Method and system for identifying a user
First Claim
1. A method for deriving the identity of a user, comprising the steps of:
- establishing a first known identity associated with a first user;
storing the first known identity in a database;
receiving information regarding a communication between the first user and a second user;
deriving a second known identity associated with the second user based on the first known identity and the received information regarding the communication with the second user; and
updating the database to store the second known identity in the database;
wherein the first known identity comprises a secret identification number for the first user (SI1) mapped with a public identification number for the first user (PI1); and
wherein the second known identity comprises a secret identification number for the second user (SI2) mapped with a public identification number for the second user (PI2).
4 Assignments
0 Petitions
Accused Products
Abstract
A data server derives information regarding the identities of users placing calls in a circuit-switched communication network. It performs this task by initially establishing at least one known and trusted identity “seed.” The data server uses the trusted identity seed, in conjunction with information regarding calls placed in the circuit-switched communication network, to derive additional user identities. Further, a user device may encrypt its secret identification number before transmitting it to the data server to maintain the secrecy of this information. The data server is additionally configured to modify previously derived identities when the server determines that they have become inaccurate.
97 Citations
31 Claims
-
1. A method for deriving the identity of a user, comprising the steps of:
-
establishing a first known identity associated with a first user;
storing the first known identity in a database;
receiving information regarding a communication between the first user and a second user;
deriving a second known identity associated with the second user based on the first known identity and the received information regarding the communication with the second user; and
updating the database to store the second known identity in the database;
wherein the first known identity comprises a secret identification number for the first user (SI1) mapped with a public identification number for the first user (PI1); and
wherein the second known identity comprises a secret identification number for the second user (SI2) mapped with a public identification number for the second user (PI2). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 26, 27, 28, 29, 30, 31)
accessing the database to determine the identification numbers (SI1, PI1) of the first user based on the received information;
in the case where the first user initiates the call, receiving a message from the second user, the message including an indication of the secret identification number (SI2) of the second user and the public identification number (PI1) of the first user, or, in the case where the second user initiates the call, receiving a message from the first user, the message including an indication of the secret identification number (SI1) of the first user and the public identification number (PI2) of the second user; and
using the information obtained in the accessing and receiving substeps to derive a known mapping between the secret identification number of the second user (SI2) and the public identification number of the second user (PI2).
-
-
6. The method according to claim 1, further comprising the steps of:
-
determining the identity of the second user using another known identity to form an updated identity;
determining whether the updated identity has a higher confidence level than a previously stored identity for the second user; and
storing the updated identity in the database if it has a higher confidence level than the previously stored identity.
-
-
7. The method according to claim 6, wherein the confidence level is at least one of:
-
a distance measure which indicates the number of derivations from a trusted identity to a final derived identity;
oran age measure which indicates the lapse of time since an identity was uncovered.
-
-
8. The method according to claim 1, wherein the establishing, storing, receiving, deriving and updating steps are performed in a data server in a first communication network, and wherein the identities pertain to users of a second communication network.
-
9. The method according to claim 8, wherein the first data network is a packet-switched communication network, and the second network is a circuit-switched communication network.
-
26. The method according to claim 1, wherein the information regarding a communication between the first user and a second user comprises a message from the first user that includes (a) only one of the first user'"'"'s secret identification number and the first user'"'"'s public identification number, and (b) only one of the second user'"'"'s secret identification number and the second user'"'"'s public identification number, such that the message does not include the full identity (SI1, PI1) of the first user and the message does not include the full identity (SI2, PI2) of the second user.
-
27. The method according to claim 1, wherein prior to the step of deriving the second known identity, the database includes no previously-stored known identity for the second user.
-
28. The method according to claim 1, further comprising the step of determining that the derived second known identity pair for the second user conflicts with a previously stored identity pair for the second user, and further comprising the step of selecting between the conflicting identity pairs.
-
29. The method according to claim 1, wherein prior to the receiving step, the database includes a previously-stored first known identity for the first user and a previously-stored second known identity for the second user, and further wherein the deriving step is performed (a) using the previously-stored first known identity to derive an updated second known identity, and (b) using the previously-stored second known identity to derive an updated first known identity, and further comprising the step of selecting between the updated first identity and the updated second identity for updating the database.
-
30. (New) The method according to claim 1, wherein the step of receiving is based on a first call event and the step of deriving is based on a second call event, the first and second call events being associated with the same call undertaken between the first and second users.
-
31. The method according to claim 1, wherein the steps are repeated using the derived second known identity in connection with a communication between the second user and a third user, thereby to derive and update the database with a third known identity for a third user based on the previously-derived second known identity of the second user.
-
10. A system for deriving th e identity of a user, comprising:
-
at least first and second user devices operated by first and second users, respectively;
a data server for providing at least one service to at least one of the first and second users;
a first data network connected to the data server; and
a second communications network providing communication services to the first and second users, wherein the data server includes;
a database; and
a processing unit, wherein said processing unit includes;
establishing logic for establishing a first known identity associated with the first user;
storing logic for storing the first known identity in the database;
receiving logic for receiving information regarding a communication between the first user and the second user;
deriving logic for deriving a second known identity associated with the second user based on the first known identity and the received information regarding the communication with the second user; and
updating logic for updating the database to store the second known identity in the database;
wherein the first known identity comprises a secret identification number for the first user (SI1) mapped with a public identification number for the first user (PI1); and
wherein the second known identity comprises a secret identification number for the second user (SI2) mapped with a public identification number for the second user (PI2). - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
accessing logic for accessing the database to determine the identification numbers (SI1, PI1) of the first user based on the received information;
receiving logic for receiving, in the case where the first user initiates a call, a message from the second user, the message including an indication of the secret identification number (SI2) of the second user and the public identification number (PI1) of the first user or, in the case where the second user initiates the call, receiving a message from the first user, the message including an indication of the secret identification number (SI1) of the first user and the public identification number (PI2) of the second user; and
mapping logic for using the information obtained by the accessing and message receiving logic to derive a known mapping between the secret identification number of the second user (SI2) and the public identification number of the second user (PI2).
-
-
15. The system according to claim 10, wherein the processing unit further includes:
-
determining logic for determining the identity of the second user using another known identity to form an updated identity;
determining logic for determining whether the updated identity has a higher confidence level than a previously stored identity; and
storing logic for storing the updated identity in the database if it has a higher confidence level than the previously stored identity.
-
-
16. The system according to claim 15, wherein the confidence level is at least one of:
-
a distance measure which indicates the number of derivations from a trusted identity and a final derived identity;
oran age measure which indicates the lapse of time since an identity was uncovered.
-
-
17. The system according to claim 10, wherein the identities pertain to users of the second communication network.
-
18. The system according to claim 17, wherein the first data network is a packet-switched communication network, and the second network is a circuit-switched communication network.
-
19. A data server for deriving the identity of a user, comprising:
-
a database; and
a processing unit, wherein said processing unit includes;
establishing logic for establishing a first known identity associated with a first user;
storing logic for storing the first known identity in the database;
receiving logic for receiving information regarding a communication between the first user and a second user;
deriving logic for deriving a second known identity associated with the second user based on the first known identity and the received information regarding the communication with the second user; and
updating logic for updating the database to store the second known identity in the database;
wherein the first known identity comprises a secret identification number for the first user (SI1) mapped with a public identification number for the first user (P1); and
wherein the second known identity comprises a secret identification number for the second user (SI2) mapped with a public identification number for the second user (PI2). - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification