TWI744810B - Speaking end device, receiving end device and cloud server of user data fingerprint verification operation - Google Patents

Speaking end device, receiving end device and cloud server of user data fingerprint verification operation Download PDF

Info

Publication number
TWI744810B
TWI744810B TW109106823A TW109106823A TWI744810B TW I744810 B TWI744810 B TW I744810B TW 109106823 A TW109106823 A TW 109106823A TW 109106823 A TW109106823 A TW 109106823A TW I744810 B TWI744810 B TW I744810B
Authority
TW
Taiwan
Prior art keywords
user data
cloud server
user
fingerprint
data stream
Prior art date
Application number
TW109106823A
Other languages
Chinese (zh)
Other versions
TW202133598A (en
Inventor
李彥儒
廖御佑
宋政桓
郭建甫
鄭勝丰
Original Assignee
走著瞧股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 走著瞧股份有限公司 filed Critical 走著瞧股份有限公司
Priority to TW109106823A priority Critical patent/TWI744810B/en
Priority to JP2020140862A priority patent/JP6991522B2/en
Publication of TW202133598A publication Critical patent/TW202133598A/en
Application granted granted Critical
Publication of TWI744810B publication Critical patent/TWI744810B/en

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephone Function (AREA)

Abstract

A speaking end device, receiving end device and cloud server of user data fingerprint verification operation are provided. The speaking end device sends a communication request to a receiving end device and sends a first data stream to the cloud server in response to the communication request that includes at least a display number, and the first data stream at least includes a receiving end number. The cloud server sends a user data fingerprint corresponding to the speaking end device to the receiving end device according to the receiving end number, and the receiving end device sends a second data stream carrying the display number and the user data fingerprint to the cloud server. The cloud server verifies the second data stream to generate a verification result, and the receiver device determines the legitimacy of the communication request according to the verification result.

Description

使用者資料指紋驗證運作之發話端裝置、收話端裝置及雲端伺服器 Talking device, receiving device and cloud server for user data fingerprint verification operation

本發明係關於一種發話端裝置、收話端裝置及雲端伺服器。更具體而言,本發明係關於一種使用者資料指紋驗證運作之發話端裝置、收話端裝置及雲端伺服器。 The invention relates to a caller end device, a caller end device and a cloud server. More specifically, the present invention relates to a caller device, receiver device, and cloud server for fingerprint verification of user data.

近年來,社會上常常發生許多被假冒身分的手法所詐騙的案例,而其中又以透過電信仿冒的詐騙為大宗。舉例而言,一般民眾習慣根據手機螢幕上對方所顯示的電話號碼來判斷發話端的身分,因此有心人士可能藉由偽造發話端手機的顯示號碼(例如:透過境外電話線路作為跳板)來假冒企業客服或是某身分,使得收話端的民眾藉由該顯示號碼而誤信該有心人士即為該假冒的單位/身分,有心人士即可透過這樣的弱點趁機進行惡意行為。 In recent years, there have been many cases of fraud by means of impersonation in the society, and among them, fraud through telecommunications counterfeiting is the major one. For example, ordinary people are accustomed to judging the identity of the caller based on the phone number displayed by the other party on the screen of the mobile phone. Therefore, people who are interested may fake the display number of the caller mobile phone (for example: using an overseas telephone line as a springboard) to impersonate the corporate customer service Or a certain identity that makes the people at the receiving end mistakenly believe that the intentional person is the fake unit/identity through the display number, and the intentional person can take advantage of this weakness to take the opportunity to conduct malicious acts.

此外,近年來由於金融科技及服務更多元,市面上亦出現用戶之間彼此可以透過手機直接傳送帳戶資訊而進行金融交易(例如:轉帳某金額到特定帳戶)的功能。然而,由於市面上缺乏能對於發話端裝置及帳戶資訊進行驗證的技術,收話端的用戶無法辨認其所接收到的顯示號碼及帳戶資訊的真實性。換言之,依據現有的機制,當某用戶自發話端接收 到帳戶資訊時,該用戶無法有效的認證發話者身分且難以確認發話者提供的帳戶資訊是否為真實,導致可能存在帳戶資訊被仿冒的風險(例如:有心人士偽造轉帳資訊,使得使用者誤轉金額至假冒帳戶)。 In addition, in recent years, due to the diversification of financial technology and services, there has also been a function in the market where users can directly transmit account information through mobile phones to conduct financial transactions (for example, transfer a certain amount to a specific account). However, due to the lack of technologies on the market that can verify the device and account information of the caller, the user of the caller cannot recognize the authenticity of the display number and account information they receive. In other words, according to the existing mechanism, when a user spontaneously When accessing the account information, the user cannot effectively authenticate the identity of the caller and it is difficult to confirm whether the account information provided by the caller is authentic, which may lead to the risk of counterfeiting the account information (for example: someone who intends to forge the transfer information, causing the user to transfer by mistake Amount to fake account).

有鑑於此,如何提供一種對於發話端進行身分驗證的機制,以避免第三方偽冒者進行惡意行為,乃業界亟需努力之目標。 In view of this, how to provide a mechanism for the identity verification of the caller to avoid malicious behavior by third-party counterfeiters is an urgent goal in the industry.

本發明之一目的在於提供一種使用者資料指紋驗證運作之發話端裝置,該發話端裝置與一雲端伺服器透過網路連線。該發話端裝置包含一收發介面、一儲存器及一處理器,且該處理器電性連接至該儲存器及該收發介面。該處理器執行一驗證程式,且該驗證程式執行以下運作:(a)傳送一通訊請求至一收話端裝置,其中該通訊請求至少包含一顯示號碼,以及(b)對應該通訊請求傳送一第一資料流至該雲端伺服器,其中該第一資料流至少包含一收話端號碼。該雲端伺服器根據該收話端號碼傳送對應該發話端裝置之一使用者資料指紋至該收話端裝置,該收話端裝置將載有該顯示號碼及該使用者資料指紋之一第二資料流傳送至該雲端伺服器,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼及該使用者資料指紋以產生一驗證結果,該收話端裝置根據該驗證結果判斷該通訊請求之一合法性。 An object of the present invention is to provide a caller device for fingerprint verification operation of user data. The caller device and a cloud server are connected via a network. The calling end device includes a transceiver interface, a memory and a processor, and the processor is electrically connected to the memory and the transceiver interface. The processor executes a verification program, and the verification program performs the following operations: (a) sending a communication request to a receiver device, where the communication request includes at least a display number, and (b) sending a communication request corresponding to the communication request The first data stream is sent to the cloud server, wherein the first data stream includes at least a receiving terminal number. The cloud server sends a user data fingerprint corresponding to the calling device to the receiving device according to the receiving terminal number, and the receiving device will carry the display number and one of the user data fingerprints. The data stream is sent to the cloud server so that the cloud server verifies the display number and the user data fingerprint contained in the second data stream to generate a verification result, and the receiver device determines the communication according to the verification result One of the requests is legitimacy.

本發明之另一目的在於提供一種關於使用者資料指紋驗證運作之收話端裝置,該收話端裝置與一雲端伺服器透過網路連線。該收話端裝置包含一收發介面、一儲存器及一處理器,且該收話端裝置電性連接至該儲存器及該收發介面。該處理器執行一驗證程式,且該驗證程式執行以下運作:(a)自一發話端裝置接收一通訊請求,其中該通訊請求至少包含 一顯示號碼,且該發話端裝置對應該通訊請求傳送至少包含一收話端號碼的一第一資料流至該雲端伺服器,(b)自該雲端伺服器接收對應該發話端裝置之一使用者資料指紋,(c)產生一第二資料流,其中該第二資料流載有該顯示號碼及該使用者資料指紋,(d)傳送該第二資料流至該雲端伺服器,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼及該使用者資料指紋以產生一驗證結果,以及(e)自該雲端伺服器接收該驗證結果,以判斷該通訊請求之一合法性。 Another object of the present invention is to provide a receiving terminal device for fingerprint verification operation of user data. The receiving terminal device is connected to a cloud server through a network. The receiving end device includes a transceiver interface, a storage and a processor, and the receiving end device is electrically connected to the storage and the transceiver interface. The processor executes a verification program, and the verification program performs the following operations: (a) A communication request is received from a caller device, wherein the communication request includes at least A display number, and the caller device sends a first data stream containing at least a receiver number to the cloud server in response to the communication request, and (b) receives one of the caller devices from the cloud server and uses it Data fingerprint, (c) generate a second data stream, where the second data stream carries the display number and the user data fingerprint, (d) send the second data stream to the cloud server for the cloud The server verifies the display number and the user data fingerprint contained in the second data stream to generate a verification result, and (e) receives the verification result from the cloud server to determine the validity of the communication request.

