Method and apparatus for identifying a voice caller

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S177000, C455S412100, C455S412200, C455S415000, C379S142040

Reexamination Certificate

active

07634656

ABSTRACT:
A voice call system and a method and apparatus for identifying a voice caller are disclosed. The system includes a call originator apparatus10and a called party apparatus20. At least one trusted user identity is formed at the call originator apparatus10, ideally in a trusted platform module12configured according to a Trusted Computing Platform Alliance (TCPA) specification. The called party apparatus20checks the trusted user identity when establishing a new voice call. Advantageously, an identity of the voice caller using the call originator apparatus is confirmed in a reliable and trustworthy manner, even when the voice call is transported over an inherently insecure medium, e.g. an open computing system like the internet30. Preferred embodiments of the invention use IP telephony, such as SIP (session initiation protocol) or H.323 standard voice telephony.

REFERENCES:
patent: 5289542 (1994-02-01), Kessler
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5701339 (1997-12-01), Suda
patent: 5724412 (1998-03-01), Srinivasan
patent: 6330670 (2001-12-01), England et al.
patent: 6421439 (2002-07-01), Liffick
patent: 6631182 (2003-10-01), Schwab et al.
patent: 6769060 (2004-07-01), Dent et al.
patent: 2001/0034718 (2001-10-01), Shaked et al.
patent: 2 340 340 (2000-02-01), None
patent: WO 01/54346 (2001-07-01), None
“Building a Foundation of Trust in the PC,”The Trusted Computing Platform Alliance, Jan. 2000.
“Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, Second Edition, 1998.
“Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, 1999.
Trusted Computing Platform Alliance(TCPA)Main Specification, Version 1.0, Jan. 25, 2001.
Yee, B., “Using Secure Coprocessors,” Doctoral Thesis, May 1994.
Internet: <http://softarmor.com/sipwg/drafts/morgue/draft/dcsgrp-sip-privacy-00.txt> Visited: Mar. 27, 2002.
Internet: <http://www.trustedpc.org/home/home.htm> Visited: Mar. 26, 2002.
“Human Factors (HF); User Identification Solutions in Converging Networks,”ETSI Technical Committee Human Factors(HF), ETSI Guide EG 201 940, V1.1.1 (Jan. 31, 2001).
Ramakrishnan, K., et al.,SIP Working Group: Internet Draft, Internet: <http://www.softarmor.com/sipwg/drafts/morgue/draft-dcgroup-sip-privacy-00.txt> (Jun. 12, 2003).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for identifying a voice caller does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for identifying a voice caller, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for identifying a voice caller will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4147266

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.