CN105917631A - Identity reputation - Google Patents
Identity reputation Download PDFInfo
- Publication number
- CN105917631A CN105917631A CN201580004827.2A CN201580004827A CN105917631A CN 105917631 A CN105917631 A CN 105917631A CN 201580004827 A CN201580004827 A CN 201580004827A CN 105917631 A CN105917631 A CN 105917631A
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- communication
- features
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
A method of indicating a reputation of a first user (104) associated with a first user device (102) to a second user (110) associated with a second user device (108), the method comprising: detecting (S502) at the first user device (102) initiation by the first user (104) of a communication event to the second user (110); in response to said detection, capturing (S504) one or more characteristics of said first user (104) at the first user device (110); and transmitting (S506) a request to establish a communication event to the second user (110), the transmitted request including an indication of an asserted identity of the first user (104) and information relating to the captured one or more characteristics of said first user (104) such that the second user (110) can make an assessment as to the likelihood that the first user (104) is validly correlated with the asserted identity.
Description
Background technology
Financial institution, communal facility and government organs often there is a need to by public communication network (typical case
Ground is public switch telephone network (PSTN)) interact with people (typically consumer).
Meanwhile, these mechanisms thirst for handling with people that (i) attested and/or the affairs of (ii) non-repudiation
(such as, bank transfer, account inquiries, bill change or other requirements are to secret (the most legally
It being controlled, control or similar) information carries out disclose or require ' known ' side in communicating
The affairs of action of mandate.
Currently, such as bank use various means to identify when participating in these public network, confirm and
Authorize transaction, including personal identification number (PIN), password, security token, Given information etc..
These mechanism are that the user of service brings inconvenience, expense and/or potential fault, differ simultaneously
Fixed safety as mechanism wants.
Summary of the invention
Inventors have realised that communication, especially voice and video communication, provide sanction for service
Determine the chance of calling party's probability the most relevant to the identity that calling party is claimed.
One side according to the disclosure, it is provided that a kind of to the second use being associated with the second subscriber equipment
The method of the reputation of the first user that family instruction is associated with first user equipment, described method includes:
At first user equipment, the instruction of communication event is initiated in detection about first user to the second user;Ring
Detect described in Ying Yu, at first user equipment, capture one or more features of described first user;
And the request setting up communication event is sent to the second user, the request sent includes about first
The instruction of the alleged identity of user and be related to one or more features of described first user of capture
Information so that the probability that first user is the most relevant to alleged identity can be done by the second user
Go out assessment.
In one embodiment, the communication customer end performed on the first user device performs said method
Step, the request setting up communication event is sent to the by communication network by wherein said communication customer end
Two subscriber equipmenies, the request of transmission includes one or more features of the first user of capture.
In another embodiment, the communication customer end performed on the first user device performs detecting step
With capture step, described communication customer end by the instruction of the alleged identity about first user and with capture
The relevant information of one or more features of first user be sent to decide module, wherein the method is entered
One step includes deciding that module estimates the probability that first user is the most relevant to alleged identity, and will
The request setting up communication event is sent to the second user, and the request of transmission includes about the probability estimated
Instruction.
Ruling module can on the first user device, on described second subscriber equipment, or described
Realize on the network entity of communication network.
According to an aspect of this disclosure, it is provided that a kind of computer program, described computer program
Product is implemented in non-transitory computer-readable medium and is configured to when performing on processor device real
Execute the method performed by ruling module as herein described.
This summary of the invention is provided for introducing in simplified form the selected works of concept, below specifically
Will be described with in bright.This summary of the invention is not intended to determine the key feature of theme required for protection
Or key character, also it is not intended to the scope for limiting claim theme.
Accompanying drawing explanation
In order to be better understood from the disclosure, and it is shown to how the disclosure to be put into practicality, now
By way of example with reference to accompanying drawing, in the accompanying drawings:
Fig. 1 shows communication system;
Fig. 2 shows the schematic diagram of user terminal;
Fig. 3 be the user for establishing communication system feature in case ruling during use process
Flow chart;
Fig. 4 is the flow chart for deciding process;
Fig. 5 is the flow chart for communication event elaboration process;And
Fig. 6 is the flow chart of resisting denying (non-repudiation) process.
Detailed description of the invention
Describe the most by way of example now and embodiment of the disclosure.
Fig. 1 shows that communication system 100, communication system 100 include relevant to first user terminal 102
The first user 104 (user A) joined and the second user 110 being associated with the second user terminal 108
(user B).User terminal 102 and 108 can be led to by the network 106 in communication system 100
Letter, thus allow user 104 to communicate each other by network 106 with 110.User terminal 102 is permissible
It is that such as mobile phone, personal digital assistant (" PDA "), personal computer (" PC) (include such as
WindowsTM、Mac OSTMAnd LinuxTMPC), game station or be connectable to network 106
Other embedded device.The user 104 that user terminal 102 is arranged to from user terminal 102 receives
Information and output information are to the user 104 of user terminal 102.
Network 106 can be to possess between offer first user terminal 102 and the second user terminal 108
Any applicable network of ability of communication port.Network 106 can be that circuit-switched network is (all
Such as PSTN or cellular network), packet switching network (such as the Internet or High Data Rate mobile network,
The such as third generation (" 3G ") mobile network) or combinations thereof.
Communication system including packet switching network enables the user of equipment to enter on a packet switched network
Lang sound or video call.This communication system includes internet voice or video protocols (VoIP) system.
These systems are of value to user, because they often have than conventional fixing circuit or mobile cellular net
The cost that network is the lowest.This especially true for long haul communication.For using VoIP system, user
Client software is installed on their equipment and performs this client software.Client software is arranged
VoIP connects and provides other function of such as user's registration.In addition to voice communication, client
May be provided for the connection of other communication media, such as Transit time flow meter (" IM "), SMS
Message transmission, file transmission and voice mail.
