US20070201443A1 - VoIP caller authentication by voice signature continuity - Google Patents
VoIP caller authentication by voice signature continuity Download PDFInfo
- Publication number
- US20070201443A1 US20070201443A1 US11/350,687 US35068706A US2007201443A1 US 20070201443 A1 US20070201443 A1 US 20070201443A1 US 35068706 A US35068706 A US 35068706A US 2007201443 A1 US2007201443 A1 US 2007201443A1
- Authority
- US
- United States
- Prior art keywords
- voice
- voice signature
- user
- certificate
- segment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
Definitions
- the present invention relates generally to voice communications and, more particularly, to Voice over Internet Protocol (VOIP) caller authentication by voice signature continuity.
- VOIP Voice over Internet Protocol
- PSTN Public Switched Telephone Network
- VoIP Voice over Internet Protocol
- VoIP Voice over Internet Protocol
- VoIP Voice over Internet Protocol
- VoIP Voice over Internet Protocol
- a calling party can spoof the caller ID at will.
- SIP Session Initiation Protocol
- the corresponding voice path of the Session Initiation Protocol (SIP) session can be hijacked such that a called party talks to a different person than that identifier by the caller ID after the SIP signaling path is successfully established.
- SIP Session Initiation Protocol
- Embodiments of the present invention are directed to Voice Over Internet Protocol (VoIP) caller authentication by voice signature continuity.
- VoIP Voice Over Internet Protocol
- a method for authenticating a user includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call.
- the VoIP call further has a voice conversation portion.
- the voice signature certificate includes a voice signature segment.
- the method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
- VoIP Voice over Internet Protocol
- a method for authenticating a user includes forming a voice signature certificate for the user.
- the voice signature certificate includes a voice signature segment.
- the method includes sending the voice signature certificate to a called device in response to a setup portion of a Voice over Internet Protocol (VoIP) call to the called device, to enable a subsequent verification of voice continuity from the setup portion to a subsequent voice signature portion of the VoIP call.
- VoIP Voice over Internet Protocol
- a system for authenticating a user includes a voice signature continuity verification device configured to verify a voice continuity of the user from a setup portion to a voice conversation portion of a Voice over Internet Protocol (VoIP) call, by receiving a voice signature certificate corresponding to the setup portion of the VoIP call, the voice signature certificate including a voice signature segment, and by reproducing the voice signature segment to enable verification of the voice continuity.
- the verification is performed by comparing the voice signature segment to a user' voice during the voice conversation portion.
- VoIP Voice over Internet Protocol
- a system for authenticating a user includes a voice signature certificate forming device configured to form a voice signature certificate for the user.
- the voice signature certificate includes a voice signature segment.
- the system further includes a call setup voice signature certificate manager configured to send the voice signature certificate to a called device in response to a setup portion of a Voice over Internet Protocol (VoIP) call to the called device, to enable a subsequent verification of voice continuity from the setup portion to a subsequent voice signature portion of the VoIP call.
- VoIP Voice over Internet Protocol
- FIG. 1 is a diagram illustrating an exemplary environment in which embodiments of the present invention may be applied.
- FIG. 2 is a diagram illustrating an exemplary method for Voice over Internet Protocol (VoIP) authentication by voice signature continuity.
- VoIP Voice over Internet Protocol
- Embodiments of the present invention implement methods and systems for Voice over Internet Protocol (VoIP) authentication by voice signature continuity.
- VoIP Voice over Internet Protocol
- voice signature continuity it may be verified whether or not the person identified by a caller identification is the same person speaking during the corresponding voice conversation. That is, voice signature continuity may be utilized such that a voice signature sent to a called party or called machine during a call session setup matches a voice signature sent to the called party or called device during the subsequent corresponding voice conversation.
- FIGURES may be implemented in various forms of hardware, software or combinations thereof. Preferably, these elements are implemented in software on one or more appropriately programmed general-purpose digital computers having a processor and memory and input/output interfaces.
- Embodiments of the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment including both hardware and software elements.
- Such software includes but is not limited to firmware, resident software, middleware, microcode, and so forth.
- a computer-usable or computer-readable medium can be any apparatus that may include, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
- a data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements through a system bus.
- the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code to reduce the number of times code is retrieved from bulk storage during execution.
