Caller identification verification system

Telephonic communications – Audio message storage – retrieval – or synthesis – Voice activation or recognition

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C379S088080, C379S088190, C379S142050, C379S189000, C379S190000, C379S194000, C379S196000, C379S207110, C379S207130

Reexamination Certificate

active

06542583

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of Invention
The invention relates generally to a telecommunications security system for ascertaining the veracity of a user before providing the user with services or access to confidential information. More specifically, the invention involves an automated system for verifying the identity of a caller by posing one or more questions to the caller which relate to information that only a person having rightful access to the services or confidential information would be likely to know.
2. Background
Telecommunications have enabled business to conduct transactions and transfer information at unprecedented speeds. Tools like the telephone and the internet allow parties miles away to conduct business almost as if they were face to face. One shortcoming of conducting business in this fashion, however, is verifying that the other party is indeed who he or she claims to be. Such a verification is important if confidential information is to be revealed or valuable services are to be rendered.
Traditionally, verifying a caller's authenticity was performed by keeping private information on file that a person who has rightful access to the confidential information would be likely to know. For example, if a person called his stock broker to obtain his current balance, he may first provide a customer service representative with his account number. The representative may then ask an open-ended question relating to the private information, for example, “What is your mother's maiden name?” The representative then interprets the caller's response, and compares it with the correct answer to verify the caller's identity. If the caller responds correctly, then the representative can reasonably assume that the caller is authentic, and provide him with the requested confidential information such as an account balance, or perform a service such as transferring funds.
Although this system performs well when a person receives the call and can understand the caller's response, it does not lend itself to automation. An automated system would require sophisticated voice recognition capabilities that may be impractical and perhaps impossible. For example, many voice recognition packages require the system to “learn” the user's voice characteristics and maintain a catalog of sounds. Such extravagant measures are impractical for institutions such as banks or brokerage houses which service thousands of clients.
Therefore, an automated security system in the field of telecommunications is needed that verifies the right of a user to access certain confidential information or services without the need for sophisticated voice recognition packages. The present invention fulfills this need.
SUMMARY OF THE PRESENT INVENTION
The present invention relates to a security method, apparatus and system for verifying the authenticity of a user before providing the user with a desired service or confidential information. In a process embodiment of the invention, a request is received from the user, and then a question set is fetched corresponding to the user. The question set concerns private information that a person having rightful access to the desired services should know. The question set has at least one question and a possible answer or a list of possible answers. The question is then transmitted to the user along with the possible answer(s). After receiving a response from the user, a record is made whether or not the response is correct. A correct response, for example, may correctly identify which answer is correct/incorrect from a list of possible answers, or it may indicate whether or not a possible answer is correct/incorrect. Finally, after a predetermined number of questions are transmitted to the user, a determination is made whether the number of incorrect/correct responses received from the user exceeds a certain limit. It should be understood that since correct and incorrect answers are conversely related, a determination based on one necessarily relates to a determination based on the other. The decision on which one to consider is arbitrary. If the number of incorrect responses exceeds the certain limit, then the user is refused the desired service. On the other hand, if the number does not exceed the limit, then the user is provided with the desired service.
In the preferred embodiments, the present invention employs a number of safeguards against infiltration by an imposter attempting to gain access through trial and error. First, the list of possible answers corresponding to a particular question remains substantially the same each time the question is transmitted to the user. This eliminates the ability to determine the correct answer by monitoring the possible answers and observing which one is consistently provided. Second, the question set contains a multiplicity of questions which decreases the probability of gaining entry by guessing. Third, a determination is made whether to provide or deny the desired services only after the user responds to a predetermined number of questions from the question set (preferably all of them). If the user fails to respond adequately, he is simply denied the desired service—he receives no clue as to which questions were answered correctly or incorrectly. Fourth, the system prevents a computer “hack” from repeated attempts to access the information by implementing a lock condition. In one embodiment, a lock condition results when a user responds incorrectly to a certain number of questions over a predetermined period of time. Once a lock condition is imposed, the user can no longer use the automated system to gain access to the desired services.
The present invention therefore provides a means of automatically ascertaining the authenticity of a user with a high measure of reliability and without the need for sophisticated voice recognition equipment.


REFERENCES:
patent: 4451701 (1984-05-01), Bendig
patent: 4757525 (1988-07-01), Matthews et al.
patent: 5018190 (1991-05-01), Walker et al.
patent: 5125022 (1992-06-01), Hunt et al.
patent: 5276731 (1994-01-01), Arbel et al.
patent: RE34587 (1994-04-01), Crane et al.
patent: 5345549 (1994-09-01), Appel et al.
patent: 5353336 (1994-10-01), Hou et al.
patent: 5499288 (1996-03-01), Hunt et al.
patent: 5517558 (1996-05-01), Schalk
patent: 5594638 (1997-01-01), Iliff
patent: 5692106 (1997-11-01), Towers et al.
patent: 5719560 (1998-02-01), Watkins
patent: 5764275 (1998-06-01), Lappington et al.
patent: 5815665 (1998-09-01), Teper et al.
patent: 5821871 (1998-10-01), Benzler
patent: 5893083 (1999-04-01), Eshghi et al.
patent: 5907597 (1999-05-01), Mark
patent: 5916024 (1999-06-01), Von Kohorn
patent: 6014441 (2000-01-01), Mark
patent: 6292782 (2001-09-01), Weideman

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Caller identification verification system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Caller identification verification system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Caller identification verification system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3001133

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.