Below with reference to the communication event carried out on a packet switched network to describe embodiment, but, as
It is described in more detail below, embodiment of the disclosure and be not limited to any certain types of network.
In order to communicate event on a packet switched network, user terminal 102 perform by with communication system
The communication customer end that the software supplier that system 100 is associated provides.Communication customer end is made by user
The software program that native processor in terminal 102 performs.Client executing is at user terminal 102
Required process is so that subscriber equipment 102 is sent by communication system 100 and receives data.Such as this
Known to field, at user terminal 102 perform client can by digital certificate present (example
As, it was demonstrated that user 104 is that the real subscriber of communication system is more detailed in WO 2005/009019
Illustrate) and be proved with communication system communication.
Subscriber equipment 108 can correspond to user terminal 102.Subscriber equipment 108 can be at processing locality
Perform on device and the communication customer end corresponding to communication customer end of execution at user terminal 102.With
Client at family equipment 108 is with the client executing at user terminal 102 for allowing user 104 warp
Performed to be to allow user 110 warp by the network 106 identical mode of the mode of required process that communicates
Communicated required process by network 106.User terminal 102 and 108 is the end points in communication system.
Fig. 1 is clearly to illustrate only two users (104 and 110) and two user terminals (102 and 108),
User and subscriber equipment but more can be included in communication system 100, and may utilize accordingly
Subscriber equipment on perform corresponding communication customer end communicate via communication system 100, such as ability
Known to territory.
Fig. 2 shows the detailed view of user terminal 102, for via communication system 100 communication
Communication customer end performs on user terminal 102.User terminal 102 includes CPU
(" CPU ") 202, connects this CPU and has: the display 204 of such as screen or touch screen,
The input equipment of such as keypad 206 and video camera 208.Output audio frequency apparatus 210 (such as, is raised one's voice
Device) and input audio frequency apparatus 212 (such as, mike) be connected to CPU 202.Display 204,
Keypad 206, video camera 208, output audio frequency apparatus 210 and input audio frequency apparatus 212 can be integrated in use
In family terminal 102, as shown in Figure 2.In the user terminal of alternative, display 204, keypad 206,
Video camera 208, output audio frequency apparatus 210 and input audio frequency apparatus 212 in one or more can not
It is integrated in subscriber equipment 102, but CPU 202 can be connected to via corresponding interface.So
An example of interface be USB interface.CPU 202 is connected to the network of such as modem and connects
Mouth 224 is for communicating with network 106.Network interface 224 is desirably integrated in user terminal 102,
As shown in Figure 2.In the user terminal of alternative, network interface 224 is not integrated into subscriber equipment 102
In.User terminal 102 also includes the memorizer 226 for storing data, as known in the art.Deposit
Reservoir 226 can be permanent type memorizer, such as ROM.Memorizer 226 can be interim as an alternative
Memorizer, such as RAM.
Fig. 2 also show the operating system (" OS ") 214 being implemented on CPU 202.At OS 214
On run be the software stack 216 applied for communication customer end mentioned above.Software stack shows
I/O layer 218, client engine layer 220 and client user interface layer (" UI ") 222 are shown.
It is responsible for concrete function for every layer.Because every layer generally communicates with two other layers, so they are considered
It is arranged to storehouse as shown in Figure 2.Operating system 214 manages the hardware resource of computer and processes
Send whereabouts via network interface 224 and carry out the data of automatic network 106.I/O layer 218 include audio frequency and
/ or Video Codec, it receives the encoding stream of input and by they decodings so that suitably output is to raising
Sound device 210 and/or display 204, and receive uncoded from mike 212 and/or video camera 208
Audio frequency and/or video data and using they codings to be sent to other of communication system 10 as stream
End user terminal.Client engine layer 220 processes the connection management merit of VoIP system as above
Can, such as by calling or other connection with confirming to establish based on server or P2P address search.
Client engine can also be responsible for other miscellaneous function the most do not discussed.Client engine layer 220
Also communicate with client user interface layer 222.Client engine layer 220 may be disposed to control client
User interface layer 222 via client shown on display 204 user interface by information in
Now give the user of user terminal 200 and receive from the user of user terminal 200 via user interface
Information.
Returning Fig. 1, communication system 100 includes deciding module 112.Fig. 1 shows ruling module 112
Real for coming by the network entity 122 (such as, server or other network node) in network 106
Existing.But, as further described, ruling module 112 is not limited to realize by this entity.
When user A 104 performs communication customer end and to the software supplier's registration providing communication customer end
Time, user A is provided user account and therefore uses with other ID to communication system 100
The unique identifier of family A is associated.Unique identifier can be e.g. to providing communication customer end
In the enrollment process of software supplier, user A elects as himself to other user of communication system 100
The user name identified or the e-mail address used in enrollment process.Once user A has
User account, user A can (that is, the client in enrollment process be used by input user certificate
The password of name in an account book and association is arranged) and access the repertoire of communication customer end.Such as, user A energy
Enough other user's dial-out calls to communication system 100 and other user of reception communication system 100
Calling.
Third party in addition to user A claims that they are user A and the user to communication system 100
Dial-out call is possible.Such as, if third party reaches out for the user certificate of the account of user A,
If or third party access user A conduct interviews by user terminal, and keep login user
The account of A, then can occur this situation.
Receive the communication of the understanding user A of the calling of calling party from the account identity claiming user A
The user (that is, for friend, coml acquaintance, kinsfolk etc.) of system 100 can be led to
The appearance (video call) of the mode (audio call) and/or calling party of crossing calling party's speech judges
Calling party whether user A.
This point is when callee can not determine user A by the speech and/or appearance that identify user A
It is impossible.For bank, financial institution, communal facility and government organs etc. it is of particular importance that
Can confirm that before participating in any transaction with calling party or other activity calling party is exactly calling party institute
That people said.