- I/O devices including but not limited to keyboards, displays, pointing devices, etc. may be coupled to the system either directly or through intervening I/O controllers.
- Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks.
- Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
- FIG. 1 an environment in which embodiments of the present invention may be applied is indicated generally by the reference numeral 100 .
- the environment 100 includes a called party's phone 150 , a Voice over Internet Protocol (VoIP) gateway 160 , a network (e.g., the Internet) 170 , and a calling entity 180 (e.g., a bank, etc.).
- the calling entity 180 may include one or more phones 180 A.
- the called party's phone 150 is connected in signal communication with the VoIP gateway 160 which, in turn, is connected to the network 170 .
- the network is connected in signal communication with the calling entity 180 .
- the calling entity 180 is one that includes multiple phones and, hence, multiple possible calling parties.
- embodiments of the present invention are not limited to such a configuration and may be implemented with respect to different numbers of calling entities (e.g., more than one) and different numbers of calling parties (e.g., one or more than one) at each of the calling entities than that shown in FIG. 1 .
- the voice signature certificate is described herein with respect to a single voice signature corresponding to a single calling party being included in the voice signature certificate, in other embodiments, more than one voice signature may be included in a voice signature certificate for cases where more than one possible calling party may call from the same calling entity. In such a case, it is preferably, but not mandatory, that the included voice signatures be short enough so as to not cause undue delay in listening/evaluating the included voice signatures with respect to the actual voice of the calling party during the voice conversation portion of the call.
- An illustrative embodiment of the present invention includes a system 110 for Voice over Internet Protocol (VoIP) caller authentication by voice signature continuity.
- the system 110 includes a voice signature certificate device 112 and a voice signature continuity verification device 114 .
- the voice signature certificate device 112 may include a voice signature extractor 112 A, a voice signature certificate forming device 112 B, and a call setup voice signature certificate manager 112 C.
- the voice signature certificate device 112 may be configured to process a voice signature certificate 177 during a call setup.
- the voice signature certificate forming device 112 B may be configured to form a voice signature certificate, e.g., using a voice signature extracted by the voice signature extractor 112 A.
- the voice signature certificate 177 may be pre-created (i.e., prior to a particular call(s)) or dynamically created upon the initiation of a call (i.e., upon call setup).
- the voice signature certificate manager 112 C may be configured to send the voice signature certificate at an appropriate time.
- the voice signature certificate may be managed by the voice signature certificate manager 112 C so that the voice signature certificate is sent to a called device in response to the initiation of a call to the called device or at some other time (e.g., earlier than call setup in preparation for a known incoming call from a particular calling party).
- the call setup may involve, e.g., Session Initiation Protocol (SIP).
- SIP Session Initiation Protocol
- the voice signature certificate includes a text segment to identify the ID of the calling party or the calling party's company (hereinafter collectively referred to as the ID of the caller/calling party or the caller ID).
- the voice signature certificate also includes a voice segment that includes the voice signature of the calling party.
- the voice signature can be, e.g., but is not limited to, a few seconds (or more) of speech data from the calling party.
- the voice signature can be extracted from the calling party using the voice signature extractor 112 A.
- the voice signature extractor 112 A may simply include an acoustic transducer (e.g., a microphone), optional processing circuitry (analog to digital converter, filters, etc.), and a corresponding memory device, or may involve the use of a speaker recognition system to perform the voice signature extraction.
- the voice certificate can optionally be signed by, e.g., a known certificate provider.
- the voice signature certificate may be sent from the calling party to the called party during call setup (e.g., during SIP session setup).
- the voice signature continuity verification device 114 may be configured to optionally verify the voice signature certificate, extract the voice signature from the certificate, and reproduce the voice signature to the called party.
- the voice signature extracted from the voice signature certificate serves as a reference voice pattern for the corresponding voice conversation. This allows the called party (or the computer on behalf of the called party) to verify the continuity between the voice signature (included in the voice signature certificate) and the corresponding voice conversation, to authenticate the calling party.
- the calling party is authenticated when the voice signature corresponding to the set up portion of a call (and extracted from the voice signature certificate) matches the voice of the calling party during the voice conversation portion of the call.
- text portion in the voice signature certificate may be used in a caller ID function to redundantly authenticate the calling party. Accordingly, the present invention advantageously prevents the media path from being hijacked.