本發明之另一目的在於提供一種關於使用者資料指紋驗證運作之雲端伺服器。該雲端伺服器與複數個使用者裝置透過網路連線,且該等使用者裝置中包含一發話端裝置及一收話端裝置。該雲端伺服器包含一收發介面、一儲存器及一處理器,且該處理器電性連接至該儲存器及該收發介面。該儲存器儲存複數個使用者資料指紋,其中各該使用者資料指紋對應至該等使用者裝置其中之一。該處理器執行下列運作:(a)自該發話端裝置接收一第一資料流,其中該第一資料流至少包含一收話端號碼,且該第一資料流與該發話端裝置傳送至該收話端裝置之一通訊請求相關,(b)從該等使用者資料指紋中選擇對應該發話端裝置之一使用者資料指紋,且根據該收話端號碼,將對應該發話端裝置之該使用者資料指紋傳送至該收話端裝置,(c)自該收話端裝置接收一第二資料流,該第二資料流載有一顯示號碼及對應該發話端裝置之該使用者資料指紋,以及(d)驗證該第二資料流所載之該顯示號碼及對應該發話端裝置之該使用者資料指紋以產生一驗證結果,傳送該驗證結果至該收話端裝置。 Another object of the present invention is to provide a cloud server for fingerprint verification operation of user data. The cloud server is connected to a plurality of user devices through a network, and the user devices include a caller end device and a receiver end device. The cloud server includes a transceiver interface, a storage and a processor, and the processor is electrically connected to the storage and the transceiver interface. The storage stores a plurality of user data fingerprints, and each of the user data fingerprints corresponds to one of the user devices. The processor performs the following operations: (a) receiving a first data stream from the originating end device, wherein the first data stream includes at least a receiving end number, and the first data stream and the originating end device are sent to the One of the receiving end devices is related to the communication request, (b) selecting one of the user data fingerprints corresponding to the originating end device from the user data fingerprints, and according to the receiving end number, corresponding to the originating end device The user data fingerprint is sent to the receiving end device, (c) a second data stream is received from the receiving end device, and the second data stream carries a display number and the user data fingerprint corresponding to the speaking end device, And (d) verifying the display number contained in the second data stream and the user data fingerprint corresponding to the calling end device to generate a verification result, and transmitting the verification result to the receiving end device.

本發明所提供之使用者資料指紋驗證運作技術(至少包含發 話端裝置、收話端裝置及雲端伺服器),藉由要求發話端裝置傳送通訊請求至收話端裝置時,需要對應該通訊請求傳送一第一資料流(其至少包含收話端號碼)至該雲端伺服器,該雲端伺服器再根據該收話端號碼傳送對應該發話端裝置之一使用者資料指紋至該收話端裝置,該收話端裝置將載有顯示號碼及該使用者資料指紋之第二資料流傳送至該雲端伺服器,由該雲端伺服器驗證該第二資料流以產生驗證結果,透過三方裝置的合作驗證機制藉此避免第三方偽冒者進行惡意行為。 The user data fingerprint verification operation technology provided by the present invention (including at least sending Phone terminal device, receiver device and cloud server), by requesting the caller device to send a communication request to the receiver device, it is necessary to send a first data stream corresponding to the communication request (which at least contains the receiver number) To the cloud server, the cloud server sends a user data fingerprint corresponding to the calling device to the receiving device according to the receiving terminal number, and the receiving device will carry the display number and the user The second data stream of the data fingerprint is sent to the cloud server, and the second data stream is verified by the cloud server to generate a verification result, and a third-party device's cooperative verification mechanism is used to avoid malicious behaviors by third-party counterfeiters.

本發明更透過對於使用者裝置的行為特徵持續性檢驗,使得能夠在維持用戶隱私的前提下(即,敏感的生物資訊儲存於用戶端),透過使用者資料指紋持續掌握用戶的行為,讓用戶之間的行為皆能透過第三方(即,雲端伺服器)的信任轉嫁程序,保證用戶彼此之間的信任價值。此外,本發明更解決習知技術缺乏對於發話端裝置及帳戶資訊進行驗證的問題。因此,本發明可正確地且有效率地驗證發話端身分,避免有心人士透過偽造身分及資訊進行惡意行為。 In the present invention, by continuously checking the behavior characteristics of the user’s device, the user’s behavior can be continuously grasped through the user’s data fingerprint while maintaining the user’s privacy (that is, sensitive biological information is stored on the user’s end). The behaviors between them can be passed through the trust transfer process of a third party (ie, cloud server) to ensure the trust value between users. In addition, the present invention further solves the problem of the lack of verification of the caller device and account information in the prior art. Therefore, the present invention can accurately and efficiently verify the identity of the caller, and prevent intentional persons from performing malicious behaviors by forging identities and information.

以下結合圖式闡述本發明之詳細技術及實施方式,俾使本發明所屬技術領域中具有通常知識者能理解所請求保護之發明之技術特徵。 The detailed technology and implementation of the present invention are described below in conjunction with the drawings, so that those with ordinary knowledge in the technical field to which the present invention belongs can understand the technical features of the claimed invention.

1:使用者資料指紋驗證運作系統 1: User data fingerprint verification operating system

11:發話端裝置 11: Talking device

13:收話端裝置 13: Receiver device

15:雲端伺服器 15: Cloud server

101:通訊請求 101: Communication request

103:第一資料流 103: First data stream

105:使用者資料指紋 105: User data fingerprint

107:第二資料流 107: Second data stream

109:驗證結果 109: Verification Results

1101、1301、1501:收發介面 1101, 1301, 1501: transceiver interface

1103、1303、1503:儲存器 1103, 1303, 1503: storage

1105、1305、1505:處理器 1105, 1305, 1505: processor

第1圖係描繪第一實施方式之使用者資料指紋驗證運作的系統之架構示意圖; Figure 1 is a schematic diagram depicting the structure of the system for fingerprint verification of user data in the first embodiment;

第2圖係描繪第二實施方式之發話端裝置之裝置示意圖; Figure 2 is a schematic diagram depicting the speaking end device of the second embodiment;

第3圖係描繪第三實施方式之收話端裝置之裝置示意圖;以及 Figure 3 is a schematic diagram depicting the receiving end device of the third embodiment; and

第4圖係描繪第四實施方式之雲端伺服器之裝置示意圖。 FIG. 4 is a schematic diagram depicting the device of the cloud server of the fourth embodiment.

以下將透過實施方式來解釋本發明所提供之一種使用者資料指紋驗證運作之發話端裝置、收話端裝置及雲端伺服器。然而,該等實施方式並非用以限制本發明需在如該等實施方式所述之任何環境、應用或方式方能實施。因此,關於實施方式之說明僅為闡釋本發明之目的,而非用以限制本發明之範圍。應理解,在以下實施方式及圖式中,與本發明非直接相關之元件已省略而未繪示,且各元件之尺寸以及元件間之尺寸比例僅為例示而已,而非用以限制本發明之範圍。 The following will explain the caller end device, receiver end device and cloud server of a user data fingerprint verification operation provided by the present invention through implementations. However, these embodiments are not intended to limit the implementation of the present invention in any environment, application or method as described in these embodiments. Therefore, the description of the embodiments is only for the purpose of explaining the present invention, rather than limiting the scope of the present invention. It should be understood that, in the following embodiments and drawings, elements that are not directly related to the present invention have been omitted and are not shown, and the size of each element and the size ratio between the elements are only examples, and are not used to limit the present invention. The scope.

本發明之第一實施方式為一使用者資料指紋驗證運作系統1,其示意圖係描繪於第1圖。應理解,使用者資料指紋驗證運作系統1更包含複數個與雲端伺服器連線的使用者裝置,惟本發明之重點在於「發話端裝置」、「收話端裝置」與「雲端伺服器」之間的相互驗證運作,因此在第1圖中僅例示了使用者資料指紋驗證運作系統1中的「發話端裝置」、「收話端裝置」與「雲端伺服器」,而未繪示其他非參與本次使用者資料指紋驗證運作的其他使用者裝置。須說明者,在本發明的敘述中,當其中一使用者裝置發送通訊請求至另一使用者裝置而欲進行通訊時,本發明將發送通訊請求的該使用者裝置即稱作為「發話端裝置」,而將接收該通訊請求的該使用者裝置稱作為「收話端裝置」。 The first embodiment of the present invention is a user data fingerprint verification operation system 1, and its schematic diagram is depicted in FIG. 1. It should be understood that the user data fingerprint verification operating system 1 further includes a plurality of user devices connected to a cloud server, but the focus of the present invention is the "speaking end device", the "receiving end device" and the "cloud server" The mutual authentication operation between the two, so in Figure 1, only the "speaking end device", "receiving end device" and "cloud server" in the user data fingerprint verification operation system 1 are illustrated, and the others are not shown Other user devices that are not involved in this user data fingerprint verification operation. It should be noted that in the description of the present invention, when one of the user devices sends a communication request to another user device and wants to communicate, the present invention refers to the user device that sent the communication request as the "speaker device ", and the user device that receives the communication request is referred to as the "receiving device".

接著說明使用者資料指紋驗證運作系統1所包含的裝置,請參考第1圖。使用者資料指紋驗證運作系統1包含發話端裝置11、收話端裝置13及雲端伺服器15,且發話端裝置11及收話端裝置13分別透過網路與雲 端伺服器15連線。須說明者,該等使用者裝置(包含:發話端裝置11及收話端裝置13)可為智慧型手機或是其他具有基本通訊及運算功能的裝置,而雲端伺服器15則可由第三方服務公司提供,例如:應用程式服務商、電信服務商等等具有使用者裝置資訊的公司。於某些實施方式中,發話端裝置11及收話端裝置13之間可能在沒有數據網路的狀態下,而僅具有無線通信管道。 Next, the devices included in the user data fingerprint verification operating system 1 will be described. Please refer to Figure 1. The user data fingerprint verification operation system 1 includes a caller device 11, a receiver device 13 and a cloud server 15. The caller device 11 and the receiver device 13 are connected via the network and the cloud, respectively. The end server 15 is connected. It should be noted that these user devices (including: the caller device 11 and the receiver device 13) can be smart phones or other devices with basic communication and computing functions, and the cloud server 15 can be served by a third party The company provides, for example: application service providers, telecommunications service providers, etc. companies that have user device information. In some embodiments, the caller device 11 and the caller device 13 may only have a wireless communication channel when there is no data network.