Inventors have realised that when certain user (the such as bank and other gold of communication system 100
Melt mechanism, communal facility and government organs etc.) receive from the calling party's claiming particular account identity
During phone, desirably can protect against known confirmation mentioned above for these callees
Confirm during the defect of method that calling party is exactly that people described in calling party.
Fig. 3 is to establish the specific user for communication system 100 (i.e., by what ruling module 112 realized
User A) feature record in case ruling during use process 300.
In step s 302, the communication customer end that ruling module 112 performs at user terminal 102
(this is at Fig. 1 to receive one or more features of the unique identifier that is associated with user A and user A
In be expressed as data stream 116).
One or more features of user A can include such feature, its can directly associate with
The unique identifier that user A is associated.Such as, the means being suitable at user terminal 102 are utilized
The biometric information of the user A of capture can be supplied to ruling module 112.
Biometric information can take various forms.Such as, biometric information can include that utilization is touched
Touch the fingerprint of user A that the fingerprint scanner (not shown in Fig. 2) of screen 204 or special obtains.Raw
Thing metrical information can include the eye scanning of the user A captured by video camera 208.Biometric is believed
Breath can include the vocal print (voiceprint) utilizing mike 212 to obtain at user A.
Biometric information can also include the Facial measurement of the user A utilizing video camera 208 to capture
(that is, the distance between the eye of user A, nose and mouth).It is understood that at user terminal
102 capture and be supplied to ruling module 112 biometric information can include those skilled in the art
Other form known, that do not mention herein.
The communication customer end performed in user terminal 102 can include such function: processes capture
The biometric information of user A so that measure (measurements) and be used for being sent in one
The form of ruling module 112.Alternatively, the communication customer end performed at user terminal 102 is permissible
Special biometric on indicating user terminal 102 processes resource and processes the biometric letter of capture
Cease and this biometric information transferred to communication customer end to be sent to decide module 112.
One or more features of user A can include such feature, its can indirectly associate with
The unique identifier that user A is associated.These ' indirectly ' features are relevant with the activity of user's A account.
Such as, ' indirectly ' feature can include user terminal 102 for accessing user's A account type,
It is used for accessing the IP address of the user terminal 102 of user's A account and is related to user's A account interviewed
The information of the time (time of day) in one day asked.
Step S302 can be implemented as the part that concrete " disposably " register.Such as, user is worked as
A is when the software supplier's registration providing communication customer end, and one or more features of user A can quilt
Capture and be sent to decide module 112.As an alternative or additionally, whenever user's A account on one's own initiative
It is used for when the telex network of communication system 100, step S302 can be triggered.
In step s 304, ruling module 112 by the unique identifier associated with user A with receive
User A feature association.
Ruling module 112 has access right to data-storing 114.Data-storing 114 is at user terminal
102 and user terminal 108 outside.Such as, (example during data-storing 114 can be positioned at communication network 106
As, data-storing 114 can be based on cloud, and thus data are stored in one or more physical location
On multiple calculating equipment at place), or in callee's (i.e. bank, financial institution, communal facility, political affairs
Mansion mechanism etc.) place in.
In step S306, ruling module 112 by the unique identifier that user A associates and relevant
The feature of connection is sent to data-storing 114 to store.
Whenever the account of user A is used to trigger step S302 with the telex network of communication system 100
Time, this makes to decide that As time goes on module 112 can build and associate user A valuably
The bigger data corpus (set of feature) that is associated of unique identifier.As from the description below
Ruling process is obvious, bigger data corpus allow for more reliable abnormality detection and because of
This provides effectively relevant to the identity that this user the claims probability of user for initiating communication event
Decide more accurately.
Such as, by receiving user when the account of user A is used for communicating via communication system 100
The biometric information of A, ruling module 112 can build biometric letter in data-storing 114
Breath storage.It is understood that capture biometric information can with time to time change because
Only example of the voiceprint of the user A of the different time capture in a day can change, if
When capture, user A has on glasses then eye scanning information and can change, and along with the ageing use of user A
The Facial measurement of family A can time to time change.Feature is gathered, with user A by elapsing in time
The set of relevant more complete biometric information can be stored in data-storing 114.Similarly,
By receiving for accessing user's A account when user's A account is used for communicating via communication system 100
The type of the user terminal 102 at family, ruling module 112 can determine about user A most-often used
The information of the type of user terminal and storing that information in data-storing 114.In another example,
Receive for accessing user's A account by being used for communicating via communication system 100 whenever user's A account
The IP address of the user terminal 102 at family, ruling module 112 can determine about user A most-often used
The information of IP address of user terminal and store this information.
Therefore, it is increasingly used to communicate via communication system 100 along with user's A account, it is possible to
Gathering more accurately of the feature that acquisition is associated with the unique identifier associating user A.
If in step s 302 ruling module 112 from (associating user A's) unique identifier
User terminal outside the predetermined tolerance of the biometric information stored in the data-storing 114 being associated
The communication customer end performed at 102 receives unique identifier and the biometric letter of association user A
Breath, then ruling module 112 can determine that the biometric information received at step S302 is abnormal.
For any abnormal biometric information, process 300 terminates (not going on step S304).
Such as, if the child of user A accesses user terminal 102 that user A accessed and keeps logining use
The account of family A, then can occur this situation.
The precision of one or more features of the user A being stored in data-storing 114 can be according to them
The date and/or the time that are received in ruling module 112 or data-storing 114 make marks, its
In the feature that receives closer to the phase to be marked as feature of other storage than user A more accurate.
Although describing process 300 above with reference to user A, but it is understood that process 300 can
Other user for communication system 100 realizes and makes data-storing 114 store communication system 100
The account identity of multiple users and the feature of association.
With reference now to the ruling process 400 shown in Fig. 4, first embodiment is described.