- the voice signature continuity verification device 114 can be implemented, e.g., at a VoIP to Public Switched Telephone Network (PSTN) gateway, within a SIP user agent disposed within the phone of the called party, or within or associated with another entity within or operatively coupled to the phone of the called party as readily contemplated by one of ordinary skill in this and related arts, while maintaining the spirit of the present invention.
- PSTN Public Switched Telephone Network
- the voice signature continuity verification device 114 may be further configured to verify the voice signature continuity between the voice certificate and the corresponding voice conversation. Implementations of the voice signature continuity verification device 114 may in involve, but are not limited to, a computer-based speaker identification mechanism and/or a human. That is, in the latter case, a person (the called party himself or herself) may be readily utilized to match the voice signature provided during the call session setup (i.e., the voice signature included in the voice signature certificate) with the voice of the calling party during the subsequent corresponding voice conversation to ensure that the voice signatures are the same.
- each of the elements of system 110 may be embodied in other devices than those shown in FIG. 1 and/or may be embodied in more than one device.
- the functions performed by the voice signature continuity verification device 114 may be so performed by more than one physical device.
- these and other variations and configurations of the elements of system 110 may be readily determined by one of ordinary skill in this and related arts while maintaining the spirit of the present invention.
- VoIP Voice over Internet Protocol
- the method 200 includes a start block 202 that passes control to a function block 205 .
- the function block 205 forms/processes a voice signature certificate, and passes control to a function block 210 .
- the voice signature certificate is formed/processed by the voice signature certificate device 112 .
- the formation/creation of the voice signature certificate may involve extracting a voice signature from a calling party, and associating a text segment and a voice segment to the voice signature certificate such that the voice segment includes the extracted voice signature.
- the processing of the voice signature certificate may involve the signing the voice signature certificate by a known certificate provider/certifier.
- the text segment identifies the ID of the calling party or the calling party's company (hereinafter collectively referred to as the ID of the caller/calling party or caller ID), and the voice segment is for use during the subsequent corresponding voice conversation.
- the function block 210 sends the voice signature certificate to the called device, and passes control to a function block 215 . It is to be appreciated that the function block 210 may send the voice signature certificate to the called device in response to a call setup portion of a call such as, e.g., a VoIP call. It is to be further appreciated that while the voice signature certificate is sent to the called device, another device proximate to or along the path to the called device may intercept the voice signature certificate for processing (e.g., for processing as described with respect to function block 215 ) prior to the certificate or any data/information therein being ultimately forwarded to the actual called device.
- a call setup portion of a call such as, e.g., a VoIP call.
- another device proximate to or along the path to the called device may intercept the voice signature certificate for processing (e.g., for processing as described with respect to function block 215 ) prior to the certificate or any data/information therein being ultimately forwarded to the actual called device.
- the function block 215 receives the voice signature certificate, verifies the authenticity of the voice signature certificate, extracts the voice signature from the voice signature certificate, reproduces the extracted voice signature (e.g., audibly via a speaker, or otherwise provides a reproduction (e.g., involving signal processing and/or forwarding) for use by a speaker recognition system), and passes control to a function block 220 .
- the function block 220 verifies voice continuity from the set up portion to the voice conversation portion of the call by comparing the voice signature extracted from the voice signature certificate to the voice of the calling party during the voice conversation, to verify that the calling party who submitted the voice signature for use in the voice signature certificate (and also identified by the caller ID) is the same person who is speaking during the voice conversation portion of the call and, optionally, may provide an indication as to the status of the voice continuity (e.g., an audible indication on the speaker of the called device or a proximate gateway device or a visual indication on a display of the called device or a proximate gateway device), and passes control to an end block 222 .
- the end block terminates the method 200 .
- the function block 220 verifies that the calling party during the voice conversation of the call is the same person who submitted the voice signature (e.g., corresponding to the call setup portion of the call) by using the continuity of the voice signature from the call setup portion to the voice conversation portion of the call. Accordingly, hijacking of the media path between the calling party and the called party is thwarted. It is to be appreciated that the present invention also thwarts spoofing of the caller ID, by using the voice data (namely the voice signature continuity) in determining calling party authenticity.
- the present invention may be implemented with respect to any type of phone capable of employing Voice over Internet Protocol (VoIP), including converted phones (e.g., traditional Plain Old Telephone Service (POTS) phones converted to use VoIP by, e.g., a VoIP gateway or a VoIP conversation device directly attached to a POTS phone).