應理解,第1圖僅用於例示,本發明並未限制執行使用者資料指紋驗證運作的系統中所包含之發話端裝置11之數目及收話端裝置13之數目。換言之,於本發明之其他實施方式中,執行使用者資料指紋驗證運作的系統1可包含一或多個發話端裝置11以及一或多個收話端裝置13同時進行運作,視該使用者資料指紋驗證運作的系統1之規模而定,本發明所屬技術領域中具有通常知識者應可理解其內容,故不贅言。 It should be understood that FIG. 1 is only for illustration, and the present invention does not limit the number of caller end devices 11 and the number of caller end devices 13 included in the system for performing user data fingerprint verification operations. In other words, in other embodiments of the present invention, the system 1 for performing user data fingerprint verification operations may include one or more caller end devices 11 and one or more caller end devices 13 operating simultaneously, depending on the user data The fingerprint verification operation system 1 depends on the scale, and those with ordinary knowledge in the technical field to which the present invention pertains should be able to understand its content, so it will not be repeated.

本發明主要利用使用者資料指紋來建立驗證機制,為了便於理解,以下段落先說明產生使用者資料指紋的目的及方法。首先,本發明為了驗證各個使用者裝置,需要產生具有空間獨立性的一組行為身分,並透過預先儲存各個使用者裝置的專屬行為身分,使得往後有相似或雷同的行為資料時可以用來判斷該行為資料是否屬於同一個人/使用者裝置。由於各個使用者裝置的使用者資料較能反應出各該使用者的行為特徵,且具有獨特且難以仿造的特性,因此本發明透過收集各個使用者裝置的使用者資料來產生使用者資料指紋,後續更透過使用者資料指紋來辨識發起通訊請求的發話端裝置的合法性。 The present invention mainly uses user data fingerprints to establish a verification mechanism. In order to facilitate understanding, the following paragraphs first describe the purpose and method of generating user data fingerprints. First, in order to verify each user device, the present invention needs to generate a set of spatially independent behavior identities, and pre-store the exclusive behavior identities of each user device, so that similar or similar behavior data can be used in the future. Determine whether the behavior data belongs to the same person/user device. Since the user data of each user device can better reflect the behavior characteristics of each user, and has unique and difficult to imitate characteristics, the present invention generates user data fingerprints by collecting user data of each user device. Later, the user data fingerprint is used to identify the legitimacy of the originating device that initiated the communication request.

具體而言,使用者資料指紋(Number FingerPrint;NFP)是 根據各該使用者裝置之使用者資料產生,而該使用者資料包含一電話用戶資訊、一通話紀錄及一裝置資訊其中之一或其組合。 Specifically, the user data fingerprint (Number FingerPrint; NFP) is Generated based on user data of each user device, and the user data includes one or a combination of a telephone user information, a call log, and a device information.

舉例而言,使用者資料中的「電話用戶資訊」可包含電話號碼、聯絡人資訊(contact book)、電信名稱(telecom name)、安裝程式(app installed packages)、每日通知數量、通知的內容等等資訊。 For example, the "phone user information" in the user data can include phone number, contact book, telecom name, app installed packages, number of notifications per day, and content of notifications Wait for information.

使用者資料中的「通話紀錄」可包含通話紀錄(call log)、包含訊息事件(event)及內容(content)的訊息紀錄(SMS log)、顯示號碼、收話方回報紀錄(report log)及阻擋紀錄(block log)等等資訊。 The "call log" in the user data can include call log, message log (SMS log) including event and content, display number, receiver report log, and Block log and other information.

使用者資料中的「裝置資訊」可包含電池紀錄(Battery log)、裝置號碼(Device ID)、型號(Model)及品牌(Brand)等等資訊。 The "device information" in the user data can include information such as battery log, device ID, model, and brand.

於本實施方式中,使用者資料指紋主要是透過破壞性的不可反向解碼的編碼處理(例如:雜湊(Hash)演算法)後集合而產生,針對不同性質的使用者資料可採用不同的編碼處理。 In this embodiment, user data fingerprints are mainly generated through destructive non-reversible decoding encoding processing (for example: Hash algorithm) and then assembled. Different encodings can be used for different types of user data. deal with.

具體而言,使用者資料可分為不會變動的靜態資料(例如:電話用戶資訊及裝置資訊)及可能變動的動態資料(例如:通話紀錄),其中靜態資訊可透過一般的訊息摘要演算法(例如:MD5 Message-Digest Algorithm)及密碼雜湊函數演算法(例如:SHA-1 Secure Hash Algorithm)進行編碼,而動態資訊則可透過人工智慧(Artificial Intelligence;AI)或機器學習(machine learning;ML)的方式擷取出重要特徵後,生成數位特徵資訊後再進行編碼。最後,透過這些編碼後的資料組合成使用者資料指紋。本發明所屬技術領域中具有通常知識者應可理解透過編碼處理以產生使用者資料指紋的內容,故不贅言。 Specifically, user data can be divided into static data that does not change (e.g. phone user information and device information) and dynamic data that may change (e.g. call history). Among them, static information can be obtained through a general message digest algorithm. (E.g. MD5 Message-Digest Algorithm) and cryptographic hash function algorithm (e.g. SHA-1 Secure Hash Algorithm) for encoding, and dynamic information can be encoded through artificial intelligence (AI) or machine learning (ML) ) Method to extract important features, generate digital feature information and then encode. Finally, these encoded data are combined into user data fingerprints. Those with ordinary knowledge in the technical field to which the present invention pertains should be able to understand the content of generating user data fingerprints through encoding processing, so it is not repeated.

於某些實施方式中,為了使得使用者裝置與用戶本人能夠具有連結關係。雲端伺服器15更提供用戶透過註冊、號碼簡訊驗證等方式,將用戶、號碼(例如:SIM卡號碼)與使用者裝置進行綁定,而用戶亦可透過帳號方式登入使用者裝置,使得用戶的使用者資料、號碼及使用者裝置等等資訊整合在一起(即,每個號碼對應至一使用者資料指紋)。因此,透過綁定的機制,更能提升使用者裝置與用戶的信任連結,並可用於使用者裝置檢驗用戶行為時的運作。關於後續檢驗用戶的運作,容後詳述。 In some embodiments, in order to enable the user device to have a connection relationship with the user himself. The cloud server 15 also provides users to bind users and numbers (such as SIM card numbers) to the user device through registration, number SMS verification, etc., and users can also log in to the user device through an account, so that the user’s User data, number, user device, and other information are integrated (that is, each number corresponds to a user data fingerprint). Therefore, the binding mechanism can further enhance the trust connection between the user device and the user, and can be used for the operation of the user device when verifying user behavior. Regarding the operation of the follow-up inspection user, I will elaborate on it later.

於本實施方式中,雲端伺服器15預先儲存了複數個使用者資料指紋,各該使用者資料指紋對應至該等使用者裝置其中之一。具體而言,雲端伺服器15可週期性的自各該使用者裝置接收各該使用者資料(例如:關於各項使用者資料的原始數據(raw data)),並週期性的根據各該使用者資料產生對應各該使用者裝置之該使用者資料指紋。 In this embodiment, the cloud server 15 pre-stores a plurality of user data fingerprints, and each user data fingerprint corresponds to one of the user devices. Specifically, the cloud server 15 may periodically receive each user data (for example, raw data about each user data) from each user device, and periodically according to each user The data generation corresponds to the user data fingerprint of each user device.

於某些實施方式中,各個使用者裝置亦儲存有其本身之使用者資料,且同樣週期性的根據各該使用者資料產生使用者資料指紋。此外,雲端伺服器15更根據所儲存的使用者資料指紋,定期的與各該使用者裝置進行檢驗/同步,當雲端伺服器15發現使用者裝置的使用者資料指紋與雲端伺服器15的使用者資料指紋差異度超過某一閾值時,發出關於合法性的警告。舉例而言,當用戶遺失手機而被陌生人撿到時,由於產生的行為特徵不同,將使得使用者裝置所產生的使用者資料指紋不相同,雲端伺服器15將能透過定期的比對使用者資料指紋檢驗出是否符合原用戶行為特徵,並即時發出警告,避免不必要的惡意行為。 In some embodiments, each user device also stores its own user data, and also periodically generates user data fingerprints based on the user data. In addition, the cloud server 15 regularly checks/synchronizes with each user device based on the stored user data fingerprint. When the cloud server 15 finds the user data fingerprint of the user device and the use of the cloud server 15 When the difference degree of the fingerprint of the user data exceeds a certain threshold, a warning about the legality is issued. For example, when a user loses a mobile phone and is picked up by a stranger, the user data fingerprints generated by the user device will be different due to the different behavior characteristics, and the cloud server 15 will be able to use it through regular comparisons. The fingerprint of the user's data checks whether it meets the characteristics of the original user's behavior, and an immediate warning is issued to avoid unnecessary malicious behavior.

以下段落將詳述,關於使用者資料指紋驗證運作的系統1運 作的細節,請參考第1圖。於本實施方式中,發話端裝置11與收話端裝置13至少可透過一通訊方式連接(例如:通訊或數據網路),且發話端裝置11與收話端裝置13均執行一驗證程式(未繪示)。具體而言,該驗證程式可由前述的第三方服務公司提供(即,應用程式服務商、電信服務商等等具有使用者裝置資訊的公司),各個參與使用者資料指紋驗證運作的使用者裝置需要預先安裝,由該驗證程式負責與雲端伺服器15的相關運作。 The following paragraphs will detail the operation of the system 1 for fingerprint verification of user data For details, please refer to Figure 1. In this embodiment, the calling device 11 and the calling device 13 can be connected via at least one communication method (for example, communication or data network), and both the calling device 11 and the calling device 13 execute a verification program ( Not shown). Specifically, the verification program can be provided by the aforementioned third-party service company (ie, application service providers, telecommunications service providers, etc. companies that have user device information), and each user device participating in the fingerprint verification operation of user data needs Pre-installed, the verification program is responsible for the operation of the cloud server 15.

