CN105917631A - Identity reputation - Google Patents

Identity reputation Download PDF

Info

Publication number
CN105917631A
CN105917631A CN201580004827.2A CN201580004827A CN105917631A CN 105917631 A CN105917631 A CN 105917631A CN 201580004827 A CN201580004827 A CN 201580004827A CN 105917631 A CN105917631 A CN 105917631A
Authority
CN
China
Prior art keywords
user
identity
communication
features
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580004827.2A
Other languages
Chinese (zh)
Inventor
M·A·吉勒特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB201400826A external-priority patent/GB201400826D0/en
Priority claimed from US14/444,967 external-priority patent/US20160028724A1/en
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Publication of CN105917631A publication Critical patent/CN105917631A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method of indicating a reputation of a first user (104) associated with a first user device (102) to a second user (110) associated with a second user device (108), the method comprising: detecting (S502) at the first user device (102) initiation by the first user (104) of a communication event to the second user (110); in response to said detection, capturing (S504) one or more characteristics of said first user (104) at the first user device (110); and transmitting (S506) a request to establish a communication event to the second user (110), the transmitted request including an indication of an asserted identity of the first user (104) and information relating to the captured one or more characteristics of said first user (104) such that the second user (110) can make an assessment as to the likelihood that the first user (104) is validly correlated with the asserted identity.