- VoIP Voice over Internet Protocol
- converted phones e.g., traditional Plain Old Telephone Service (POTS) phones converted to use VoIP by, e.g., a VoIP gateway or a VoIP conversation device directly attached to a POTS phone.
- POTS Plain Old Telephone Service
- the present invention may readily extended/varied to employ different times while still maintaining the spirit of the present invention.
- a separate, earlier phone call or a simple, earlier data transmission may be used to send the voice signature certificate prior to a particular phone call when the actual voice of the calling party is to be compared in the voice continuity determination.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
Description
- 1. Technical Field
- The present invention relates generally to voice communications and, more particularly, to Voice over Internet Protocol (VOIP) caller authentication by voice signature continuity.
- 2. Description of the Related Art
- Traditional Public Switched Telephone Network (PSTN) telephone networks provide a method (hereinafter referred to as caller identification or caller ID, in short) that allows a called party to identify a calling party. With the advance of the Voice over Internet Protocol (VoIP) environment, the secure authentication of caller ID has disappeared. A calling party can spoof the caller ID at will. Moreover, even when the caller ID is initially correct, the corresponding voice path of the Session Initiation Protocol (SIP) session can be hijacked such that a called party talks to a different person than that identifier by the caller ID after the SIP signaling path is successfully established.
- Although there are some mechanisms in SIP/VoIP to provide authentication and security for VoIP calls, these mechanisms all require a public key infrastructure (PKI) to provide the certificate and encryption key for each phone. A PKI for every phone does not currently exist, and will not be available for the foreseeable feature. Moreover, VoIP converted traditional phones (by a VoIP gateway or a VoIP conversation device directly attached to a Plain Old Telephone Service (POTS) phone) and most conventional VoIP phones do not implement the advance authentication and encryption mechanism.
- Embodiments of the present invention are directed to Voice Over Internet Protocol (VoIP) caller authentication by voice signature continuity.
- According to an aspect of the present invention, there is provided a method for authenticating a user. The method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
- According to another aspect of the present invention, there is provided a method for authenticating a user. The method includes forming a voice signature certificate for the user. The voice signature certificate includes a voice signature segment. The method includes sending the voice signature certificate to a called device in response to a setup portion of a Voice over Internet Protocol (VoIP) call to the called device, to enable a subsequent verification of voice continuity from the setup portion to a subsequent voice signature portion of the VoIP call.
- According to yet another aspect of the present invention, there is provided a system for authenticating a user. The system includes a voice signature continuity verification device configured to verify a voice continuity of the user from a setup portion to a voice conversation portion of a Voice over Internet Protocol (VoIP) call, by receiving a voice signature certificate corresponding to the setup portion of the VoIP call, the voice signature certificate including a voice signature segment, and by reproducing the voice signature segment to enable verification of the voice continuity. The verification is performed by comparing the voice signature segment to a user' voice during the voice conversation portion.
- According to still another aspect of the present invention, there is provided a system for authenticating a user. The system includes a voice signature certificate forming device configured to form a voice signature certificate for the user. The voice signature certificate includes a voice signature segment. The system further includes a call setup voice signature certificate manager configured to send the voice signature certificate to a called device in response to a setup portion of a Voice over Internet Protocol (VoIP) call to the called device, to enable a subsequent verification of voice continuity from the setup portion to a subsequent voice signature portion of the VoIP call.
- These and other objects, features and advantages will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
- The disclosure will provide details in the following description of preferred embodiments with reference to the following figures wherein:
-
FIG. 1 is a diagram illustrating an exemplary environment in which embodiments of the present invention may be applied; and -
FIG. 2 is a diagram illustrating an exemplary method for Voice over Internet Protocol (VoIP) authentication by voice signature continuity. - Embodiments of the present invention implement methods and systems for Voice over Internet Protocol (VoIP) authentication by voice signature continuity. By utilizing voice signature continuity, it may be verified whether or not the person identified by a caller identification is the same person speaking during the corresponding voice conversation. That is, voice signature continuity may be utilized such that a voice signature sent to a called party or called machine during a call session setup matches a voice signature sent to the called party or called device during the subsequent corresponding voice conversation.
- It should be understood that the elements shown in the FIGURES may be implemented in various forms of hardware, software or combinations thereof. Preferably, these elements are implemented in software on one or more appropriately programmed general-purpose digital computers having a processor and memory and input/output interfaces.