首先,發話端裝置11傳送通訊請求101至收話端裝置13,該通訊請求至少包含一顯示號碼。具體而言,該顯示號碼為發話端裝置11欲顯示給收話端裝置13的號碼,例如:發話端裝置11的電話號碼。接著,發話端裝置11需要對應通訊請求101傳送第一資料流103至雲端伺服器15,以便透過雲端伺服器15進行後續的身分驗證,且第一資料流103至少包含一收話端號碼,例如:收話端裝置13的電話號碼。 First, the caller device 11 transmits a communication request 101 to the receiver device 13, and the communication request includes at least a display number. Specifically, the display number is the number that the caller end device 11 wants to display to the caller end device 13, for example, the phone number of the caller end device 11. Then, the caller device 11 needs to send the first data stream 103 to the cloud server 15 corresponding to the communication request 101 for subsequent identity verification through the cloud server 15, and the first data stream 103 includes at least a receiver number, for example : The telephone number of the receiving end device 13.

隨後,雲端伺服器15根據第一資料流103中的該收話端號碼,傳送對應發話端裝置11之使用者資料指紋105至收話端裝置13。具體而言,雲端伺服器15從該等使用者資料指紋中選擇對應發話端裝置11之一使用者資料指紋105,且根據該收話端號碼將對應發話端裝置11之該使用者資料指紋105傳送至收話端裝置13。 Subsequently, the cloud server 15 transmits the user data fingerprint 105 corresponding to the calling device 11 to the calling device 13 according to the receiving terminal number in the first data stream 103. Specifically, the cloud server 15 selects one of the user data fingerprints 105 corresponding to the originating end device 11 from the user data fingerprints, and corresponds to the user data fingerprint 105 of the originating end device 11 according to the receiver number. Transmit to the receiving end device 13.

接著,收話端裝置13將藉由雲端伺服器15來驗證該顯示號碼的真實性。具體而言,收話端裝置13基於該顯示號碼及使用者資料指紋105產生一第二資料流107,並將將第二資料流107傳送至雲端伺服器15,以查詢該顯示號碼及使用者資料指紋105是否相符合。 Then, the receiving end device 13 will verify the authenticity of the display number through the cloud server 15. Specifically, the receiving end device 13 generates a second data stream 107 based on the display number and user data fingerprint 105, and sends the second data stream 107 to the cloud server 15 to query the display number and user Whether the data fingerprint 105 matches.

隨後,雲端伺服器15在接收第二資料流107後,判斷第二資 料流107中的該顯示號碼是否對應至使用者資料指紋105。具體而言,若雲端伺服器15判斷該顯示號碼對應至使用者資料指紋105,則表示該顯示號碼為對應發話端裝置11的真實號碼。反之,若該顯示號碼無法對應至使用者資料指紋105,則表示發話端裝置11所提供的顯示號碼為偽造後的號碼。 Subsequently, after receiving the second data stream 107, the cloud server 15 determines that the second data stream 107 Whether the display number in the stream 107 corresponds to the user data fingerprint 105. Specifically, if the cloud server 15 determines that the display number corresponds to the user data fingerprint 105, it means that the display number corresponds to the real number of the caller device 11. Conversely, if the display number cannot correspond to the user data fingerprint 105, it means that the display number provided by the caller device 11 is a forged number.

接著,在雲端伺服器15驗證第二資料流107後,產生驗證結果109,並傳送驗證結果109至收話端裝置13。收話端裝置13即可根據驗證結果109判斷發話端裝置11所發送的通訊請求101之合法性。 Then, after the cloud server 15 verifies the second data stream 107, a verification result 109 is generated, and the verification result 109 is sent to the receiving end device 13. The receiving end device 13 can determine the validity of the communication request 101 sent by the speaking end device 11 according to the verification result 109.

根據前述的驗證機制,當發話端裝置11惡意的偽造顯示號碼時,透過收話端裝置13與雲端伺服器15的驗證運作,收話端裝置13即可得知發話端裝置11發送異常的通訊請求(即,不同於發話端裝置11對應的顯示號碼)。 According to the aforementioned verification mechanism, when the caller device 11 maliciously forges the display number, through the verification operation of the caller device 13 and the cloud server 15, the caller device 13 can learn that the caller device 11 is sending abnormal communication. Request (that is, different from the display number corresponding to the originating device 11).

於某些實施方式中,雲端伺服器15所儲存的使用者資料指紋更對應至銀行帳號,且當發話端裝置11傳送至收話端裝置13的通訊請求101中包含一銀行帳號時。使用者資料指紋驗證運作的系統1更執行以下運作:收話端裝置13傳送至雲端伺服器15的第二資料流107更載有該銀行帳號,俾雲端伺服器15更進一步驗證第二資料流107所載之該該銀行帳號是否對應於使用者資料指紋105,以產生驗證結果109。據此,收話端裝置13及可根據驗證結果109判斷該通訊請求中顯示號碼及該銀行帳號之合法性。 In some embodiments, the user data fingerprint stored in the cloud server 15 further corresponds to a bank account, and when the communication request 101 sent by the caller device 11 to the caller device 13 includes a bank account. The user data fingerprint verification operation system 1 further performs the following operations: the second data stream 107 sent by the receiver device 13 to the cloud server 15 further contains the bank account number, so that the cloud server 15 further verifies the second data stream Whether the bank account number contained in 107 corresponds to the user data fingerprint 105 to generate a verification result 109. Accordingly, the receiver device 13 can determine the legality of the number displayed in the communication request and the bank account number according to the verification result 109.

由上述說明可知,透過本實施方式所提供之使用者資料指紋驗證運作的系統1(包含發話端裝置、收話端裝置及雲端伺服器),藉由要求發話端裝置傳送通訊請求至收話端裝置時,需要對應該通訊請求傳送一第一資料流(其至少包含收話端號碼)至該雲端伺服器,該雲端伺服器再 根據該收話端號碼傳送對應該發話端裝置之一使用者資料指紋至該收話端裝置,該收話端裝置將載有顯示號碼及該使用者資料指紋之第二資料流傳送至該雲端伺服器,由該雲端伺服器驗證該第二資料流以產生驗證結果,透過三方裝置的合作驗證機制藉此避免第三方偽冒者進行惡意行為。 It can be seen from the above description that the system 1 (including the originating device, the receiving device and the cloud server) operating through the fingerprint verification of user data provided by this embodiment, sends a communication request to the receiving device by requesting the originating device to send a communication request to the receiving device Device, it needs to send a first data stream (which includes at least the receiver number) to the cloud server in response to the communication request, and the cloud server According to the receiving terminal number, a user data fingerprint corresponding to the calling terminal device is sent to the receiving terminal device, and the receiving terminal device transmits the second data stream containing the display number and the user data fingerprint to the cloud On the server, the cloud server verifies the second data stream to generate a verification result, and prevents malicious behaviors by third-party counterfeiters through a cooperative verification mechanism of three-party devices.

本發明更透過對於使用者裝置的行為特徵持續性檢驗,使得能夠在維持用戶隱私的前提下(即,敏感的生物資訊儲存於用戶端),透過使用者資料指紋持續掌握用戶的行為,讓用戶之間的行為皆能透過第三方(即,雲端伺服器)的信任轉嫁程序,保證用戶彼此之間的信任價值。此外,本發明更解決習知技術缺乏能對於發話端裝置及帳戶資訊進行驗證的問題。因此,本發明可正確地且有效率地驗證身分,避免有心人士透過偽造身分及資訊進行惡意行為。 In the present invention, by continuously checking the behavior characteristics of the user’s device, the user’s behavior can be continuously grasped through the user’s data fingerprint while maintaining the user’s privacy (that is, sensitive biological information is stored on the user’s end). The behaviors between them can be passed through the trust transfer process of a third party (ie, cloud server) to ensure the trust value between users. In addition, the present invention further solves the problem that the conventional technology lacks the ability to verify the caller device and account information. Therefore, the present invention can accurately and efficiently verify the identity, and prevent the intentional person from performing malicious behaviors by forging identity and information.

本發明之第二實施方式為一種使用者資料指紋驗證運作之發話端裝置,其裝置示意圖係描繪於第2圖。此發話端裝置適用於使用者資料指紋驗證運作的系統中之一發話端裝置,例如第一實施方式所述之發話端裝置11。如第2圖所示,發話端裝置11包含一收發介面1101、一儲存器1103及一處理器1105,且處理器1105電性連接至儲存器1103及收發介面1101。於本實施方式中,發話端裝置11與一雲端伺服器透過網路連線,例如第一實施方式所述之雲端伺服器15。 The second embodiment of the present invention is a caller device for fingerprint verification operation of user data. The schematic diagram of the device is depicted in FIG. 2. This caller device is suitable for a caller device in a system where user data fingerprint verification is performed, such as the caller device 11 described in the first embodiment. As shown in FIG. 2, the calling end device 11 includes a transceiver interface 1101, a storage 1103 and a processor 1105, and the processor 1105 is electrically connected to the storage 1103 and the transceiver interface 1101. In this embodiment, the caller device 11 is connected to a cloud server via a network, such as the cloud server 15 described in the first embodiment.