Calling party at calling party device (such as, user terminal 102) place is with called party instrument (such as,
User terminal 108) place callee between real-time communication event during, it is achieved process 400.In real time
Communication event can include but not limited to: and audio call (during this audio call, voice data energy
Enough exchanges between user terminal 102 and user terminal 108), or video call is (at this video
During calling, Voice & Video data can exchange between user terminal 102 and user terminal 108),
File transmission and Transit time flow meter (IM) dialogue.During real-time communication event, user
The media data transmitted between terminal 102 and user terminal 108 is in FIG as data stream 120 quilt
Represent.
Term " calling party " is used to refer to the user of generation initiation communication event, and term " callee " be used for
Referring to the recipient of communication event, these terms are not intended to be limited to any certain types of communication event.
In step S402, ruling module 112 is from the communication customer end being implemented in user terminal 102
Receive about being used for establishing the alleged identity of the calling party of the communication event with called party instrument (with user A
The unique identifier being associated) instruction (this is expressed as data stream 116 in FIG).
It is understood that calling party can be user A or the user A that disguises oneself as user (rather than use
Family A).
In step s 404, ruling module 112 receives one or more features of calling party.Calling party
One or more features can receive from the communication customer end that is implemented in calling party device.Such as, cut out
Cover half block 112 can receive the most one or more from the communication customer end being implemented in calling party device:
The biometric information of calling party, calling party visit from the communication customer end being implemented in user terminal 102
Ask that the IP address of user's terminal that A account is used, calling party are from being implemented in user terminal 102
Communication customer end accesses the type of terminal that user's A account is used, and user terminal 102 with use
Family terminal 108 sets up the time in one day of calling.
Being understandable that after step S402 and S404, process 300 is by ruling module 112
Perform.
In step S406, ruling module 112 use the alleged identity about calling party instruction (
Step S402 receives) to inquire about data-storing 114 and to fetch and utilize above-mentioned process 300 to deposit
Store up one be associated with (being associated with user A) unique identifier in data-storing 114
Or multiple feature.
In step S408, the feature of calling party that ruling module 112 will receive in step S404
Uniquely identify with (being associated with user A) with fetch from data-storing 114 in step S406
The feature that symbol is associated compares, the possibility effectively relevant to alleged identity to estimate first user
Property.Ruling module 112 perform algorithm with to the feature of the calling party detected in step s 404 with
Step S406 is fetched from data-storing 114 with (being associated with user A) unique identifier phase
Related levels between the feature of association makes evaluation of algorithm.This algorithm provide be given about calling party with
Statistics output (that is, probability) of the estimation of the probability that alleged identity is correlated with effectively.Statistics is being provided
During output, this algorithm can by fetch from data-storing 114 with (being associated with user A) only
The feature that one identifier is associated has and accounts for the most in the recent period.For performing the algorithm of this evaluation of algorithm
It is well known to the skilled person and the most not the most discussed in further detail.
In step S410, ruling module 112 is by about instruction " calling party and the sound estimating probability
Fit part is correlated with effectively ", it is sent to user terminal 108 (this is expressed as data stream 118 in FIG).
This instruction can include the primary statistics output of algorithm, so that ruling module 112 is by calling party
The probability the most relevant to the identity that calling party claims is sent to callee.As an alternative, this instruction can
With include that the identity claimed to calling party about calling party is the most relevant or calling party not with caller
The instruction (that is, this instruction is expressed with absolute term) that the identity that side is claimed is correlated with effectively.Such as,
If ruling module 112 determines that the statistics provided by algorithm output exceedes predetermined threshold, then decide module
112 instructions that can send " identity that calling party is claimed is the most relevant " to calling party, otherwise cut out
Cover half block 112 can send the finger of " identity that calling party is not claimed is the most relevant " to calling party
Show.
When receiving instruction " calling party is the most relevant to alleged identity " about estimation probability,
The communication customer end performed at user terminal 108 can utilize on display 204 shown
The user interface of the communication customer end performed on called party instrument is come should to callee (user B) display
Instruction.
To the instruction " calling party is the most relevant with alleged identity " how drawn about estimation probability
Relevant information can be sent collectively to called party instrument with about the instruction estimating probability.Such as, with
Ruling module 112 is used for providing to be given being related to the probability that calling party is the most relevant to alleged identity
The relevant information of special algorithm of statistics output (that is, probability) of estimation can be together with about estimation
The instruction of probability is sent collectively to called party instrument.
If according to above-described embodiment it is understood that user A accesses account and the calling finance of himself
Mechanism (that is, bank), then user A be not prompted to enter pin code or recall true (such as mother's
Birth name, first automobile etc.), but financial institution is provided about calling party (user A) with main
The instruction of the high likelihood that the identity that the side of crying claims during communication event is correlated with effectively.Therefore, logical
Crossing suitable degree of trust and determine calling party (user A) to financial institution, this makes user A and finance
Transaction can be concluded between mechanism, and there is no the inconvenience of password, answer safety problem etc..
The feature of the calling party received at step S404 and in step S406 from data-storing 114
The feature that (being associated with the user A) unique identifier fetched is associated can also be together with about estimating
The instruction " calling party is the most relevant to alleged identity " of meter probability is sent collectively to called party instrument
(user terminal 108).Then, the arbitration at called party instrument can use the information to right
The probability that calling party is the most relevant to alleged identity makes himself independent estimations.Such as, called
Method, apparatus can perform himself algorithm and provide that to provide calling party the most relevant to alleged identity
Statistics output (that is, probability) of the estimation of probability.
On calling party device perform communication customer end can by be used for set up communication event about master
The instruction (unique identifier being associated with user A) of the alleged identity of the side of crying and the one of calling party
Individual or multiple features, setting up from communication event, it is sent at a predetermined interval decide module 112.