- Embodiments of the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment including both hardware and software elements. Such software includes but is not limited to firmware, resident software, middleware, microcode, and so forth.
- Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that may include, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
- A data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code to reduce the number of times code is retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) may be coupled to the system either directly or through intervening I/O controllers.
- Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
- Referring now in detail to the figures in which like numerals represent the same or similar elements and initially to
FIG. 1 , an environment in which embodiments of the present invention may be applied is indicated generally by thereference numeral 100. - The
environment 100 includes a called party'sphone 150, a Voice over Internet Protocol (VoIP)gateway 160, a network (e.g., the Internet) 170, and a calling entity 180 (e.g., a bank, etc.). The callingentity 180 may include one ormore phones 180A. The called party'sphone 150 is connected in signal communication with theVoIP gateway 160 which, in turn, is connected to thenetwork 170. The network is connected in signal communication with thecalling entity 180. - For illustrative purposes, the calling
entity 180 is one that includes multiple phones and, hence, multiple possible calling parties. Of course, embodiments of the present invention are not limited to such a configuration and may be implemented with respect to different numbers of calling entities (e.g., more than one) and different numbers of calling parties (e.g., one or more than one) at each of the calling entities than that shown inFIG. 1 . Moreover, it is to be appreciated that while the voice signature certificate is described herein with respect to a single voice signature corresponding to a single calling party being included in the voice signature certificate, in other embodiments, more than one voice signature may be included in a voice signature certificate for cases where more than one possible calling party may call from the same calling entity. In such a case, it is preferably, but not mandatory, that the included voice signatures be short enough so as to not cause undue delay in listening/evaluating the included voice signatures with respect to the actual voice of the calling party during the voice conversation portion of the call. - An illustrative embodiment of the present invention includes a system 110 for Voice over Internet Protocol (VoIP) caller authentication by voice signature continuity. The system 110 includes a voice
signature certificate device 112 and a voice signaturecontinuity verification device 114. - The voice
signature certificate device 112 may include avoice signature extractor 112A, a voice signaturecertificate forming device 112B, and a call setup voicesignature certificate manager 112C. - The voice
signature certificate device 112 may be configured to process avoice signature certificate 177 during a call setup. For example, the voice signaturecertificate forming device 112B may be configured to form a voice signature certificate, e.g., using a voice signature extracted by thevoice signature extractor 112A. Thevoice signature certificate 177 may be pre-created (i.e., prior to a particular call(s)) or dynamically created upon the initiation of a call (i.e., upon call setup). The voicesignature certificate manager 112C may be configured to send the voice signature certificate at an appropriate time. The voice signature certificate may be managed by the voicesignature certificate manager 112C so that the voice signature certificate is sent to a called device in response to the initiation of a call to the called device or at some other time (e.g., earlier than call setup in preparation for a known incoming call from a particular calling party). The call setup may involve, e.g., Session Initiation Protocol (SIP). - The voice signature certificate includes a text segment to identify the ID of the calling party or the calling party's company (hereinafter collectively referred to as the ID of the caller/calling party or the caller ID). The voice signature certificate also includes a voice segment that includes the voice signature of the calling party.
- The voice signature can be, e.g., but is not limited to, a few seconds (or more) of speech data from the calling party. The voice signature can be extracted from the calling party using the
voice signature extractor 112A. Thevoice signature extractor 112A may simply include an acoustic transducer (e.g., a microphone), optional processing circuitry (analog to digital converter, filters, etc.), and a corresponding memory device, or may involve the use of a speaker recognition system to perform the voice signature extraction. The voice certificate can optionally be signed by, e.g., a known certificate provider. - The voice signature certificate may be sent from the calling party to the called party during call setup (e.g., during SIP session setup).