具體而言,收發介面1101為一可接收及傳輸資料之介面或本發明所屬技術領域中具有通常知識者所知悉之其他可接收及傳輸資料之介面。儲存器1103可為一記憶體、一通用串列匯流排(Universal Serial Bus;USB)碟、一硬碟、一光碟、一隨身碟或本發明所屬技術領域中具有通常 知識者所知且具有相同功能之任何其他儲存媒體或電路。處理器1105可為各種處理器、中央處理單元、微處理器、數位訊號處理器或本發明所屬技術領域中具有通常知識者所知之其他計算裝置。 Specifically, the transceiver interface 1101 is an interface that can receive and transmit data or other interfaces known to those skilled in the art to which the present invention pertains can receive and transmit data. The storage 1103 can be a memory, a Universal Serial Bus (USB) disk, a hard disk, an optical disk, a flash drive, or a conventional device in the technical field of the present invention. Any other storage medium or circuit known to the knowledgeable and having the same function. The processor 1105 can be various processors, central processing units, microprocessors, digital signal processors, or other computing devices known to those skilled in the art to which the present invention pertains.

於本實施方式中,處理器1105執行一驗證程式(未繪示),該驗證程式協助雲端伺服器驗證發話端裝置11的合法性。具體而言,該驗證程式執行以下運作:(a)傳送通訊請求(例如:第一實施方式的通訊請求101)至收話端裝置(例如:第一實施方式的收話端裝置13),其中該通訊請求至少包含一顯示號碼,以及(b)對應該通訊請求傳送第一資料流(例如:第一實施方式的第一資料流103)至該雲端伺服器(例如:第一實施方式的雲端伺服器15),其中該第一資料流至少包含一收話端號碼。 In this embodiment, the processor 1105 executes a verification program (not shown), which assists the cloud server to verify the legitimacy of the caller device 11. Specifically, the verification program performs the following operations: (a) Send a communication request (for example: the communication request 101 of the first embodiment) to the receiving end device (for example: the receiving end device 13 of the first embodiment), where The communication request includes at least a display number, and (b) corresponding to the communication request, a first data stream (for example: the first data stream 103 of the first embodiment) is sent to the cloud server (for example: the cloud of the first embodiment) The server 15), wherein the first data stream includes at least a receiver number.

此外,該雲端伺服器根據該收話端號碼傳送對應該發話端裝置之一使用者資料指紋至該收話端裝置,該收話端裝置將載有該顯示號碼及該使用者資料指紋之一第二資料流傳送至該雲端伺服器,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼及該使用者資料指紋以產生一驗證結果,該收話端裝置根據該驗證結果判斷該通訊請求之一合法性。 In addition, the cloud server sends a user data fingerprint corresponding to the calling device to the receiving device according to the receiving terminal number, and the receiving device will carry the display number and one of the user data fingerprints The second data stream is sent to the cloud server, so that the cloud server verifies the display number and the user data fingerprint contained in the second data stream to generate a verification result, and the receiver device judges according to the verification result The legality of one of the communication requests.

於某些實施方式中,儲存器1103更儲存對應發話端裝置11的一使用者資料及一歷史生物資訊,該使用者資料包含一電話用戶資訊、一通話紀錄及一裝置資訊其中之一或其組合,且處理器1105執行以下運作:基於該使用者資料,產生對應該發話端裝置之該使用者資料指紋。 In some embodiments, the storage 1103 further stores a user data and a historical biological information corresponding to the caller device 11, and the user data includes one of a telephone user information, a call history, and a device information, or And the processor 1105 performs the following operations: based on the user data, generating a fingerprint of the user data corresponding to the caller device.

於某些實施方式中,發話端裝置11更可透過週期性的自我檢驗,以確定用戶的行為是否出現異常(例如:發話端裝置11遺失而被其他人使用)。具體而言,處理器1105更週期性的執行以下運作:收集發話端裝 置11於一時間區間內之一操作行為特徵;基於該使用者資料指紋及該歷史生物資訊,驗證該操作行為特徵的該合法性;以及將該操作行為特徵寫入該使用者資料。 In some embodiments, the originating device 11 can further determine whether the user's behavior is abnormal through periodic self-checks (for example, the originating device 11 is lost and used by others). Specifically, the processor 1105 performs the following operations more periodically: Set 11 an operation behavior characteristic in a time interval; verify the legitimacy of the operation behavior characteristic based on the user data fingerprint and the historical biological information; and write the operation behavior characteristic into the user data.

舉例而言,歷史生物資訊可能包含用戶的生物指紋、臉部辨識、慣用螢幕點擊頻率、加速度計數值(例如:用戶的走路速度快慢等等)等等資訊,發話端裝置11可透過建立機器學習的模型來驗證操作行為,本發明所屬技術領域中具有通常知識者根據上述內容應可理解其產生方式,故不贅言。應理解,由於此類的生物資訊通常包含用戶較為敏感的隱私資訊,因此在本發明中歷史生物資訊僅儲存於用戶端並用於用戶端本身的驗證行為,而不會傳送至雲端伺服器,使得本發明能夠在維持用戶隱私的前提下,持續掌握用戶的行為。 For example, historical biometric information may include the user’s biometric fingerprint, facial recognition, preferred screen click frequency, acceleration count value (for example, the user’s walking speed, etc.), etc. The caller device 11 can establish machine learning The model to verify the operation behavior, the general knowledge in the technical field of the present invention should be able to understand its production method based on the above content, so it will not be repeated. It should be understood that since this type of biometric information usually contains more sensitive privacy information of the user, in the present invention, the historical biometric information is only stored on the client side and used for the verification behavior of the client side itself, and will not be sent to the cloud server, so that The present invention can continuously grasp the user's behavior on the premise of maintaining the user's privacy.

於某些實施方式中,發話端裝置11更週期性的執行以下運作:將該使用者資料傳送至該雲端伺服器儲存,其中該雲端伺服器更執行以下運作:根據該使用者資料產生對應該發話端裝置之該使用者資料指紋;以及週期性的根據該使用者資料指紋驗證發話端裝置11的該合法性。 In some embodiments, the caller device 11 more periodically performs the following operations: sending the user data to the cloud server for storage, wherein the cloud server further performs the following operations: generating a response based on the user data The user data fingerprint of the speaking end device; and periodically verify the legitimacy of the speaking end device 11 based on the user data fingerprint.

於某些實施方式中,其中該通訊請求更包含一銀行帳號,且該收話端裝置傳送至該雲端伺服器的該第二資料流更載有該銀行帳號及該使用者資料指紋,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼、該銀行帳號及該使用者資料指紋以產生該驗證結果,該收話端裝置根據該驗證結果判斷該通訊請求之該合法性。 In some embodiments, the communication request further includes a bank account number, and the second data stream sent from the receiver device to the cloud server further carries the bank account number and the user data fingerprint, so that the The cloud server verifies the display number, the bank account number, and the user data fingerprint contained in the second data stream to generate the verification result, and the receiver device determines the legitimacy of the communication request according to the verification result.

除了上述運作,第二實施方式之發話端裝置11亦能執行第一實施方式之發話端裝置11所執行之所有運作。本發明所屬技術領域中具有 通常知識者可直接瞭解第二實施方式如何基於上述第一實施方式以執行此等運作,具有同樣之功能,並達到同樣之技術效果,故不贅述。 In addition to the above operations, the caller device 11 of the second embodiment can also perform all operations performed by the caller device 11 of the first embodiment. The technical field of the present invention has Generally, the knowledgeable person can directly understand how the second embodiment performs these operations based on the above-mentioned first embodiment, has the same function, and achieves the same technical effect, so it will not be repeated.

本發明之第三實施方式為一種使用者資料指紋驗證運作之收話端裝置,其裝置示意圖係描繪於第3圖。此發話端裝置適用於使用者資料指紋驗證運作的系統中之一收話端裝置,例如第一實施方式所述之發話端裝置13。如第3圖所示,收話端裝置13包含一收發介面1301、一儲存器1303及一處理器1305,且處理器1305電性連接至儲存器1303及收發介面1301。於本實施方式中,收話端裝置13與一雲端伺服器透過網路連線,例如第一實施方式所述之雲端伺服器15。 The third embodiment of the present invention is a receiver device for fingerprint verification of user data. The schematic diagram of the device is depicted in FIG. 3. The caller device is suitable for a caller device in a system for fingerprint verification of user data, such as the caller device 13 described in the first embodiment. As shown in FIG. 3, the receiver device 13 includes a transceiver interface 1301, a storage 1303, and a processor 1305, and the processor 1305 is electrically connected to the storage 1303 and the transceiver interface 1301. In this embodiment, the receiver device 13 is connected to a cloud server via a network, such as the cloud server 15 described in the first embodiment.

具體而言,收發介面1301為一可接收及傳輸資料之介面或本發明所屬技術領域中具有通常知識者所知悉之其他可接收及傳輸資料之介面。儲存器1303可為一記憶體、一通用串列匯流排(Universal Serial Bus;USB)碟、一硬碟、一光碟、一隨身碟或本發明所屬技術領域中具有通常知識者所知且具有相同功能之任何其他儲存媒體或電路。處理器1305可為各種處理器、中央處理單元、微處理器、數位訊號處理器或本發明所屬技術領域中具有通常知識者所知之其他計算裝置。 Specifically, the transceiver interface 1301 is an interface that can receive and transmit data or other interfaces known to those skilled in the art to which the present invention pertains can receive and transmit data. The storage 1303 can be a memory, a Universal Serial Bus (USB) disk, a hard disk, an optical disk, a flash drive, or a person with ordinary knowledge in the technical field of the present invention knows and has the same Function of any other storage medium or circuit. The processor 1305 can be various processors, central processing units, microprocessors, digital signal processors, or other computing devices known to those skilled in the art to which the present invention pertains.