Additionally or alternatively, it is sent to calling party's in response to during communication event from callee
Challenge (that is, safety problem), the communication customer end performed on calling party device may determine that for building
Instruction (the unique mark being associated with user A of the alleged identity about calling party of vertical communication event
Symbol), and one or more features of calling party, and send those to decide module 112.
During communication event, this of the feature of calling party persistently monitors and guarantees that identical user keeps existing
During communication event.
With reference now to the communication event shown in Fig. 5, set up process 500 and describe the second embodiment.
In step S502, at calling party device, detect that caller direction callee initiates communication event.
Such as, the communication customer end performed on calling party device can be by detection calling party via in caller
One or more users that on the display 204 of method, apparatus, the client user interface of display is made select
Detect the initiation of communication event.
In step S504, at calling party device, capture one or more features of calling party.Such as,
The communication customer end performed on calling party device can utilize applicable outut device to point out calling party
(such as, use the audible prompting of speaker 210 or use the visual cues of display 204), makes
Communication customer end via applicable input equipment (such as, display 204, special fingerprint scanner,
Video camera 208 or mike 212) capture biometric information.Can be by calling party device
The communication customer end performed automatically captures other feature (equipment of such as calling party device of calling party
Type information, the IP address of calling party device and the information of the time in one day).
In step S506, the request setting up communication event is sent to callee, the request bag of transmission
Include the instruction of the alleged identity about calling party and the letter relevant with one or more features of capture
Breath.
In the first implementation, step S506 is come real by the communication customer end performed on calling party device
Existing.That is, the communication customer end performed on calling party device will be set up logical via communication network 106
The request of letter event is sent on called party instrument the communication customer end performed.In this example, send out
The request sent includes the instruction (unique identifier being associated with user A) of the alleged identity of calling party
And one or more features of capture itself.On called party instrument perform communication customer end with
The user certificate of family A is learnt, after being transfused to, the unique identifier being associated with user A thus is accessed communication
System 100.
Therefore, in an aspect of this disclosure, it is provided that following a kind of method: with first user phase
Described first user is detected to second be associated with the second subscriber equipment at the first user equipment of association
User initiates communication event;In response to described detection, at first user equipment, capture first user
Biometric information;And the request setting up communication event is sent to the second user, the request of transmission
Including the instruction of the alleged identity about first user and the biometric of the capture of described first user
Information.
In this first implementation, the request of the enhancing setting up communication event is sent to callee and sets
Standby, and without reference to ruling module 112, because this request includes additional data (one or more captures
Feature).This additional data can be made for the most relevant to alleged identity to calling party by callee
Probability make assessment.
In the second implementation, the request setting up communication event is logical from perform on calling party device
Letter client is sent to decide module 112.
The communication customer end performed from calling party device is sent to decide the foundation communication thing of module 112
The request of part includes the instruction (unique identifier being associated with user A) of the alleged identity of calling party.
Referring back to ruling process 400, set up asking of communication event it can therefore be seen that receive from step S402
Asking, ruling module 112 receives the alleged identity (unique identifier being associated with user A) of calling party.
In step s 404, the communication customer end that ruling module 112 performs from user terminal 102 comes
Receive one or more features of the capture of calling party.Can be logical perform on user terminal 102
The communication event foundation received in letter client receives the one or more of the capture of calling party in asking
Feature.It is alternatively possible to from user terminal 102 in the message independent of the request setting up communication event
The communication customer end of upper execution receives one or more features of calling party.
Ruling module 112 performs step S406 as above and S408 subsequently.
In step S410, the instruction of the probability of estimation is sent to callee by ruling module 112,
Make callee the probability that calling party is the most relevant to alleged identity can be made assessment.Upper
Stating in implementation, this is to be sent to the request setting up communication event at quilt by ruling module 112
The communication customer end performed on method, apparatus is made to realize, the request (sending from ruling module 112) of transmission
Including about the instruction " calling party is the most relevant to alleged identity " estimating probability.
Describe about the shape estimating that the instruction of probability may be taked above with reference to first embodiment
Formula, is not repeated the most herein.
The foundation communication of the communication customer end performed it is sent on called party instrument from ruling module 112
The request of event can additionally include and how draw about instruction " calling party and the sound estimating probability
Fit part is correlated with effectively " relevant information.Such as, it is related to decide that module 112 is for being supplied to
The statistics of the estimation going out the probability the most relevant to alleged identity about calling party exports (i.e., generally
Rate) information of special algorithm that used can be sent on called party instrument from ruling module 112
The request setting up communication event of the communication customer end performed is supplied.
Additionally, one or more captures of calling party that ruling module 112 receives in step s 404
Feature and at step S406 from data-storing 114 fetch be associated with unique identifier (with
User A is associated) feature can also together with about estimate probability instruction " calling party with claim
Identity is correlated with effectively " it is sent collectively to called party instrument (user terminal 108).At calling party device
The arbitration at place then can use the information to the possibility the most relevant to alleged identity to calling party
Property makes himself independent estimation.
The communication customer end performed at calling party device can utilize the use shown on display 204
At family terminal 108 perform communication customer end user interface by set up communication event request and
It is shown to callee about the instruction " calling party is the most relevant to alleged identity " estimating probability (use
Family B).
It is therefore to be understood that this second implementation provides the enhancing request setting up communication event,
Because this request include can by callee make for calling party the most relevant to alleged identity can
Energy property makes the additional data of assessment.
If user A accesses account and calling financial institution (such as, bank) of himself, even
Before accepting calling, financial institution is provided of claiming about calling party (user A) and calling party
The instruction immediately of the high likelihood that identity is correlated with effectively.Therefore, with suitable degree of belief to finance machine
Structure determines user A, and this makes it possible to conclude transaction between user A and financial institution, and the closeest
The inconvenience such as code, safety problem answer.
In two realizations described by the second embodiment, if callee accepts to set up communication event
Request, then process 400 can perform to guarantee during communication event calling party still with calling party institute
The identity claimed is effectively relevant (such as, it is ensured that identical user remains resident in calling).