- The voice signature
continuity verification device 114 may be configured to optionally verify the voice signature certificate, extract the voice signature from the certificate, and reproduce the voice signature to the called party. The voice signature extracted from the voice signature certificate serves as a reference voice pattern for the corresponding voice conversation. This allows the called party (or the computer on behalf of the called party) to verify the continuity between the voice signature (included in the voice signature certificate) and the corresponding voice conversation, to authenticate the calling party. For example, the calling party is authenticated when the voice signature corresponding to the set up portion of a call (and extracted from the voice signature certificate) matches the voice of the calling party during the voice conversation portion of the call. Moreover, text portion in the voice signature certificate may be used in a caller ID function to redundantly authenticate the calling party. Accordingly, the present invention advantageously prevents the media path from being hijacked. - The voice signature
continuity verification device 114 can be implemented, e.g., at a VoIP to Public Switched Telephone Network (PSTN) gateway, within a SIP user agent disposed within the phone of the called party, or within or associated with another entity within or operatively coupled to the phone of the called party as readily contemplated by one of ordinary skill in this and related arts, while maintaining the spirit of the present invention. - The voice signature
continuity verification device 114 may be further configured to verify the voice signature continuity between the voice certificate and the corresponding voice conversation. Implementations of the voice signaturecontinuity verification device 114 may in involve, but are not limited to, a computer-based speaker identification mechanism and/or a human. That is, in the latter case, a person (the called party himself or herself) may be readily utilized to match the voice signature provided during the call session setup (i.e., the voice signature included in the voice signature certificate) with the voice of the calling party during the subsequent corresponding voice conversation to ensure that the voice signatures are the same. - It is to be appreciated that the functions of each of the elements of system 110 may be embodied in other devices than those shown in
FIG. 1 and/or may be embodied in more than one device. For example, the functions performed by the voice signaturecontinuity verification device 114 may be so performed by more than one physical device. Given the teachings provided herein, these and other variations and configurations of the elements of system 110 may be readily determined by one of ordinary skill in this and related arts while maintaining the spirit of the present invention. - Turning to
FIG. 2 , a method for Voice over Internet Protocol (VoIP) authentication by voice signature continuity is indicated generally by thereference numeral 200. - The
method 200 includes astart block 202 that passes control to afunction block 205. Thefunction block 205 forms/processes a voice signature certificate, and passes control to afunction block 210. Regarding thefunction block 205, the voice signature certificate is formed/processed by the voicesignature certificate device 112. The formation/creation of the voice signature certificate may involve extracting a voice signature from a calling party, and associating a text segment and a voice segment to the voice signature certificate such that the voice segment includes the extracted voice signature. Moreover, the processing of the voice signature certificate may involve the signing the voice signature certificate by a known certificate provider/certifier. As noted above, the text segment identifies the ID of the calling party or the calling party's company (hereinafter collectively referred to as the ID of the caller/calling party or caller ID), and the voice segment is for use during the subsequent corresponding voice conversation. - The
function block 210 sends the voice signature certificate to the called device, and passes control to afunction block 215. It is to be appreciated that thefunction block 210 may send the voice signature certificate to the called device in response to a call setup portion of a call such as, e.g., a VoIP call. It is to be further appreciated that while the voice signature certificate is sent to the called device, another device proximate to or along the path to the called device may intercept the voice signature certificate for processing (e.g., for processing as described with respect to function block 215) prior to the certificate or any data/information therein being ultimately forwarded to the actual called device. - The
function block 215 receives the voice signature certificate, verifies the authenticity of the voice signature certificate, extracts the voice signature from the voice signature certificate, reproduces the extracted voice signature (e.g., audibly via a speaker, or otherwise provides a reproduction (e.g., involving signal processing and/or forwarding) for use by a speaker recognition system), and passes control to afunction block 220. - The
function block 220 verifies voice continuity from the set up portion to the voice conversation portion of the call by comparing the voice signature extracted from the voice signature certificate to the voice of the calling party during the voice conversation, to verify that the calling party who submitted the voice signature for use in the voice signature certificate (and also identified by the caller ID) is the same person who is speaking during the voice conversation portion of the call and, optionally, may provide an indication as to the status of the voice continuity (e.g., an audible indication on the speaker of the called device or a proximate gateway device or a visual indication on a display of the called device or a proximate gateway device), and passes control to anend block 222. The end block terminates themethod 200. It is to be appreciated that thefunction block 220 verifies that the calling party during the voice conversation of the call is the same person who submitted the voice signature (e.g., corresponding to the call setup portion of the call) by using the continuity of the voice signature from the call setup portion to the voice conversation portion of the call. Accordingly, hijacking of the media path between the calling party and the called party is thwarted. It is to be appreciated that the present invention also thwarts spoofing of the caller ID, by using the voice data (namely the voice signature continuity) in determining calling party authenticity. - It is to be appreciated that the present invention may be implemented with respect to any type of phone capable of employing Voice over Internet Protocol (VoIP), including converted phones (e.g., traditional Plain Old Telephone Service (POTS) phones converted to use VoIP by, e.g., a VoIP gateway or a VoIP conversation device directly attached to a POTS phone). It is to be further appreciated while the present invention is described herein primarily with reference to a call setup portion and a subsequent corresponding voice conversation portion, the present invention may readily extended/varied to employ different times while still maintaining the spirit of the present invention. For example, a separate, earlier phone call or a simple, earlier data transmission may be used to send the voice signature certificate prior to a particular phone call when the actual voice of the calling party is to be compared in the voice continuity determination.