於本實施方式中,處理器1305執行一驗證程式(未繪示),該驗證程式協助雲端伺服器驗證發話端裝置11的合法性。具體而言,該驗證程式執行以下運作:(a)自發話端裝置(例如:第一實施方式的發話端裝置11)接收通訊請求(例如:第一實施方式的通訊請求101),其中該通訊請求至少包含一顯示號碼,且該發話端裝置對應該通訊請求傳送至少包含一收話端號碼的一第一資料流(例如:第一實施方式的第一資料流103)至 該雲端伺服器(例如:第一實施方式的雲端伺服器15),(b)自該雲端伺服器接收對應該發話端裝置之一使用者資料指紋,(c)產生一第二資料流(例如:第一實施方式的第二資料流107),其中該第二資料流載有該顯示號碼及該使用者資料指紋,(d)傳送該第二資料流至該雲端伺服器,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼及該使用者資料指紋以產生一驗證結果(例如:第一實施方式的驗證結果109),以及(e)自該雲端伺服器接收該驗證結果,以判斷該通訊請求之一合法性。 In this embodiment, the processor 1305 executes a verification program (not shown), which assists the cloud server to verify the legitimacy of the caller device 11. Specifically, the verification program performs the following operations: (a) A communication request (for example, the communication request 101 of the first embodiment) is received from the caller device (for example: the caller device 11 of the first embodiment), wherein the communication The request includes at least a display number, and the originating device transmits a first data stream (for example, the first data stream 103 of the first embodiment) that includes at least a receiver number in response to the communication request to The cloud server (for example: the cloud server 15 of the first embodiment), (b) receives from the cloud server a user data fingerprint corresponding to the calling device, (c) generates a second data stream (for example, :The second data stream 107 of the first embodiment), wherein the second data stream carries the display number and the user data fingerprint, (d) sending the second data stream to the cloud server for the cloud server The device verifies the display number and the user data fingerprint contained in the second data stream to generate a verification result (for example, the verification result 109 of the first embodiment), and (e) receives the verification result from the cloud server , To determine the legitimacy of one of the communication requests.

於某些實施方式中,該使用者資料指紋與一使用者資料相關,且該使用者資料包含一電話用戶資訊、一通話紀錄及一裝置資訊其中之一或其組合。 In some embodiments, the user data fingerprint is related to a user data, and the user data includes one or a combination of a phone user information, a call log, and a device information.

於某些實施方式中,該通訊請求更包含一銀行帳號,且該第二資料流更載有該銀行帳號,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼、該銀行帳號及該使用者資料指紋以產生該驗證結果。 In some embodiments, the communication request further includes a bank account number, and the second data stream further carries the bank account number, so that the cloud server verifies the display number and the bank account number contained in the second data stream And the user data fingerprint to generate the verification result.

除了上述運作,第三實施方式之收話端裝置13亦能執行第一實施方式之收話端裝置13所執行之所有運作。本發明所屬技術領域中具有通常知識者可直接瞭解第三實施方式如何基於上述第一實施方式以執行此等運作,具有同樣之功能,並達到同樣之技術效果,故不贅述。 In addition to the above operations, the receiving end device 13 of the third embodiment can also perform all the operations performed by the receiving end device 13 of the first embodiment. Those with ordinary knowledge in the technical field to which the present invention pertains can directly understand how the third embodiment performs these operations based on the above-mentioned first embodiment, has the same functions, and achieves the same technical effects, so it is not repeated here.

本發明之第四實施方式為一種使用者資料指紋驗證運作之雲端伺服器,其裝置示意圖係描繪於第4圖。此雲端伺服器適用於使用者資料指紋驗證運作的系統中之一雲端伺服器,例如第一實施方式所述之雲端伺服器15。如第4圖所示,雲端伺服器15包含一收發介面1501、一儲存器1503及一處理器1505,且處理器1505電性連接至儲存器1503及收發介面1501。 於本實施方式中,雲端伺服器15與複數個使用者裝置透過網路連線,且該等使用者裝置中包含一發話端裝置及一收話端裝置,例如第一實施方式所述之發話端裝置11及收話端裝置13。儲存器1503儲存複數個使用者資料指紋,其中各該使用者資料指紋對應至該等使用者裝置其中之一。 The fourth embodiment of the present invention is a cloud server for user data fingerprint verification operation. The schematic diagram of the device is depicted in FIG. 4. This cloud server is suitable for one of the cloud servers in the system for fingerprint verification of user data, such as the cloud server 15 described in the first embodiment. As shown in FIG. 4, the cloud server 15 includes a transceiver interface 1501, a storage 1503, and a processor 1505, and the processor 1505 is electrically connected to the storage 1503 and the transceiver interface 1501. In this embodiment, the cloud server 15 is connected to a plurality of user devices via a network, and the user devices include a caller device and a receiver device, such as the caller described in the first embodiment The end device 11 and the receiving end device 13. The storage 1503 stores a plurality of user data fingerprints, and each of the user data fingerprints corresponds to one of the user devices.

於本實施方式中,雲端伺服器15協助收話端裝置13驗證發話端裝置11的合法性。具體而言,處理器1505執行下列運作:(a)自該發話端裝置接收一第一資料流(例如:第一實施方式的第一資料流103),其中該第一資料流至少包含一收話端號碼,且該第一資料流與該發話端裝置傳送至該收話端裝置之一通訊請求(例如:第一實施方式的通訊請求101)相關,(b)從該等使用者資料指紋中選擇對應該發話端裝置之一使用者資料指紋(例如:第一實施方式的使用者資料指紋105),且根據該收話端號碼,將對應該發話端裝置之該使用者資料指紋傳送至該收話端裝置,(c)自該收話端裝置接收一第二資料流(例如:第一實施方式的第二資料流107),該第二資料流載有一顯示號碼及對應該發話端裝置之該使用者資料指紋,以及(d)驗證該第二資料流所載之該顯示號碼及對應該發話端裝置之該使用者資料指紋以產生一驗證結果(例如:第一實施方式的驗證結果109),傳送該驗證結果至該收話端裝置。 In this embodiment, the cloud server 15 assists the receiving end device 13 to verify the legitimacy of the speaking end device 11. Specifically, the processor 1505 performs the following operations: (a) receiving a first data stream (for example, the first data stream 103 of the first embodiment) from the originating end device, wherein the first data stream includes at least one receiving Terminal number, and the first data stream is related to a communication request (for example: communication request 101 in the first embodiment) sent from the calling terminal device to the receiving terminal device, (b) fingerprints from the user data Select one of the user data fingerprints corresponding to the originating device (for example: user data fingerprint 105 of the first embodiment), and according to the receiver number, send the user data fingerprint corresponding to the originating device to The receiving end device (c) receives a second data stream (for example: the second data stream 107 of the first embodiment) from the receiving end device, and the second data stream carries a display number and corresponding to the speaking end The user data fingerprint of the device, and (d) verify the display number contained in the second data stream and the user data fingerprint corresponding to the caller device to generate a verification result (for example, the verification of the first embodiment) Result 109), the verification result is transmitted to the receiving end device.

於某些實施方式中,儲存器1503更儲存各該使用者裝置之一使用者資料,該使用者資料包含一電話用戶資訊、一通話紀錄及一裝置資訊其中之一或其組合,且處理器1505執行下列運作:基於該等使用者資料,產生該等使用者資料指紋。 In some embodiments, the storage 1503 further stores user data of one of the user devices, the user data including one or a combination of a phone user information, a call log, and a device information, and the processor 1505 performs the following operations: based on the user data, generating the user data fingerprints.

於某些實施方式中,處理器1505更週期性的執行下列運作: 自各該使用者裝置接收各該使用者資料;根據各該使用者資料產生對應各該使用者裝置之該使用者資料指紋;以及根據各該使用者資料指紋驗證各該使用者裝置的該合法性。 In some embodiments, the processor 1505 performs the following operations more periodically: Receive each user data from each user device; generate the user data fingerprint corresponding to each user device based on each user data; and verify the legitimacy of each user device based on each user data fingerprint .

於某些實施方式中,儲存器1503更儲存對應至各該使用者裝置之一銀行帳號,該發話端裝置傳送至該收話端裝置之該通訊請求更包含一銀行帳號,雲端伺服器15自該收話端裝置接收之該第二資料流更載有該銀行帳號,俾雲端伺服器15驗證該第二資料流所載之該顯示號碼、該銀行帳號及該使用者資料指紋以產生該驗證結果。 In some embodiments, the storage 1503 further stores a bank account corresponding to each of the user devices, the communication request sent by the caller device to the receiver device further includes a bank account, and the cloud server 15 automatically The second data stream received by the receiver device further contains the bank account number, and the cloud server 15 verifies the display number, the bank account number, and the user data fingerprint contained in the second data stream to generate the verification result.

於某些實施方式中,雲端伺服器15更透過建立與該等使用者資料指紋相關之機器學習模型,來驗證各該使用者裝置是否異常。 In some embodiments, the cloud server 15 further establishes a machine learning model related to the user data fingerprints to verify whether each user device is abnormal.

除了上述運作,第四實施方式之雲端伺服器15亦能執行第一實施方式之雲端伺服器15所執行之所有運作。本發明所屬技術領域中具有通常知識者可直接瞭解第四實施方式如何基於上述第一實施方式以執行此等運作,具有同樣之功能,並達到同樣之技術效果,故不贅述。 In addition to the above operations, the cloud server 15 of the fourth embodiment can also perform all operations performed by the cloud server 15 of the first embodiment. Those with ordinary knowledge in the technical field to which the present invention pertains can directly understand how the fourth embodiment performs these operations based on the above-mentioned first embodiment, has the same functions, and achieves the same technical effects, so it is not repeated here.