Description

Identity reputation
Background technology
Financial institution, communal facility and government organs often there is a need to by public communication network (typical case Ground is public switch telephone network (PSTN)) interact with people (typically consumer).
Meanwhile, these mechanisms thirst for handling with people that (i) attested and/or the affairs of (ii) non-repudiation (such as, bank transfer, account inquiries, bill change or other requirements are to secret (the most legally It being controlled, control or similar) information carries out disclose or require ' known ' side in communicating The affairs of action of mandate.
Currently, such as bank use various means to identify when participating in these public network, confirm and Authorize transaction, including personal identification number (PIN), password, security token, Given information etc..
These mechanism are that the user of service brings inconvenience, expense and/or potential fault, differ simultaneously Fixed safety as mechanism wants.
Summary of the invention
Inventors have realised that communication, especially voice and video communication, provide sanction for service Determine the chance of calling party's probability the most relevant to the identity that calling party is claimed.
One side according to the disclosure, it is provided that a kind of to the second use being associated with the second subscriber equipment The method of the reputation of the first user that family instruction is associated with first user equipment, described method includes: At first user equipment, the instruction of communication event is initiated in detection about first user to the second user;Ring Detect described in Ying Yu, at first user equipment, capture one or more features of described first user; And the request setting up communication event is sent to the second user, the request sent includes about first The instruction of the alleged identity of user and be related to one or more features of described first user of capture Information so that the probability that first user is the most relevant to alleged identity can be done by the second user Go out assessment.
In one embodiment, the communication customer end performed on the first user device performs said method Step, the request setting up communication event is sent to the by communication network by wherein said communication customer end Two subscriber equipmenies, the request of transmission includes one or more features of the first user of capture.
In another embodiment, the communication customer end performed on the first user device performs detecting step With capture step, described communication customer end by the instruction of the alleged identity about first user and with capture The relevant information of one or more features of first user be sent to decide module, wherein the method is entered One step includes deciding that module estimates the probability that first user is the most relevant to alleged identity, and will The request setting up communication event is sent to the second user, and the request of transmission includes about the probability estimated Instruction.
Ruling module can on the first user device, on described second subscriber equipment, or described Realize on the network entity of communication network.
According to an aspect of this disclosure, it is provided that a kind of computer program, described computer program Product is implemented in non-transitory computer-readable medium and is configured to when performing on processor device real Execute the method performed by ruling module as herein described.
This summary of the invention is provided for introducing in simplified form the selected works of concept, below specifically Will be described with in bright.This summary of the invention is not intended to determine the key feature of theme required for protection Or key character, also it is not intended to the scope for limiting claim theme.
Accompanying drawing explanation
In order to be better understood from the disclosure, and it is shown to how the disclosure to be put into practicality, now By way of example with reference to accompanying drawing, in the accompanying drawings:
Fig. 1 shows communication system;
Fig. 2 shows the schematic diagram of user terminal;
Fig. 3 be the user for establishing communication system feature in case ruling during use process Flow chart;
Fig. 4 is the flow chart for deciding process;
Fig. 5 is the flow chart for communication event elaboration process;And
Fig. 6 is the flow chart of resisting denying (non-repudiation) process.
Detailed description of the invention
Describe the most by way of example now and embodiment of the disclosure.
Fig. 1 shows that communication system 100, communication system 100 include relevant to first user terminal 102 The first user 104 (user A) joined and the second user 110 being associated with the second user terminal 108 (user B).User terminal 102 and 108 can be led to by the network 106 in communication system 100 Letter, thus allow user 104 to communicate each other by network 106 with 110.User terminal 102 is permissible It is that such as mobile phone, personal digital assistant (" PDA "), personal computer (" PC) (include such as WindowsTM、Mac OSTMAnd LinuxTMPC), game station or be connectable to network 106 Other embedded device.The user 104 that user terminal 102 is arranged to from user terminal 102 receives Information and output information are to the user 104 of user terminal 102.
Network 106 can be to possess between offer first user terminal 102 and the second user terminal 108 Any applicable network of ability of communication port.Network 106 can be that circuit-switched network is (all Such as PSTN or cellular network), packet switching network (such as the Internet or High Data Rate mobile network, The such as third generation (" 3G ") mobile network) or combinations thereof.
Communication system including packet switching network enables the user of equipment to enter on a packet switched network Lang sound or video call.This communication system includes internet voice or video protocols (VoIP) system. These systems are of value to user, because they often have than conventional fixing circuit or mobile cellular net The cost that network is the lowest.This especially true for long haul communication.For using VoIP system, user Client software is installed on their equipment and performs this client software.Client software is arranged VoIP connects and provides other function of such as user's registration.In addition to voice communication, client May be provided for the connection of other communication media, such as Transit time flow meter (" IM "), SMS Message transmission, file transmission and voice mail.
Below with reference to the communication event carried out on a packet switched network to describe embodiment, but, as It is described in more detail below, embodiment of the disclosure and be not limited to any certain types of network.
In order to communicate event on a packet switched network, user terminal 102 perform by with communication system The communication customer end that the software supplier that system 100 is associated provides.Communication customer end is made by user The software program that native processor in terminal 102 performs.Client executing is at user terminal 102 Required process is so that subscriber equipment 102 is sent by communication system 100 and receives data.Such as this Known to field, at user terminal 102 perform client can by digital certificate present (example As, it was demonstrated that user 104 is that the real subscriber of communication system is more detailed in WO 2005/009019 Illustrate) and be proved with communication system communication.
Subscriber equipment 108 can correspond to user terminal 102.Subscriber equipment 108 can be at processing locality Perform on device and the communication customer end corresponding to communication customer end of execution at user terminal 102.With Client at family equipment 108 is with the client executing at user terminal 102 for allowing user 104 warp Performed to be to allow user 110 warp by the network 106 identical mode of the mode of required process that communicates Communicated required process by network 106.User terminal 102 and 108 is the end points in communication system. Fig. 1 is clearly to illustrate only two users (104 and 110) and two user terminals (102 and 108), User and subscriber equipment but more can be included in communication system 100, and may utilize accordingly Subscriber equipment on perform corresponding communication customer end communicate via communication system 100, such as ability Known to territory.
Fig. 2 shows the detailed view of user terminal 102, for via communication system 100 communication Communication customer end performs on user terminal 102.User terminal 102 includes CPU (" CPU ") 202, connects this CPU and has: the display 204 of such as screen or touch screen, The input equipment of such as keypad 206 and video camera 208.Output audio frequency apparatus 210 (such as, is raised one's voice Device) and input audio frequency apparatus 212 (such as, mike) be connected to CPU 202.Display 204, Keypad 206, video camera 208, output audio frequency apparatus 210 and input audio frequency apparatus 212 can be integrated in use In family terminal 102, as shown in Figure 2.In the user terminal of alternative, display 204, keypad 206, Video camera 208, output audio frequency apparatus 210 and input audio frequency apparatus 212 in one or more can not It is integrated in subscriber equipment 102, but CPU 202 can be connected to via corresponding interface.So An example of interface be USB interface.CPU 202 is connected to the network of such as modem and connects Mouth 224 is for communicating with network 106.Network interface 224 is desirably integrated in user terminal 102, As shown in Figure 2.In the user terminal of alternative, network interface 224 is not integrated into subscriber equipment 102 In.User terminal 102 also includes the memorizer 226 for storing data, as known in the art.Deposit Reservoir 226 can be permanent type memorizer, such as ROM.Memorizer 226 can be interim as an alternative Memorizer, such as RAM.