- Having described preferred embodiments of a system and method for Voice over Internet Protocol (VoIP) authentication by voice signature certificate (which are intended to be illustrative and not limiting), it is noted that modifications and variations can be made by persons skilled in the art in light of the above teachings. It is therefore to be understood that changes may be made in the particular embodiments disclosed which are within the scope and spirit of the invention as outlined by the appended claims. Having thus described aspects of the invention, with the details and particularity required by the patent laws, what is claimed and desired protected by Letters Patent is set forth in the appended claims.
Claims (21)
1. A method for authenticating a user, comprising:
receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call, the VoIP call further having a voice conversation portion, the voice signature certificate including a voice signature segment; and
reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion, the verification being performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
2. The method of claim 1 , further comprising verifying an authenticity of the voice signature certificate.
3. The method of claim 1 , wherein said reproducing step comprises extracting the voice signature segment from the voice signature certificate for use by a speaker recognition system, and the method further comprises the step of comparing the voice signature segment to the user's voice using the speaker recognition system to determine whether a match exists there between.
4. The method of claim 1 , wherein said reproducing step comprises audibly reproducing the voice signature segment on a speaker for comparison against the user's voice during the voice conversation portion.
5. The method of claim 1 , wherein the setup portion uses Session Initiation Protocol (SIP).
6. The method of claim 1 , wherein the voice signature certificate further includes a text segment identifying the user, and the method further comprises providing a caller identification (ID) function using the text segment included in the voice signature certificate.
7. The method of claim 1 , wherein the voice conversation portion follows the setup portion.
8. A method for authenticating a user, comprising:
forming a voice signature certificate for the user, the voice signature certificate including a voice signature segment; and
sending the voice signature certificate to a called device in response to a setup portion of a Voice over Internet Protocol (VoIP) call to the called device, to enable a subsequent verification of voice continuity from the setup portion to a subsequent voice signature portion of the VoIP call.
9. The method of claim 8 , wherein said forming step forms the voice signature certificate to further include a text portion identifying the user for use in a subsequent caller identification (ID) function, to collectively identify the user based on the caller ID function and the voice continuity.
10. The method of claim 8 , further comprising signing the voice signature certificate by one of a certificate signing authority or a certificate provider.
11. The method of claim 8 , further comprising the step of extracting a voice signature of the user for the voice signature segment.
12. A system for authenticating a user, comprising:
a voice signature continuity verification device configured to verify a voice continuity of the user from a setup portion to a voice conversation portion of a Voice over Internet Protocol (VoIP) call, by receiving a voice signature certificate corresponding to the setup portion of the VoIP call, the voice signature certificate including a voice signature segment, and by reproducing the voice signature segment to enable verification of the voice continuity, the verification being performed by comparing the voice signature segment to a user' voice during the voice conversation portion.
13. The system of claim 12 , wherein said voice signature continuity verification device is further configured to verify an authenticity of the voice signature certificate.
14. The system of claim 12 , wherein said voice signature continuity verification device includes a speaker verification system configured to verify the voice continuity by comparing the voice segment portion to the user's voice to determine if a match exists there between.
15. The system of claim 12 , wherein said voice signature continuity verification device includes an audible reproduction device configured to audibly reproduce the voice signature segment for comparison against the user's voice during the voice conversation portion.
16. The system of claim 12 , wherein the setup portion uses Session Initiation Protocol (SIP).
17. The system of claim 12 , wherein the voice signature certificate further includes a text segment identifying the user, and the system further comprises a voice signature certificate caller identification device configured to determine an identify of the user using the text segment included in the voice signature certificate.
