicates a likelihood that the actual sender is same as the indicated sender, wherein an increase in the level of similarity corresponds to an increase in the confidence value; determining the confidence value is less than a threshold value; receiving additional information about the actual sender; modifying the confidence value based at least in part on the additional information; and displaying, by the first computing device, the communication and a graphical indication of the confidence value. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A computing system, comprising:
-
at least one processor; and a memory including instructions that, when executed by the at least one processor, cause the at least one processor to; generate a communication for an indicated sender associated with a second computing device for delivery to a first computing device associated with an intended receiver, the communication including information about an actual sender of the communication captured at an approximate time of generating the communication; identify, using the communication, data associated with the indicated sender; determine a level of similarity between the information of the actual sender and the data associated with the indicated sender of the communication; generate a confidence value for the communication based on the level of similarity, the confidence value represents a metric that indicates a likelihood that the actual sender of the communication is the indicated sender, wherein an increase in the level of similarity corresponds to an increase in the confidence value; determining the confidence value is less than a threshold value; receiving additional information about the actual sender; modifying the confidence value based at least in part on the additional information; and send the communication and the confidence value to the first computing device to cause the first computing device to display the communication and a graphical indication of the confidence value. - View Dependent Claims (23, 24)
-
Specification