Fig. 2 also show the operating system (" OS ") 214 being implemented on CPU 202.At OS 214 On run be the software stack 216 applied for communication customer end mentioned above.Software stack shows I/O layer 218, client engine layer 220 and client user interface layer (" UI ") 222 are shown. It is responsible for concrete function for every layer.Because every layer generally communicates with two other layers, so they are considered It is arranged to storehouse as shown in Figure 2.Operating system 214 manages the hardware resource of computer and processes Send whereabouts via network interface 224 and carry out the data of automatic network 106.I/O layer 218 include audio frequency and / or Video Codec, it receives the encoding stream of input and by they decodings so that suitably output is to raising Sound device 210 and/or display 204, and receive uncoded from mike 212 and/or video camera 208 Audio frequency and/or video data and using they codings to be sent to other of communication system 10 as stream End user terminal.Client engine layer 220 processes the connection management merit of VoIP system as above Can, such as by calling or other connection with confirming to establish based on server or P2P address search. Client engine can also be responsible for other miscellaneous function the most do not discussed.Client engine layer 220 Also communicate with client user interface layer 222.Client engine layer 220 may be disposed to control client User interface layer 222 via client shown on display 204 user interface by information in Now give the user of user terminal 200 and receive from the user of user terminal 200 via user interface Information.
Returning Fig. 1, communication system 100 includes deciding module 112.Fig. 1 shows ruling module 112 Real for coming by the network entity 122 (such as, server or other network node) in network 106 Existing.But, as further described, ruling module 112 is not limited to realize by this entity.
When user A 104 performs communication customer end and to the software supplier's registration providing communication customer end Time, user A is provided user account and therefore uses with other ID to communication system 100 The unique identifier of family A is associated.Unique identifier can be e.g. to providing communication customer end In the enrollment process of software supplier, user A elects as himself to other user of communication system 100 The user name identified or the e-mail address used in enrollment process.Once user A has User account, user A can (that is, the client in enrollment process be used by input user certificate The password of name in an account book and association is arranged) and access the repertoire of communication customer end.Such as, user A energy Enough other user's dial-out calls to communication system 100 and other user of reception communication system 100 Calling.
Third party in addition to user A claims that they are user A and the user to communication system 100 Dial-out call is possible.Such as, if third party reaches out for the user certificate of the account of user A, If or third party access user A conduct interviews by user terminal, and keep login user The account of A, then can occur this situation.
Receive the communication of the understanding user A of the calling of calling party from the account identity claiming user A The user (that is, for friend, coml acquaintance, kinsfolk etc.) of system 100 can be led to The appearance (video call) of the mode (audio call) and/or calling party of crossing calling party's speech judges Calling party whether user A.
This point is when callee can not determine user A by the speech and/or appearance that identify user A It is impossible.For bank, financial institution, communal facility and government organs etc. it is of particular importance that Can confirm that before participating in any transaction with calling party or other activity calling party is exactly calling party institute That people said.
Inventors have realised that when certain user (the such as bank and other gold of communication system 100 Melt mechanism, communal facility and government organs etc.) receive from the calling party's claiming particular account identity During phone, desirably can protect against known confirmation mentioned above for these callees Confirm during the defect of method that calling party is exactly that people described in calling party.
Fig. 3 is to establish the specific user for communication system 100 (i.e., by what ruling module 112 realized User A) feature record in case ruling during use process 300.
In step s 302, the communication customer end that ruling module 112 performs at user terminal 102 (this is at Fig. 1 to receive one or more features of the unique identifier that is associated with user A and user A In be expressed as data stream 116).
One or more features of user A can include such feature, its can directly associate with The unique identifier that user A is associated.Such as, the means being suitable at user terminal 102 are utilized The biometric information of the user A of capture can be supplied to ruling module 112.
Biometric information can take various forms.Such as, biometric information can include that utilization is touched Touch the fingerprint of user A that the fingerprint scanner (not shown in Fig. 2) of screen 204 or special obtains.Raw Thing metrical information can include the eye scanning of the user A captured by video camera 208.Biometric is believed Breath can include the vocal print (voiceprint) utilizing mike 212 to obtain at user A.
Biometric information can also include the Facial measurement of the user A utilizing video camera 208 to capture (that is, the distance between the eye of user A, nose and mouth).It is understood that at user terminal 102 capture and be supplied to ruling module 112 biometric information can include those skilled in the art Other form known, that do not mention herein.
The communication customer end performed in user terminal 102 can include such function: processes capture The biometric information of user A so that measure (measurements) and be used for being sent in one The form of ruling module 112.Alternatively, the communication customer end performed at user terminal 102 is permissible Special biometric on indicating user terminal 102 processes resource and processes the biometric letter of capture Cease and this biometric information transferred to communication customer end to be sent to decide module 112.
One or more features of user A can include such feature, its can indirectly associate with The unique identifier that user A is associated.These ' indirectly ' features are relevant with the activity of user's A account. Such as, ' indirectly ' feature can include user terminal 102 for accessing user's A account type, It is used for accessing the IP address of the user terminal 102 of user's A account and is related to user's A account interviewed The information of the time (time of day) in one day asked.
Step S302 can be implemented as the part that concrete " disposably " register.Such as, user is worked as A is when the software supplier's registration providing communication customer end, and one or more features of user A can quilt Capture and be sent to decide module 112.As an alternative or additionally, whenever user's A account on one's own initiative It is used for when the telex network of communication system 100, step S302 can be triggered.
In step s 304, ruling module 112 by the unique identifier associated with user A with receive User A feature association.
Ruling module 112 has access right to data-storing 114.Data-storing 114 is at user terminal 102 and user terminal 108 outside.Such as, (example during data-storing 114 can be positioned at communication network 106 As, data-storing 114 can be based on cloud, and thus data are stored in one or more physical location On multiple calculating equipment at place), or in callee's (i.e. bank, financial institution, communal facility, political affairs Mansion mechanism etc.) place in.
In step S306, ruling module 112 by the unique identifier that user A associates and relevant The feature of connection is sent to data-storing 114 to store.
Whenever the account of user A is used to trigger step S302 with the telex network of communication system 100 Time, this makes to decide that As time goes on module 112 can build and associate user A valuably The bigger data corpus (set of feature) that is associated of unique identifier.As from the description below Ruling process is obvious, bigger data corpus allow for more reliable abnormality detection and because of This provides effectively relevant to the identity that this user the claims probability of user for initiating communication event Decide more accurately.
Such as, by receiving user when the account of user A is used for communicating via communication system 100 The biometric information of A, ruling module 112 can build biometric letter in data-storing 114 Breath storage.It is understood that capture biometric information can with time to time change because Only example of the voiceprint of the user A of the different time capture in a day can change, if When capture, user A has on glasses then eye scanning information and can change, and along with the ageing use of user A The Facial measurement of family A can time to time change.Feature is gathered, with user A by elapsing in time The set of relevant more complete biometric information can be stored in data-storing 114.Similarly, By receiving for accessing user's A account when user's A account is used for communicating via communication system 100 The type of the user terminal 102 at family, ruling module 112 can determine about user A most-often used The information of the type of user terminal and storing that information in data-storing 114.In another example, Receive for accessing user's A account by being used for communicating via communication system 100 whenever user's A account The IP address of the user terminal 102 at family, ruling module 112 can determine about user A most-often used The information of IP address of user terminal and store this information.