需說明者,於本發明專利說明書及申請專利範圍中,某些用語(包含資料流)前被冠以「第一」或「第二」,該等「第一」及「第二」僅用來區分不同之用語。例如:第一資料流及第二資料流中之「第一」及「第二」僅用來表示不同資料流。 It should be clarified that certain terms (including data flow) are preceded by "first" or "second" in the specification of the invention patent and the scope of the patent application. These "first" and "second" are only used To distinguish different terms. For example: "First" and "Second" in the first data stream and the second data stream are only used to indicate different data streams.

綜上所述,本發明所提供之使用者資料指紋驗證運作技術(至少包含發話端裝置、收話端裝置及雲端伺服器),藉由要求發話端裝置傳送通訊請求至收話端裝置時,需要對應該通訊請求傳送一第一資料流(其至少包含收話端號碼)至該雲端伺服器,該雲端伺服器再根據該收話端號 碼傳送對應該發話端裝置之一使用者資料指紋至該收話端裝置,該收話端裝置將載有顯示號碼及該使用者資料指紋之第二資料流傳送至該雲端伺服器,由該雲端伺服器驗證該第二資料流以產生驗證結果,透過三方裝置的合作驗證機制,藉此避免第三方偽冒者進行惡意行為。 In summary, the user data fingerprint verification operation technology provided by the present invention (including at least the caller device, receiver device and cloud server), by requesting the caller device to send a communication request to the receiver device, In response to the communication request, a first data stream (which includes at least the receiving terminal number) needs to be sent to the cloud server, and the cloud server then according to the receiving terminal number The code sends a user data fingerprint corresponding to the calling end device to the receiving end device, and the receiving end device sends the second data stream containing the display number and the user data fingerprint to the cloud server. The cloud server verifies the second data stream to generate a verification result, through a cooperative verification mechanism of three-party devices, thereby avoiding malicious behaviors by third-party counterfeiters.

本發明更透過對於使用者裝置的行為特徵持續性檢驗,使得能夠在維持用戶隱私的前提下(即,敏感的生物資訊儲存於用戶端),透過使用者資料指紋持續掌握用戶的行為,讓用戶之間的行為皆能透過第三方(即,雲端伺服器)的信任轉嫁程序,保證用戶彼此之間的信任價值。此外,本發明更解決習知技術缺乏能對於發話端裝置及帳戶資訊進行驗證的問題。因此,本發明可正確地且有效率地驗證身分,避免有心人士透過偽造身分及資訊進行惡意行為。 In the present invention, by continuously checking the behavior characteristics of the user’s device, the user’s behavior can be continuously grasped through the user’s data fingerprint while maintaining the user’s privacy (that is, sensitive biological information is stored on the user’s end). The behaviors between them can be passed through the trust transfer process of a third party (ie, cloud server) to ensure the trust value between users. In addition, the present invention further solves the problem that the conventional technology lacks the ability to verify the caller device and account information. Therefore, the present invention can accurately and efficiently verify the identity, and prevent the intentional person from performing malicious behaviors by forging identity and information.

上述實施方式僅用來例舉本發明之部分實施態樣,以及闡釋本發明之技術特徵,而非用來限制本發明之保護範疇及範圍。任何本發明所屬技術領域中具有通常知識者可輕易完成之改變或均等性之安排均屬於本發明所主張之範圍,而本發明之權利保護範圍以申請專利範圍為準。 The above-mentioned embodiments are only used to exemplify part of the implementation aspects of the present invention and to explain the technical features of the present invention, and are not used to limit the protection scope and scope of the present invention. Any change or equal arrangement that can be easily accomplished by a person with ordinary knowledge in the technical field of the present invention belongs to the scope of the present invention, and the protection scope of the present invention is subject to the scope of the patent application.

1:使用者資料指紋驗證運作系統 1: User data fingerprint verification operating system

11:發話端裝置 11: Talking device

13:收話端裝置 13: Receiver device

15:雲端伺服器 15: Cloud server

101:通訊請求 101: Communication request

103:第一資料流 103: First data stream

105:使用者資料指紋 105: User data fingerprint

107:第二資料流 107: Second data stream

109:驗證結果 109: Verification Results

Claims (7)

一種使用者資料指紋驗證運作之發話端裝置,該發話端裝置與一雲端伺服器透過網路連線,該發話端裝置包含:一儲存器,儲存對應該發話端裝置的一使用者資料,其中該使用者資料包含一電話用戶資訊、一通話紀錄以及一裝置資訊其中之一或其組合;一收發介面,將該使用者資料傳送至該雲端伺服器儲存,俾該雲端伺服器根據該使用者資料產生對應該發話端裝置之一使用者資料指紋;一處理器,電性連接至該儲存器及該收發介面,且執行一驗證程式,該驗證程式執行以下運作:(a)傳送一通訊請求至一收話端裝置,其中該通訊請求至少包含一顯示號碼;以及(b)對應該通訊請求傳送一第一資料流至該雲端伺服器,其中該第一資料流至少包含一收話端號碼;其中,該雲端伺服器根據該收話端號碼傳送對應該發話端裝置之該使用者資料指紋至該收話端裝置,該收話端裝置將載有該顯示號碼及該使用者資料指紋之一第二資料流傳送至該雲端伺服器,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼及該使用者資料指紋以產生一驗證結果,該收話端裝置根據該驗證結果判斷該通訊請求之一合法性。 A caller device for fingerprint verification of user data. The caller device is connected to a cloud server via a network. The caller device includes: a memory for storing a user data corresponding to the caller device. The user data includes one or a combination of phone user information, a call log, and device information; a transceiver interface sends the user data to the cloud server for storage, so that the cloud server is based on the user The data generation corresponds to a user data fingerprint of the calling device; a processor is electrically connected to the storage and the transceiver interface, and executes a verification program, which performs the following operations: (a) Send a communication request To a receiver device, where the communication request includes at least a display number; and (b) corresponding to the communication request, send a first data stream to the cloud server, wherein the first data stream includes at least a receiver number ; Wherein, the cloud server sends the user data fingerprint corresponding to the calling device to the receiving device according to the receiving terminal number, and the receiving device will carry the display number and the fingerprint of the user data A second data stream is sent to the cloud server, so that the cloud server verifies the display number and the user data fingerprint contained in the second data stream to generate a verification result, and the receiver device according to the verification result Determine the legitimacy of one of the communication requests. 如請求項1所述之發話端裝置,其中該儲存器更儲存對應該發話端裝置的一歷史生物資訊,該處理器更週期性的執行以下運作:收集該發話端裝置於一時間區間內之一操作行為特徵; 基於該使用者資料指紋及該歷史生物資訊,驗證該操作行為特徵的該合法性;以及將該操作行為特徵寫入該使用者資料。 The caller device according to claim 1, wherein the memory further stores a historical biological information corresponding to the caller device, and the processor more periodically performs the following operations: collect the caller device in a time interval 1. Operating behavior characteristics; Verify the legitimacy of the operating behavior feature based on the user data fingerprint and the historical biological information; and write the operating behavior feature into the user data. 如請求項1所述之發話端裝置,其中該通訊請求更包含一銀行帳號,且該收話端裝置傳送至該雲端伺服器的該第二資料流更載有該銀行帳號及該使用者資料指紋,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼、該銀行帳號及該使用者資料指紋以產生該驗證結果,該收話端裝置根據該驗證結果判斷該通訊請求之該合法性。 The caller device according to claim 1, wherein the communication request further includes a bank account, and the second data stream sent by the caller device to the cloud server further contains the bank account and the user data Fingerprint, so that the cloud server verifies the display number, the bank account number, and the user data fingerprint contained in the second data stream to generate the verification result, and the receiver device determines the communication request according to the verification result legality. 一種使用者資料指紋驗證運作之收話端裝置,該收話端裝置與一雲端伺服器透過網路連線,一發話端裝置將該發話端裝置的一使用者資料傳送至該雲端伺服器儲存,該使用者資料包含一電話用戶資訊、一通話紀錄以及一裝置資訊其中之一或其組合,該雲端伺服器根據該使用者資料產生對應該發話端裝置之一使用者資料指紋,該收話端裝置包含:一收發介面;一儲存器;一處理器,電性連接至該儲存器及該收發介面,且執行一驗證程式,該驗證程式執行以下運作:(a)自一發話端裝置接收一通訊請求,其中該通訊請求至少包含一顯示號碼,且該發話端裝置對應該通訊請求傳送至少包含一收話端號碼的一第一資料流至該雲端伺服器;(b)自該雲端伺服器接收對應該發話端裝置之一使用者資料指紋; (c)產生一第二資料流,其中該第二資料流載有該顯示號碼及該使用者資料指紋;(d)傳送該第二資料流至該雲端伺服器,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼及該使用者資料指紋以產生一驗證結果;以及(e)自該雲端伺服器接收該驗證結果,以判斷該通訊請求之一合法性。 A receiver device for fingerprint verification of user data. The receiver device is connected to a cloud server via a network, and a caller device sends a user data of the caller device to the cloud server for storage The user data includes one or a combination of a phone user information, a call log, and a device information. The cloud server generates a user data fingerprint corresponding to one of the calling end devices based on the user data, and the call is received The end device includes: a transceiver interface; a memory; a processor, which is electrically connected to the memory and the transceiver interface, and executes a verification program that performs the following operations: (a) receiving from a caller device A communication request, wherein the communication request includes at least a display number, and the caller device sends a first data stream including at least a receiver number to the cloud server in response to the communication request; (b) from the cloud server The device receives a user data fingerprint corresponding to one of the calling device; (c) Generate a second data stream, wherein the second data stream carries the display number and the user data fingerprint; (d) Send the second data stream to the cloud server so that the cloud server can verify the The display number and the user data fingerprint contained in the second data stream are used to generate a verification result; and (e) the verification result is received from the cloud server to determine the legitimacy of the communication request. 如請求項4所述之收話端裝置,其中該通訊請求更包含一銀行帳號,且該第二資料流更載有該銀行帳號,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼、該銀行帳號及該使用者資料指紋以產生該驗證結果。 The receiver device according to claim 4, wherein the communication request further includes a bank account number, and the second data stream further carries the bank account number, so that the cloud server verifies the second data stream. Display the number, the bank account number and the fingerprint of the user data to generate the verification result. 一種使用者資料指紋驗證運作之雲端伺服器,該雲端伺服器與複數個使用者裝置透過網路連線,該等使用者裝置中包含一發話端裝置及一收話端裝置,該雲端伺服器包含:一收發介面,自各該使用者裝置接收對應之一使用者資料,其中各該使用者資料包含一電話用戶資訊、一通話紀錄及一裝置資訊其中之一或其組合;一處理器,電性連接至該收發介面,根據各該使用者資料產生對應各該使用者裝置之該使用者資料指紋;一儲存器,電性連接至該處理器,且儲存該等使用者資料指紋;其中該處理器更執行下列運作:(a)自該發話端裝置接收一第一資料流,其中該第一資料流至少包含一收話端號碼,且該第一資料流與該發話端裝置傳送至該收話端裝 置之一通訊請求相關;(b)從該等使用者資料指紋中選擇對應該發話端裝置之該使用者資料指紋,且根據該收話端號碼,將對應該發話端裝置之該使用者資料指紋傳送至該收話端裝置;(c)自該收話端裝置接收一第二資料流,該第二資料流載有一顯示號碼及對應該發話端裝置之該使用者資料指紋;以及(d)驗證該第二資料流所載之該顯示號碼及對應該發話端裝置之該使用者資料指紋以產生一驗證結果,傳送該驗證結果至該收話端裝置。 A cloud server for fingerprint verification operation of user data. The cloud server is connected to a plurality of user devices via a network. The user devices include an originating device and a receiving device. The cloud server Including: a transceiver interface for receiving corresponding user data from each user device, wherein each user data includes one or a combination of a telephone user information, a call log, and a device information; a processor, a telephone Is electrically connected to the transceiver interface to generate the user data fingerprint corresponding to each user device based on each user data; a memory is electrically connected to the processor and stores the user data fingerprints; wherein the The processor further performs the following operations: (a) receiving a first data stream from the originating end device, wherein the first data stream includes at least a receiving end number, and the first data stream and the originating end device are sent to the Receiving end Set a communication request related; (b) Select the user data fingerprint corresponding to the calling end device from the user data fingerprints, and according to the receiving end number, the user data corresponding to the calling end device The fingerprint is sent to the receiving end device; (c) a second data stream is received from the receiving end device, the second data stream carries a display number and the user data fingerprint corresponding to the speaking end device; and (d ) Verify the display number contained in the second data stream and the user data fingerprint corresponding to the caller end device to generate a verification result, and send the verification result to the caller end device. 如請求項6所述之雲端伺服器,其中該儲存器更儲存對應至各該使用者裝置之一銀行帳號,該發話端裝置傳送至該收話端裝置之該通訊請求更包含一銀行帳號,雲端伺服器自該收話端裝置接收之該第二資料流更載有該銀行帳號,俾該雲端伺服器驗證該第二資料流所載之該顯示號碼、該銀行帳號及該使用者資料指紋以產生該驗證結果。 The cloud server according to claim 6, wherein the storage further stores a bank account corresponding to each of the user devices, and the communication request sent by the caller device to the receiver device further includes a bank account, The second data stream received by the cloud server from the receiver device further contains the bank account number, so that the cloud server verifies the display number, the bank account number and the user data fingerprint contained in the second data stream To produce the verification result.
TW109106823A 2020-02-27 2020-02-27 Speaking end device, receiving end device and cloud server of user data fingerprint verification operation TWI744810B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW109106823A TWI744810B (en) 2020-02-27 2020-02-27 Speaking end device, receiving end device and cloud server of user data fingerprint verification operation
JP2020140862A JP6991522B2 (en) 2020-02-27 2020-08-24 Sender device, receiver device and cloud server for user data fingerprint verification operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109106823A TWI744810B (en) 2020-02-27 2020-02-27 Speaking end device, receiving end device and cloud server of user data fingerprint verification operation