Feature mentioned above can be considered in the sense that they have quantitative values identity reputation " to
Amount ", and decide that they segmentations can be strengthened by module 112 by the recipient according to communication event
Feature.Second dimension is increased to the feature of storage in data-storing 114 by this.That is, data-storing
" inclusive " features of whole communication events that 114 storage user A are initiated and do not consider recipient
(total data corpus), and also a storage user A specific user to communication system or a group
" exclusiveness " feature (subset of total data corpus) of Client-initiated communication event.In process
In 400, recipient based on calling, ruling module 112 can be fetched and is stored in step S406
The whole inclusive features being associated with calling party in data-storing 114.Alternatively, ruling module
112 can fetch the current communication event during calling party is stored in data-storing 114 in step S406
Recipient obtain from previous communication events and (or include one group of use of the recipient of current communication event
Family obtains from previous communication events) whole particularistic perspectives of user A.Accordingly, it is to be understood that
It is that the estimation that the calling party that exported by algorithm in step S408 is the most relevant to alleged identity may
What property will depend upon which that in step S406 user A fetches from data-storing is inclusive feature or exclusive
Property feature.Such as, if fetch the particularistic perspectives of user A in step S406 from data-storing,
Then this algorithm can provide higher confidence level in step S408.
" snapshot " (that is, the general introduction) of communication event can be stored in data-storing by ruling module 112
In 114 and copy to each side of communication event to assist resisting denying.This is by the resisting denying with reference to shown in Fig. 6
Process 600 illustrates.
In step S602, the communication customer end that ruling module 112 performs from called party instrument receives
Communication event relevant information.This communication event relevant information can include (such as, the interested party of dialogue)
Image, document, video clipping, audio recording or other ' media ' or ' data '.This communication event
Set by callee during relevant information real-time communication event between calling party device and called party instrument
The communication customer end of standby upper execution captures, and is intended to provide the communication between calling party and callee
The general introduction in whole or in part of event.Such as, communication event relevant information can be entered during communication event
The transaction of row is relevant.
In step s 604, communication event relevant information is sent to set calling party by ruling module 112
The communication customer end of standby upper execution.The communication customer end performed on calling party device can utilize applicable
Output device (client user interface such as, shown on display 204) by communication event
Relevant information exports calling party and asks calling party to prove the communication event provided by calling party device
Relevant information.
If calling party does not proves to be sent to the call-related information of calling party device, then in step S606
In, " proof " of communication event relevant information is reported to called party instrument by ruling module 112.
The communication customer end performed on called party instrument can utilize the output device being suitable for of called party instrument
Not (client user interface such as, shown on display 204) not demonstrate,proving call-related information
Contract quotation is accused to callee.
If calling party proves to be sent to the communication event relevant information of calling party device really, then decide
Communication event relevant information is stored in data-storing 114 by module 112.In step S610, cut out
Verified communication event relevant information is sent to calling party device and is sent to called by cover half block 112
Method, apparatus.This contributes to the resisting denying in whole or in part of the communication event between calling party and callee.
Ruling module 112 can be configured to, if calling party and callee agree to decide that module 112 is deposited
The data that storage is associated with the communication event between these sides, then make communication event relevant information only deposit
Storage is in data-storing 114.
Although by reference to ruling module 112 from the communication customer end being implemented in called party instrument and card
Understand that the calling party of communication event relevant information receives communication event relevant information and illustrates Fig. 6.Separately
In one embodiment, the communication visitor that ruling module 112 can perform from calling party device in step S602
Family end receives communication event relevant information and callee has at step S608 store the relevant letter of calling
Call-related information is proved before breath.
Fig. 1 shows on network video Figure 122 that ruling module 112 realizes in network 106, but,
Embodiment of the disclosure and be not limited to this specific network architecture.Ruling module 112 may be implemented in master
Crying on method, apparatus, such as ruling module 112 may be implemented on CPU 202 or the list of calling party device
In only processing means.Ruling module 112 can also realize on called party instrument, such as, and ruling
Module 112 can be implemented in the CPU 202 or single processing means of called party instrument.
In the communication system 100, the real-time communication event data sent from user terminal 102 can be
It is supplied to the Media Processor in communication network 106 (in Fig. 1 before being sent to user terminal 108
It is shown without).The Media Processor communication event phase between user terminal 102 and user terminal 108
Between process real-time communication event data.Media Processor can determine according to real-time communication event data
For setting up unique identifier and user's A account of the calling party of communication event with user terminal 208
One or more features of identity.
In above-mentioned first embodiment, with reference to step S302, ruling module 112 can be at media
The communication customer end performed on reason device rather than user terminal 102 receives unique with what user A was associated
Identifier and/or one or more features of user A.Similarly, with reference to step S402, decide module
112 can receive be used for from Media Processor rather than the communication customer end performed on user terminal 102
Set up the instruction of alleged identity of calling party with the communication event of user terminal 108 (with user's A phase
The unique identifier of association).
Alternately or in addition, in the above-described first embodiment, module 112 is decided in step s 404
Some or all in one or more features of the calling party that place receives can connect from Media Processor
The communication customer end received rather than perform from user terminal 102 receives.It is only used as example, media
Processor can be from real-time communication event data capture biometric information.From real-time communication event data
The biometric information of capture can include such as: from the eyes of the user A of real time video data capture
Scanning information, from the voiceprint of the user A of real time video data capture, and from real-time video number
Facial measurement (that is, the distance between eyes, nose and mouth) according to the user A of capture.In this enforcement
In example, Media Processor processes the biometric information of the capture of user A so that measures and uses in one
In being sent to decide the form of module 112, then the biometric information of capture is supplied to ruling mould
Block 112.