Therefore, it is increasingly used to communicate via communication system 100 along with user's A account, it is possible to Gathering more accurately of the feature that acquisition is associated with the unique identifier associating user A.
If in step s 302 ruling module 112 from (associating user A's) unique identifier User terminal outside the predetermined tolerance of the biometric information stored in the data-storing 114 being associated The communication customer end performed at 102 receives unique identifier and the biometric letter of association user A Breath, then ruling module 112 can determine that the biometric information received at step S302 is abnormal. For any abnormal biometric information, process 300 terminates (not going on step S304). Such as, if the child of user A accesses user terminal 102 that user A accessed and keeps logining use The account of family A, then can occur this situation.
The precision of one or more features of the user A being stored in data-storing 114 can be according to them The date and/or the time that are received in ruling module 112 or data-storing 114 make marks, its In the feature that receives closer to the phase to be marked as feature of other storage than user A more accurate.
Although describing process 300 above with reference to user A, but it is understood that process 300 can Other user for communication system 100 realizes and makes data-storing 114 store communication system 100 The account identity of multiple users and the feature of association.
With reference now to the ruling process 400 shown in Fig. 4, first embodiment is described.
Calling party at calling party device (such as, user terminal 102) place is with called party instrument (such as, User terminal 108) place callee between real-time communication event during, it is achieved process 400.In real time Communication event can include but not limited to: and audio call (during this audio call, voice data energy Enough exchanges between user terminal 102 and user terminal 108), or video call is (at this video During calling, Voice & Video data can exchange between user terminal 102 and user terminal 108), File transmission and Transit time flow meter (IM) dialogue.During real-time communication event, user The media data transmitted between terminal 102 and user terminal 108 is in FIG as data stream 120 quilt Represent.
Term " calling party " is used to refer to the user of generation initiation communication event, and term " callee " be used for Referring to the recipient of communication event, these terms are not intended to be limited to any certain types of communication event.
In step S402, ruling module 112 is from the communication customer end being implemented in user terminal 102 Receive about being used for establishing the alleged identity of the calling party of the communication event with called party instrument (with user A The unique identifier being associated) instruction (this is expressed as data stream 116 in FIG).
It is understood that calling party can be user A or the user A that disguises oneself as user (rather than use Family A).
In step s 404, ruling module 112 receives one or more features of calling party.Calling party One or more features can receive from the communication customer end that is implemented in calling party device.Such as, cut out Cover half block 112 can receive the most one or more from the communication customer end being implemented in calling party device: The biometric information of calling party, calling party visit from the communication customer end being implemented in user terminal 102 Ask that the IP address of user's terminal that A account is used, calling party are from being implemented in user terminal 102 Communication customer end accesses the type of terminal that user's A account is used, and user terminal 102 with use Family terminal 108 sets up the time in one day of calling.
Being understandable that after step S402 and S404, process 300 is by ruling module 112 Perform.
In step S406, ruling module 112 use the alleged identity about calling party instruction ( Step S402 receives) to inquire about data-storing 114 and to fetch and utilize above-mentioned process 300 to deposit Store up one be associated with (being associated with user A) unique identifier in data-storing 114 Or multiple feature.
In step S408, the feature of calling party that ruling module 112 will receive in step S404 Uniquely identify with (being associated with user A) with fetch from data-storing 114 in step S406 The feature that symbol is associated compares, the possibility effectively relevant to alleged identity to estimate first user Property.Ruling module 112 perform algorithm with to the feature of the calling party detected in step s 404 with Step S406 is fetched from data-storing 114 with (being associated with user A) unique identifier phase Related levels between the feature of association makes evaluation of algorithm.This algorithm provide be given about calling party with Statistics output (that is, probability) of the estimation of the probability that alleged identity is correlated with effectively.Statistics is being provided During output, this algorithm can by fetch from data-storing 114 with (being associated with user A) only The feature that one identifier is associated has and accounts for the most in the recent period.For performing the algorithm of this evaluation of algorithm It is well known to the skilled person and the most not the most discussed in further detail.
In step S410, ruling module 112 is by about instruction " calling party and the sound estimating probability Fit part is correlated with effectively ", it is sent to user terminal 108 (this is expressed as data stream 118 in FIG).
This instruction can include the primary statistics output of algorithm, so that ruling module 112 is by calling party The probability the most relevant to the identity that calling party claims is sent to callee.As an alternative, this instruction can With include that the identity claimed to calling party about calling party is the most relevant or calling party not with caller The instruction (that is, this instruction is expressed with absolute term) that the identity that side is claimed is correlated with effectively.Such as, If ruling module 112 determines that the statistics provided by algorithm output exceedes predetermined threshold, then decide module 112 instructions that can send " identity that calling party is claimed is the most relevant " to calling party, otherwise cut out Cover half block 112 can send the finger of " identity that calling party is not claimed is the most relevant " to calling party Show.
When receiving instruction " calling party is the most relevant to alleged identity " about estimation probability, The communication customer end performed at user terminal 108 can utilize on display 204 shown The user interface of the communication customer end performed on called party instrument is come should to callee (user B) display Instruction.
To the instruction " calling party is the most relevant with alleged identity " how drawn about estimation probability Relevant information can be sent collectively to called party instrument with about the instruction estimating probability.Such as, with Ruling module 112 is used for providing to be given being related to the probability that calling party is the most relevant to alleged identity The relevant information of special algorithm of statistics output (that is, probability) of estimation can be together with about estimation The instruction of probability is sent collectively to called party instrument.
If according to above-described embodiment it is understood that user A accesses account and the calling finance of himself Mechanism (that is, bank), then user A be not prompted to enter pin code or recall true (such as mother's Birth name, first automobile etc.), but financial institution is provided about calling party (user A) with main The instruction of the high likelihood that the identity that the side of crying claims during communication event is correlated with effectively.Therefore, logical Crossing suitable degree of trust and determine calling party (user A) to financial institution, this makes user A and finance Transaction can be concluded between mechanism, and there is no the inconvenience of password, answer safety problem etc..
The feature of the calling party received at step S404 and in step S406 from data-storing 114 The feature that (being associated with the user A) unique identifier fetched is associated can also be together with about estimating The instruction " calling party is the most relevant to alleged identity " of meter probability is sent collectively to called party instrument (user terminal 108).Then, the arbitration at called party instrument can use the information to right The probability that calling party is the most relevant to alleged identity makes himself independent estimations.Such as, called Method, apparatus can perform himself algorithm and provide that to provide calling party the most relevant to alleged identity Statistics output (that is, probability) of the estimation of probability.
On calling party device perform communication customer end can by be used for set up communication event about master The instruction (unique identifier being associated with user A) of the alleged identity of the side of crying and the one of calling party Individual or multiple features, setting up from communication event, it is sent at a predetermined interval decide module 112.