Publications (2)

Publication Number Publication Date
TW202133598A TW202133598A (en) 2021-09-01
TWI744810B true TWI744810B (en) 2021-11-01

Family

ID=77661441

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109106823A TWI744810B (en) 2020-02-27 2020-02-27 Speaking end device, receiving end device and cloud server of user data fingerprint verification operation

Country Status (2)

Country Link
JP (1) JP6991522B2 (en)
TW (1) TWI744810B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949889A (en) * 2006-11-01 2007-04-18 华为技术有限公司 Method and apparatus for implementing call service
CN101635743A (en) * 2009-04-02 2010-01-27 浙江亚斯特科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder
CN101895610A (en) * 2010-08-03 2010-11-24 杭州华三通信技术有限公司 Voice recognition-based phone calling method and device
TW201324207A (en) * 2011-12-14 2013-06-16 Jian-Fu Guo System and method for providing telephone number related information, and program product thereof
CN103716332A (en) * 2013-11-15 2014-04-09 侯贺杰 Internet identity authentication method based on incoming calls
US9060057B1 (en) * 2013-03-07 2015-06-16 Serdar Artun Danis Systems and methods for caller ID authentication, spoof detection and list based call handling
TWI504228B (en) * 2012-10-25 2015-10-11 Chunghwa Telecom Co Ltd Method for verifying phone swindle
CN106453787A (en) * 2016-09-05 2017-02-22 努比亚技术有限公司 Call request identification device and method and call request sending device and method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1042366A (en) * 1996-07-24 1998-02-13 Nec Corp Radio subscriber station verification method
JP2002229951A (en) 2001-02-07 2002-08-16 Toyo Commun Equip Co Ltd Person identification system
JP2003198730A (en) 2001-12-25 2003-07-11 Canon Inc Service provider apparatus, authentication method, program, and storage medium
JP2003216237A (en) 2002-01-21 2003-07-31 Nec San-Ei Instruments Ltd Remote monitoring system
JP5646403B2 (en) * 2011-07-08 2014-12-24 日本電信電話株式会社 Authentication apparatus, authentication method, and authentication program

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949889A (en) * 2006-11-01 2007-04-18 华为技术有限公司 Method and apparatus for implementing call service
CN101635743A (en) * 2009-04-02 2010-01-27 浙江亚斯特科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder
CN101895610A (en) * 2010-08-03 2010-11-24 杭州华三通信技术有限公司 Voice recognition-based phone calling method and device
TW201324207A (en) * 2011-12-14 2013-06-16 Jian-Fu Guo System and method for providing telephone number related information, and program product thereof
TWI504228B (en) * 2012-10-25 2015-10-11 Chunghwa Telecom Co Ltd Method for verifying phone swindle
US9060057B1 (en) * 2013-03-07 2015-06-16 Serdar Artun Danis Systems and methods for caller ID authentication, spoof detection and list based call handling
CN103716332A (en) * 2013-11-15 2014-04-09 侯贺杰 Internet identity authentication method based on incoming calls
CN106453787A (en) * 2016-09-05 2017-02-22 努比亚技术有限公司 Call request identification device and method and call request sending device and method

Also Published As

Publication number Publication date
JP2021136000A (en) 2021-09-13
JP6991522B2 (en) 2022-01-12
TW202133598A (en) 2021-09-01

Similar Documents

Publication Publication Date Title
US11755693B1 (en) Authentication of encrypted media based on immutable ledgers
US11856132B2 (en) Validating automatic number identification data
US6968453B2 (en) Secure integrated device with secure, dynamically-selectable capabilities
US7028184B2 (en) Technique for digitally notarizing a collection of data streams
US6948066B2 (en) Technique for establishing provable chain of evidence
US20020095586A1 (en) Technique for continuous user authentication
US20020095587A1 (en) Smart card with integrated biometric sensor
US20020095296A1 (en) Technique for improved audio compression
CN111476572B (en) Block chain-based data processing method, device, storage medium and equipment
KR20160110536A (en) Continuous voice authentication for a mobile device
CN105868970B (en) authentication method and electronic equipment
JPH03179863A (en) Method and equipment for automatic transaction
CN110691085B (en) Login method, login device, password management system and computer readable medium
KR101762615B1 (en) Identification system and user terminal using usage pattern analysis
EP2943944A1 (en) Audio-based electronic transaction authorization system and method
WO2020102974A1 (en) Data access method, data access apparatus, and mobile terminal
EP2160863A1 (en) Multiple user authentications on a communications device
CN111949959B (en) Authorization authentication method and device in Oauth protocol
CN108566371B (en) Social authentication method, system and terminal equipment
KR20100029102A (en) Identity assertion
TWI744810B (en) Speaking end device, receiving end device and cloud server of user data fingerprint verification operation
CN115086005B (en) Electronic signature mutual signing method and system among multiple systems, electronic equipment and storage medium
US11599607B2 (en) Authentication method and system for a telecommunications system
TW202101950A (en) Mobile network address based verification system and method thereof
JP5495333B2 (en) Authentication device, authentication system, authentication method, and program