For improving safety, (such as, can access for a process or similar procedure callee
The user A of bank office) control under can repeat (such as, at physical location) information be loaded into
Process (onboarding process) 300.The characteristic of the user A obtained in this way can such labelling,
And in ruling process 400, these features can be considered to obtain than with alternate manner as herein described
The feature of the user A obtained has higher degree of accuracy and reliability.
Step separately shown in Fig. 3 to Fig. 6 or can not be embodied as single step.
Usually, (such as, described in this article any function can utilize software, firmware, hardware
Fixed logic circuit) or the combination of these implementations realize.Term as used herein " mould
Block ", " function ", " parts ", " application " and " logic ", typically represent software, firmware, hardware or
A combination thereof.In the case of a software implementation, module, function, parts, application or logical expressions are worked as
The program code of assignment of mission is performed during the upper execution of processor (such as, one or more CPU).Journey
Sequence code can be stored in one or more computer readable memory devices.Technology described below
Feature be independently of platform, it is intended that this technology may be implemented in the various business with various processor
Calculate on platform.
Such as, user terminal can also include the entity (example performing operation so that the hardware of user terminal
Such as, software), processor functional device etc..Such as, user terminal can include computer-readable medium,
Computer-readable medium is configured to safeguard the operation system making user terminal and more specifically user's terminal
System and associated hardware perform the instruction of operation.Therefore, configuration operating system and associated hardware are played in instruction
Execution operation and successively mode realize operating system and the conversion of associated hardware and perform the effect of function.
Instruction can be supplied to user terminal by computer-readable medium via various different configurations.
The such structure of one of computer-readable medium be signal bearing medium and be therefore configured to by
Instruction (such as, as carrier wave) is sent to calculating equipment, such as via network.Computer-readable is situated between
Matter is also configured as computer-readable recording medium and is not the most signal bearing medium.Computer can
The example reading storage medium includes random access memory (RAM), read only memory (ROM), light
Dish, flash memory, harddisk memory and can use magnetic, light and other technology store instruction and
Other memory devices of other data.
Although describing theme with the language specific to architectural feature and/or method behavior, but should manage
Solve, the theme limited in the appended claims may be not necessarily limited to above-mentioned specific features or
Behavior.But, above-mentioned specific features and behavior are published as realizing the shape of the example of claim
Formula.
Claims (10)
1. one kind to second user's instruction is relevant with first user equipment to the second subscriber equipment is associated
The method of the reputation of the first user of connection, described method includes:
At described first user equipment, detect described first user initiate, to described second user, the thing that communicates
Part;
In response to described detection, capture at described first user equipment one of described first user or
Multiple features;And
The request setting up communication event is sent to described second user, and the request sent includes described
The instruction of the alleged identity of first user and one or more features of the described first user with capture
Relevant information so that described second user can be effective with described alleged identity to described first user
The probability be correlated with make assessment.
Method the most according to claim 1, wherein perform on described first user equipment is logical
Method described in letter client executing, described foundation is led to by wherein said communication customer end by communication network
The request of letter event is sent to described second subscriber equipment, and the request sent includes the institute of described capture
State one or more features of first user.
Method the most according to claim 1, wherein perform on described first user equipment is logical
Detection and described capture described in letter client executing, described communication customer end is by the sound of described first user
The instruction of fit part and the information relevant with one or more features of the described first user of described capture
Being sent to decide module, wherein said method farther includes described ruling module and estimates that described first uses
Probability that family is the most relevant to described alleged identity and the described request setting up communication event is sent
To described second user, the request sent includes the instruction of the probability estimated.
Method the most according to claim 3, wherein said ruling module be configured to one or
Multiple features are stored in data-storing explicitly with the instruction of the identity of at least one known users,
And estimate that the probability that described first user is the most relevant to described alleged identity includes:
Inquire about described data-storing to determine in described alleged identity and at least one known users described
The identity of one is corresponding;
From described data-storing fetch that the described alleged identity with described first user is associated one or
Multiple features;
The one or more feature fetched from described data-storing is used with described first received
One or more features at family compare to estimate that described first user is with described alleged identity effectively
Relevant probability.
Method the most according to claim 4, wherein the instruction with the identity of known users is associated
One or more features of being stored in described data-storing and that fetched with described first user
One or more features of being associated of alleged identity include at least one following:
The biometric information of described known users;
Described known users is used for the information of the type of the subscriber equipment of communication on described communication network;
The address letter that the subscriber equipment of communication is relevant on described communication network it is used for described known users
Breath;
It is related to the described known users time in one day of communication on described communication network
Information.
6. according to the method described in arbitrary aforementioned claim, the described first user of wherein said capture
One or more features include at least one following:
The biometric information of described first user;
The device type information of described first user equipment;
Address information with described first user device-dependent;And
The information relevant with the time in one day of described communication event.
7. according to the method according to any one of claim 4 to 6, wherein will be from described data-storing
The one or more features fetched compare with one or more features of the described first user received
Step relatively determines the probability that calling party is the most relevant to the identity that described calling party claims.
Method the most according to claim 7, the request wherein sent include described calling party with
The probability that the identity that described calling party claims is correlated with effectively, and comprise additionally in alternatively and be related to institute
State the information how probability is obtained.
9. a network entity, described network entity is configured to being associated with the second subscriber equipment
The reputation of the first user that second user's instruction is associated with first user equipment, described network entity bag
Including processing means, described processing means is configured to:
The instruction of one or more features with the identity of at least one known users is stored in explicitly
In the data-storing coupled with described network entity;
The request of the communication event setting up described second user, institute is received from described first user equipment
The request stated includes the instruction of the alleged identity about described first user,
One or more features of described first user are received from described first user equipment;
Inquire about described data-storing to determine in described alleged identity and at least one known users described
The identity of one is corresponding;
Fetch one or more with what the alleged identity of described first user was associated from described data-storing
Feature;
The one or more feature fetched from described data-storing is used with described first received
One or more features at family compare to estimate that described first user is with described alleged identity effectively
Relevant probability;And
The described request setting up communication event is sent to described second subscriber equipment, the request sent
Instruction including the probability estimated so that described second user can be to described first user with described
The probability that alleged identity is correlated with effectively makes assessment.