Additionally or alternatively, it is sent to calling party's in response to during communication event from callee Challenge (that is, safety problem), the communication customer end performed on calling party device may determine that for building Instruction (the unique mark being associated with user A of the alleged identity about calling party of vertical communication event Symbol), and one or more features of calling party, and send those to decide module 112.
During communication event, this of the feature of calling party persistently monitors and guarantees that identical user keeps existing During communication event.
With reference now to the communication event shown in Fig. 5, set up process 500 and describe the second embodiment.
In step S502, at calling party device, detect that caller direction callee initiates communication event. Such as, the communication customer end performed on calling party device can be by detection calling party via in caller One or more users that on the display 204 of method, apparatus, the client user interface of display is made select Detect the initiation of communication event.
In step S504, at calling party device, capture one or more features of calling party.Such as, The communication customer end performed on calling party device can utilize applicable outut device to point out calling party (such as, use the audible prompting of speaker 210 or use the visual cues of display 204), makes Communication customer end via applicable input equipment (such as, display 204, special fingerprint scanner, Video camera 208 or mike 212) capture biometric information.Can be by calling party device The communication customer end performed automatically captures other feature (equipment of such as calling party device of calling party Type information, the IP address of calling party device and the information of the time in one day).
In step S506, the request setting up communication event is sent to callee, the request bag of transmission Include the instruction of the alleged identity about calling party and the letter relevant with one or more features of capture Breath.
In the first implementation, step S506 is come real by the communication customer end performed on calling party device Existing.That is, the communication customer end performed on calling party device will be set up logical via communication network 106 The request of letter event is sent on called party instrument the communication customer end performed.In this example, send out The request sent includes the instruction (unique identifier being associated with user A) of the alleged identity of calling party And one or more features of capture itself.On called party instrument perform communication customer end with The user certificate of family A is learnt, after being transfused to, the unique identifier being associated with user A thus is accessed communication System 100.
Therefore, in an aspect of this disclosure, it is provided that following a kind of method: with first user phase Described first user is detected to second be associated with the second subscriber equipment at the first user equipment of association User initiates communication event;In response to described detection, at first user equipment, capture first user Biometric information;And the request setting up communication event is sent to the second user, the request of transmission Including the instruction of the alleged identity about first user and the biometric of the capture of described first user Information.
In this first implementation, the request of the enhancing setting up communication event is sent to callee and sets Standby, and without reference to ruling module 112, because this request includes additional data (one or more captures Feature).This additional data can be made for the most relevant to alleged identity to calling party by callee Probability make assessment.
In the second implementation, the request setting up communication event is logical from perform on calling party device Letter client is sent to decide module 112.
The communication customer end performed from calling party device is sent to decide the foundation communication thing of module 112 The request of part includes the instruction (unique identifier being associated with user A) of the alleged identity of calling party. Referring back to ruling process 400, set up asking of communication event it can therefore be seen that receive from step S402 Asking, ruling module 112 receives the alleged identity (unique identifier being associated with user A) of calling party.
In step s 404, the communication customer end that ruling module 112 performs from user terminal 102 comes Receive one or more features of the capture of calling party.Can be logical perform on user terminal 102 The communication event foundation received in letter client receives the one or more of the capture of calling party in asking Feature.It is alternatively possible to from user terminal 102 in the message independent of the request setting up communication event The communication customer end of upper execution receives one or more features of calling party.
Ruling module 112 performs step S406 as above and S408 subsequently.
In step S410, the instruction of the probability of estimation is sent to callee by ruling module 112, Make callee the probability that calling party is the most relevant to alleged identity can be made assessment.Upper Stating in implementation, this is to be sent to the request setting up communication event at quilt by ruling module 112 The communication customer end performed on method, apparatus is made to realize, the request (sending from ruling module 112) of transmission Including about the instruction " calling party is the most relevant to alleged identity " estimating probability.
Describe about the shape estimating that the instruction of probability may be taked above with reference to first embodiment Formula, is not repeated the most herein.
The foundation communication of the communication customer end performed it is sent on called party instrument from ruling module 112 The request of event can additionally include and how draw about instruction " calling party and the sound estimating probability Fit part is correlated with effectively " relevant information.Such as, it is related to decide that module 112 is for being supplied to The statistics of the estimation going out the probability the most relevant to alleged identity about calling party exports (i.e., generally Rate) information of special algorithm that used can be sent on called party instrument from ruling module 112 The request setting up communication event of the communication customer end performed is supplied.
Additionally, one or more captures of calling party that ruling module 112 receives in step s 404 Feature and at step S406 from data-storing 114 fetch be associated with unique identifier (with User A is associated) feature can also together with about estimate probability instruction " calling party with claim Identity is correlated with effectively " it is sent collectively to called party instrument (user terminal 108).At calling party device The arbitration at place then can use the information to the possibility the most relevant to alleged identity to calling party Property makes himself independent estimation.
The communication customer end performed at calling party device can utilize the use shown on display 204 At family terminal 108 perform communication customer end user interface by set up communication event request and It is shown to callee about the instruction " calling party is the most relevant to alleged identity " estimating probability (use Family B).
It is therefore to be understood that this second implementation provides the enhancing request setting up communication event, Because this request include can by callee make for calling party the most relevant to alleged identity can Energy property makes the additional data of assessment.
If user A accesses account and calling financial institution (such as, bank) of himself, even Before accepting calling, financial institution is provided of claiming about calling party (user A) and calling party The instruction immediately of the high likelihood that identity is correlated with effectively.Therefore, with suitable degree of belief to finance machine Structure determines user A, and this makes it possible to conclude transaction between user A and financial institution, and the closeest The inconvenience such as code, safety problem answer.
In two realizations described by the second embodiment, if callee accepts to set up communication event Request, then process 400 can perform to guarantee during communication event calling party still with calling party institute The identity claimed is effectively relevant (such as, it is ensured that identical user remains resident in calling).
Feature mentioned above can be considered in the sense that they have quantitative values identity reputation " to Amount ", and decide that they segmentations can be strengthened by module 112 by the recipient according to communication event Feature.Second dimension is increased to the feature of storage in data-storing 114 by this.That is, data-storing " inclusive " features of whole communication events that 114 storage user A are initiated and do not consider recipient (total data corpus), and also a storage user A specific user to communication system or a group " exclusiveness " feature (subset of total data corpus) of Client-initiated communication event.In process In 400, recipient based on calling, ruling module 112 can be fetched and is stored in step S406 The whole inclusive features being associated with calling party in data-storing 114.Alternatively, ruling module 112 can fetch the current communication event during calling party is stored in data-storing 114 in step S406 Recipient obtain from previous communication events and (or include one group of use of the recipient of current communication event Family obtains from previous communication events) whole particularistic perspectives of user A.Accordingly, it is to be understood that It is that the estimation that the calling party that exported by algorithm in step S408 is the most relevant to alleged identity may What property will depend upon which that in step S406 user A fetches from data-storing is inclusive feature or exclusive Property feature.Such as, if fetch the particularistic perspectives of user A in step S406 from data-storing, Then this algorithm can provide higher confidence level in step S408.
" snapshot " (that is, the general introduction) of communication event can be stored in data-storing by ruling module 112 In 114 and copy to each side of communication event to assist resisting denying.This is by the resisting denying with reference to shown in Fig. 6 Process 600 illustrates.
In step S602, the communication customer end that ruling module 112 performs from called party instrument receives Communication event relevant information.This communication event relevant information can include (such as, the interested party of dialogue) Image, document, video clipping, audio recording or other ' media ' or ' data '.This communication event Set by callee during relevant information real-time communication event between calling party device and called party instrument The communication customer end of standby upper execution captures, and is intended to provide the communication between calling party and callee The general introduction in whole or in part of event.Such as, communication event relevant information can be entered during communication event The transaction of row is relevant.
In step s 604, communication event relevant information is sent to set calling party by ruling module 112 The communication customer end of standby upper execution.The communication customer end performed on calling party device can utilize applicable Output device (client user interface such as, shown on display 204) by communication event Relevant information exports calling party and asks calling party to prove the communication event provided by calling party device Relevant information.
If calling party does not proves to be sent to the call-related information of calling party device, then in step S606 In, " proof " of communication event relevant information is reported to called party instrument by ruling module 112. The communication customer end performed on called party instrument can utilize the output device being suitable for of called party instrument Not (client user interface such as, shown on display 204) not demonstrate,proving call-related information Contract quotation is accused to callee.
If calling party proves to be sent to the communication event relevant information of calling party device really, then decide Communication event relevant information is stored in data-storing 114 by module 112.In step S610, cut out Verified communication event relevant information is sent to calling party device and is sent to called by cover half block 112 Method, apparatus.This contributes to the resisting denying in whole or in part of the communication event between calling party and callee.
Ruling module 112 can be configured to, if calling party and callee agree to decide that module 112 is deposited The data that storage is associated with the communication event between these sides, then make communication event relevant information only deposit Storage is in data-storing 114.
Although by reference to ruling module 112 from the communication customer end being implemented in called party instrument and card Understand that the calling party of communication event relevant information receives communication event relevant information and illustrates Fig. 6.Separately In one embodiment, the communication visitor that ruling module 112 can perform from calling party device in step S602 Family end receives communication event relevant information and callee has at step S608 store the relevant letter of calling Call-related information is proved before breath.
Fig. 1 shows on network video Figure 122 that ruling module 112 realizes in network 106, but, Embodiment of the disclosure and be not limited to this specific network architecture.Ruling module 112 may be implemented in master Crying on method, apparatus, such as ruling module 112 may be implemented on CPU 202 or the list of calling party device In only processing means.Ruling module 112 can also realize on called party instrument, such as, and ruling Module 112 can be implemented in the CPU 202 or single processing means of called party instrument.
In the communication system 100, the real-time communication event data sent from user terminal 102 can be It is supplied to the Media Processor in communication network 106 (in Fig. 1 before being sent to user terminal 108 It is shown without).The Media Processor communication event phase between user terminal 102 and user terminal 108 Between process real-time communication event data.Media Processor can determine according to real-time communication event data For setting up unique identifier and user's A account of the calling party of communication event with user terminal 208 One or more features of identity.
In above-mentioned first embodiment, with reference to step S302, ruling module 112 can be at media The communication customer end performed on reason device rather than user terminal 102 receives unique with what user A was associated Identifier and/or one or more features of user A.Similarly, with reference to step S402, decide module 112 can receive be used for from Media Processor rather than the communication customer end performed on user terminal 102 Set up the instruction of alleged identity of calling party with the communication event of user terminal 108 (with user's A phase The unique identifier of association).
Alternately or in addition, in the above-described first embodiment, module 112 is decided in step s 404 Some or all in one or more features of the calling party that place receives can connect from Media Processor The communication customer end received rather than perform from user terminal 102 receives.It is only used as example, media Processor can be from real-time communication event data capture biometric information.From real-time communication event data The biometric information of capture can include such as: from the eyes of the user A of real time video data capture Scanning information, from the voiceprint of the user A of real time video data capture, and from real-time video number Facial measurement (that is, the distance between eyes, nose and mouth) according to the user A of capture.In this enforcement In example, Media Processor processes the biometric information of the capture of user A so that measures and uses in one In being sent to decide the form of module 112, then the biometric information of capture is supplied to ruling mould Block 112.
For improving safety, (such as, can access for a process or similar procedure callee The user A of bank office) control under can repeat (such as, at physical location) information be loaded into Process (onboarding process) 300.The characteristic of the user A obtained in this way can such labelling, And in ruling process 400, these features can be considered to obtain than with alternate manner as herein described The feature of the user A obtained has higher degree of accuracy and reliability.
Step separately shown in Fig. 3 to Fig. 6 or can not be embodied as single step.
Usually, (such as, described in this article any function can utilize software, firmware, hardware Fixed logic circuit) or the combination of these implementations realize.Term as used herein " mould Block ", " function ", " parts ", " application " and " logic ", typically represent software, firmware, hardware or A combination thereof.In the case of a software implementation, module, function, parts, application or logical expressions are worked as The program code of assignment of mission is performed during the upper execution of processor (such as, one or more CPU).Journey Sequence code can be stored in one or more computer readable memory devices.Technology described below Feature be independently of platform, it is intended that this technology may be implemented in the various business with various processor Calculate on platform.
Such as, user terminal can also include the entity (example performing operation so that the hardware of user terminal Such as, software), processor functional device etc..Such as, user terminal can include computer-readable medium, Computer-readable medium is configured to safeguard the operation system making user terminal and more specifically user's terminal System and associated hardware perform the instruction of operation.Therefore, configuration operating system and associated hardware are played in instruction Execution operation and successively mode realize operating system and the conversion of associated hardware and perform the effect of function. Instruction can be supplied to user terminal by computer-readable medium via various different configurations.
The such structure of one of computer-readable medium be signal bearing medium and be therefore configured to by Instruction (such as, as carrier wave) is sent to calculating equipment, such as via network.Computer-readable is situated between Matter is also configured as computer-readable recording medium and is not the most signal bearing medium.Computer can The example reading storage medium includes random access memory (RAM), read only memory (ROM), light Dish, flash memory, harddisk memory and can use magnetic, light and other technology store instruction and Other memory devices of other data.
Although describing theme with the language specific to architectural feature and/or method behavior, but should manage Solve, the theme limited in the appended claims may be not necessarily limited to above-mentioned specific features or Behavior.But, above-mentioned specific features and behavior are published as realizing the shape of the example of claim Formula.