10. a subscriber equipment, be configured between first user and the second user via communication
Indicate the reputation of described first user, described user to described second user during the communication event of network
Equipment is associated with described first user or described second user, and includes processing means, described place
Reason device is configured to:
The instruction of one or more features with the identity of at least one known users is stored in explicitly
It is positioned in the data-storing outside described subscriber equipment;
The request and described the of the communication event setting up described second user is received from described first user
One or more features of one user, described request includes the instruction of the alleged identity of described first user;
Inquire about described data-storing to determine in described alleged identity and at least one known users described
The identity of one is corresponding;
Fetch one or more with what the alleged identity of described first user was associated from described data-storing
Feature;
By the one or more features fetched from described data-storing and the described first user received
One or more features compare to estimate that described first user is the most relevant to described alleged identity
Probability;And
The request setting up communication event is sent to described second user, and the request sent includes estimating
The instruction of probability so that described second user can be to described first user and described alleged identity
Effectively relevant probability makes assessment.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1400826.2 | 2014-01-17 | ||
GB201400826A GB201400826D0 (en) | 2014-01-17 | 2014-01-17 | Identity reputation |
US14/444,967 US20160028724A1 (en) | 2014-07-28 | 2014-07-28 | Identity Reputation |
US14/444,967 | 2014-07-28 | ||
PCT/US2015/011073 WO2015108823A1 (en) | 2014-01-17 | 2015-01-13 | Identity reputation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105917631A true CN105917631A (en) | 2016-08-31 |
Family
ID=52469292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580004827.2A Pending CN105917631A (en) | 2014-01-17 | 2015-01-13 | Identity reputation |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3075133A1 (en) |
CN (1) | CN105917631A (en) |
WO (1) | WO2015108823A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898469A (en) * | 2018-06-28 | 2018-11-27 | 魏代利 | A kind of sharing method and device of event |
CN110313166A (en) * | 2017-02-21 | 2019-10-08 | 萨罗尼科斯贸易与服务一人有限公司 | For reminding method, system, electronic equipment, the communication server and the device of urgent call to callee |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090116703A1 (en) * | 2007-11-07 | 2009-05-07 | Verizon Business Network Services Inc. | Multifactor multimedia biometric authentication |
US8458465B1 (en) * | 2005-11-16 | 2013-06-04 | AT&T Intellectual Property II, L. P. | Biometric authentication |
CN103380431A (en) * | 2011-02-21 | 2013-10-30 | 株式会社Ntt都科摩 | Gripping characteristics learning authentication system and gripping characteristics learning authentication method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005009019A2 (en) | 2003-07-16 | 2005-01-27 | Skype Limited | Peer-to-peer telephone system and method |
US9100825B2 (en) * | 2012-02-28 | 2015-08-04 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication based on different device capture modalities |
-
2015
- 2015-01-13 EP EP15704115.3A patent/EP3075133A1/en not_active Withdrawn
- 2015-01-13 CN CN201580004827.2A patent/CN105917631A/en active Pending
- 2015-01-13 WO PCT/US2015/011073 patent/WO2015108823A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458465B1 (en) * | 2005-11-16 | 2013-06-04 | AT&T Intellectual Property II, L. P. | Biometric authentication |
US20090116703A1 (en) * | 2007-11-07 | 2009-05-07 | Verizon Business Network Services Inc. | Multifactor multimedia biometric authentication |
CN103380431A (en) * | 2011-02-21 | 2013-10-30 | 株式会社Ntt都科摩 | Gripping characteristics learning authentication system and gripping characteristics learning authentication method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110313166A (en) * | 2017-02-21 | 2019-10-08 | 萨罗尼科斯贸易与服务一人有限公司 | For reminding method, system, electronic equipment, the communication server and the device of urgent call to callee |
CN108898469A (en) * | 2018-06-28 | 2018-11-27 | 魏代利 | A kind of sharing method and device of event |
CN108898469B (en) * | 2018-06-28 | 2022-04-01 | 魏代利 | Event sharing method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2015108823A1 (en) | 2015-07-23 |
EP3075133A1 (en) | 2016-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10455084B2 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US9232051B2 (en) | Call management for secure facilities | |
US9591126B2 (en) | Personal allowed number system | |
JP5579915B2 (en) | Gripping feature learning authentication system and gripping feature learning authentication method | |
JP5477379B2 (en) | Rogue call detection device, rogue call detection method, and rogue call detection program | |
US20170251100A1 (en) | Inbound Calls to Intelligent Controlled-Environment Facility Resident Media and/or Communications Devices | |
US8855280B1 (en) | Communication detail records (CDRs) containing media for communications in controlled-environment facilities | |
US10404941B1 (en) | Overt and covert capture of images of controlled-environment facility residents using intelligent controlled-environment facility resident communications and/or media devices | |
US10063698B2 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US10686935B1 (en) | Fraud detection for controlled-environment facility communications system | |
US10205826B1 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
CN105917631A (en) | Identity reputation | |
US20180103153A1 (en) | Inmate-Related Communications Opt-In Protocols | |
US10270906B1 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US10063700B1 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US20160028724A1 (en) | Identity Reputation | |
CN105917375A (en) | Identity reputation | |
US10129397B1 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US10270905B1 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US11323571B1 (en) | Message management system | |
US11328549B1 (en) | Enablement of voting by controlled-environment facility residents | |
US10929940B1 (en) | Controlled-environment facility message response system | |
WO2015108790A1 (en) | Identity reputation | |
CN110177042A (en) | A kind of auth method based on social relations and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160831 |
|
WD01 | Invention patent application deemed withdrawn after publication |