Claims (10)

1. one kind to second user's instruction is relevant with first user equipment to the second subscriber equipment is associated The method of the reputation of the first user of connection, described method includes:
At described first user equipment, detect described first user initiate, to described second user, the thing that communicates Part;
In response to described detection, capture at described first user equipment one of described first user or Multiple features;And
The request setting up communication event is sent to described second user, and the request sent includes described The instruction of the alleged identity of first user and one or more features of the described first user with capture Relevant information so that described second user can be effective with described alleged identity to described first user The probability be correlated with make assessment.
Method the most according to claim 1, wherein perform on described first user equipment is logical Method described in letter client executing, described foundation is led to by wherein said communication customer end by communication network The request of letter event is sent to described second subscriber equipment, and the request sent includes the institute of described capture State one or more features of first user.
Method the most according to claim 1, wherein perform on described first user equipment is logical Detection and described capture described in letter client executing, described communication customer end is by the sound of described first user The instruction of fit part and the information relevant with one or more features of the described first user of described capture Being sent to decide module, wherein said method farther includes described ruling module and estimates that described first uses Probability that family is the most relevant to described alleged identity and the described request setting up communication event is sent To described second user, the request sent includes the instruction of the probability estimated.
Method the most according to claim 3, wherein said ruling module be configured to one or Multiple features are stored in data-storing explicitly with the instruction of the identity of at least one known users, And estimate that the probability that described first user is the most relevant to described alleged identity includes:
Inquire about described data-storing to determine in described alleged identity and at least one known users described The identity of one is corresponding;
From described data-storing fetch that the described alleged identity with described first user is associated one or Multiple features;
The one or more feature fetched from described data-storing is used with described first received One or more features at family compare to estimate that described first user is with described alleged identity effectively Relevant probability.
Method the most according to claim 4, wherein the instruction with the identity of known users is associated One or more features of being stored in described data-storing and that fetched with described first user One or more features of being associated of alleged identity include at least one following:
The biometric information of described known users;
Described known users is used for the information of the type of the subscriber equipment of communication on described communication network;
The address letter that the subscriber equipment of communication is relevant on described communication network it is used for described known users Breath;
It is related to the described known users time in one day of communication on described communication network Information.
6. according to the method described in arbitrary aforementioned claim, the described first user of wherein said capture One or more features include at least one following:
The biometric information of described first user;
The device type information of described first user equipment;
Address information with described first user device-dependent;And
The information relevant with the time in one day of described communication event.
7. according to the method according to any one of claim 4 to 6, wherein will be from described data-storing The one or more features fetched compare with one or more features of the described first user received Step relatively determines the probability that calling party is the most relevant to the identity that described calling party claims.
Method the most according to claim 7, the request wherein sent include described calling party with The probability that the identity that described calling party claims is correlated with effectively, and comprise additionally in alternatively and be related to institute State the information how probability is obtained.
9. a network entity, described network entity is configured to being associated with the second subscriber equipment The reputation of the first user that second user's instruction is associated with first user equipment, described network entity bag Including processing means, described processing means is configured to:
The instruction of one or more features with the identity of at least one known users is stored in explicitly In the data-storing coupled with described network entity;
The request of the communication event setting up described second user, institute is received from described first user equipment The request stated includes the instruction of the alleged identity about described first user,
One or more features of described first user are received from described first user equipment;
Inquire about described data-storing to determine in described alleged identity and at least one known users described The identity of one is corresponding;
Fetch one or more with what the alleged identity of described first user was associated from described data-storing Feature;
The one or more feature fetched from described data-storing is used with described first received One or more features at family compare to estimate that described first user is with described alleged identity effectively Relevant probability;And
The described request setting up communication event is sent to described second subscriber equipment, the request sent Instruction including the probability estimated so that described second user can be to described first user with described The probability that alleged identity is correlated with effectively makes assessment.
10. a subscriber equipment, be configured between first user and the second user via communication Indicate the reputation of described first user, described user to described second user during the communication event of network Equipment is associated with described first user or described second user, and includes processing means, described place Reason device is configured to:
The instruction of one or more features with the identity of at least one known users is stored in explicitly It is positioned in the data-storing outside described subscriber equipment;
The request and described the of the communication event setting up described second user is received from described first user One or more features of one user, described request includes the instruction of the alleged identity of described first user;
Inquire about described data-storing to determine in described alleged identity and at least one known users described The identity of one is corresponding;
Fetch one or more with what the alleged identity of described first user was associated from described data-storing Feature;
By the one or more features fetched from described data-storing and the described first user received One or more features compare to estimate that described first user is the most relevant to described alleged identity Probability;And
The request setting up communication event is sent to described second user, and the request sent includes estimating The instruction of probability so that described second user can be to described first user and described alleged identity Effectively relevant probability makes assessment.
CN201580004827.2A 2014-01-17 2015-01-13 Identity reputation Pending CN105917631A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
GB1400826.2 2014-01-17
GB201400826A GB201400826D0 (en) 2014-01-17 2014-01-17 Identity reputation
US14/444,967 US20160028724A1 (en) 2014-07-28 2014-07-28 Identity Reputation
US14/444,967 2014-07-28
PCT/US2015/011073 WO2015108823A1 (en) 2014-01-17 2015-01-13 Identity reputation

Publications (1)

Publication Number Publication Date
CN105917631A true CN105917631A (en) 2016-08-31

Family

ID=52469292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580004827.2A Pending CN105917631A (en) 2014-01-17 2015-01-13 Identity reputation

Country Status (3)

Country Link
EP (1) EP3075133A1 (en)
CN (1) CN105917631A (en)
WO (1) WO2015108823A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898469A (en) * 2018-06-28 2018-11-27 魏代利 A kind of sharing method and device of event
CN110313166A (en) * 2017-02-21 2019-10-08 萨罗尼科斯贸易与服务一人有限公司 For reminding method, system, electronic equipment, the communication server and the device of urgent call to callee

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090116703A1 (en) * 2007-11-07 2009-05-07 Verizon Business Network Services Inc. Multifactor multimedia biometric authentication
US8458465B1 (en) * 2005-11-16 2013-06-04 AT&T Intellectual Property II, L. P. Biometric authentication
CN103380431A (en) * 2011-02-21 2013-10-30 株式会社Ntt都科摩 Gripping characteristics learning authentication system and gripping characteristics learning authentication method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005009019A2 (en) 2003-07-16 2005-01-27 Skype Limited Peer-to-peer telephone system and method
US9100825B2 (en) * 2012-02-28 2015-08-04 Verizon Patent And Licensing Inc. Method and system for multi-factor biometric authentication based on different device capture modalities

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8458465B1 (en) * 2005-11-16 2013-06-04 AT&T Intellectual Property II, L. P. Biometric authentication
US20090116703A1 (en) * 2007-11-07 2009-05-07 Verizon Business Network Services Inc. Multifactor multimedia biometric authentication
CN103380431A (en) * 2011-02-21 2013-10-30 株式会社Ntt都科摩 Gripping characteristics learning authentication system and gripping characteristics learning authentication method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110313166A (en) * 2017-02-21 2019-10-08 萨罗尼科斯贸易与服务一人有限公司 For reminding method, system, electronic equipment, the communication server and the device of urgent call to callee
CN108898469A (en) * 2018-06-28 2018-11-27 魏代利 A kind of sharing method and device of event
CN108898469B (en) * 2018-06-28 2022-04-01 魏代利 Event sharing method and device

Also Published As

Publication number Publication date
WO2015108823A1 (en) 2015-07-23
EP3075133A1 (en) 2016-10-05

Similar Documents

Publication Publication Date Title
US10455084B2 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
US9232051B2 (en) Call management for secure facilities
US9591126B2 (en) Personal allowed number system
JP5579915B2 (en) Gripping feature learning authentication system and gripping feature learning authentication method
JP5477379B2 (en) Rogue call detection device, rogue call detection method, and rogue call detection program
US20170251100A1 (en) Inbound Calls to Intelligent Controlled-Environment Facility Resident Media and/or Communications Devices
US8855280B1 (en) Communication detail records (CDRs) containing media for communications in controlled-environment facilities
US10404941B1 (en) Overt and covert capture of images of controlled-environment facility residents using intelligent controlled-environment facility resident communications and/or media devices
US10063698B2 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
US10686935B1 (en) Fraud detection for controlled-environment facility communications system
US10205826B1 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
CN105917631A (en) Identity reputation
US20180103153A1 (en) Inmate-Related Communications Opt-In Protocols
US10270906B1 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
US10063700B1 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
US20160028724A1 (en) Identity Reputation
CN105917375A (en) Identity reputation
US10129397B1 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
US10270905B1 (en) Inbound calls to intelligent controlled-environment facility resident media and/or communications devices
US11323571B1 (en) Message management system
US11328549B1 (en) Enablement of voting by controlled-environment facility residents
US10929940B1 (en) Controlled-environment facility message response system
WO2015108790A1 (en) Identity reputation
CN110177042A (en) A kind of auth method based on social relations and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160831

WD01 Invention patent application deemed withdrawn after publication