18. A system for authenticating a user, comprising:
a voice signature certificate forming device configured to form a voice signature certificate for the user, the voice signature certificate including a voice signature segment; and
a call setup voice signature certificate manager configured to send the voice signature certificate to a called device in response to a setup portion of a Voice over Internet Protocol (VoIP) call to the called device, to enable a subsequent verification of voice continuity from the setup portion to a subsequent voice signature portion of the VoIP call.
19. The system of claim 18 , wherein said voice signature certificate forming device forms the voice signature certificate to further include a text portion identifying the user for use in a subsequent caller identification (ID) function, to collectively identify the user based on the caller ID function and the voice continuity.
20. The system of claim 18 , further comprising a certificate signing device configured to sign the voice signature certificate for subsequent use in authenticating the voice signature certificate.
21. The system of claim 18 , further comprising a speech extractor configured to extract a voice signature of the user for the voice signature segment.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/350,687 US20070201443A1 (en) | 2006-02-09 | 2006-02-09 | VoIP caller authentication by voice signature continuity |
US12/061,096 US7920680B2 (en) | 2006-02-09 | 2008-04-02 | VoIP caller authentication by voice signature continuity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/350,687 US20070201443A1 (en) | 2006-02-09 | 2006-02-09 | VoIP caller authentication by voice signature continuity |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/061,096 Continuation US7920680B2 (en) | 2006-02-09 | 2008-04-02 | VoIP caller authentication by voice signature continuity |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070201443A1 true US20070201443A1 (en) | 2007-08-30 |
Family
ID=38443892
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/350,687 Abandoned US20070201443A1 (en) | 2006-02-09 | 2006-02-09 | VoIP caller authentication by voice signature continuity |
US12/061,096 Expired - Fee Related US7920680B2 (en) | 2006-02-09 | 2008-04-02 | VoIP caller authentication by voice signature continuity |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/061,096 Expired - Fee Related US7920680B2 (en) | 2006-02-09 | 2008-04-02 | VoIP caller authentication by voice signature continuity |
Country Status (1)
Country | Link |
---|---|
US (2) | US20070201443A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080172728A1 (en) * | 2007-01-17 | 2008-07-17 | Alcatel Lucent | Mechanism for authentication of caller and callee using otoacoustic emissions |
US20090276217A1 (en) * | 2006-02-09 | 2009-11-05 | Debanjan Saha | Voip caller authentication by voice signature continuity |
US8135119B1 (en) * | 2008-11-04 | 2012-03-13 | Trend Micro Incorporated | Techniques for protecting telephone users from caller ID spoofing attacks |
US20130097303A1 (en) * | 2011-10-12 | 2013-04-18 | Nokia Corporation | Method and apparatus for providing identification based on a multimedia signature |
US8510116B1 (en) | 2007-10-26 | 2013-08-13 | United Services Automobile Association (Usaa) | Synchronized voice signature |
US20140359739A1 (en) * | 2013-05-31 | 2014-12-04 | International Business Machines Corporation | Voice based biometric authentication method and apparatus |
US9544424B1 (en) * | 2015-12-28 | 2017-01-10 | Cisco Technology, Inc. | Trust enabled communication system |
US9633659B1 (en) * | 2016-01-20 | 2017-04-25 | Motorola Mobility Llc | Method and apparatus for voice enrolling an electronic computing device |
US20170351848A1 (en) * | 2016-06-07 | 2017-12-07 | Vocalzoom Systems Ltd. | Device, system, and method of user authentication utilizing an optical microphone |
CN113168849A (en) * | 2018-12-04 | 2021-07-23 | 沙特阿拉伯石油公司 | System and method for information leakage identification using one-way watermarks |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9241013B2 (en) * | 2007-01-30 | 2016-01-19 | Alcatel Lucent | Caller name authentication to prevent caller identity spoofing |
US8516259B2 (en) * | 2008-09-03 | 2013-08-20 | Alcatel Lucent | Verifying authenticity of voice mail participants in telephony networks |
US8391445B2 (en) * | 2008-11-10 | 2013-03-05 | International Business Machines Corporation | Caller identification using voice recognition |
US9451507B2 (en) | 2011-12-13 | 2016-09-20 | Vonage America Inc. | Systems and methods for handoff of a mobile telephone call in a VOIP environment |
US8223720B1 (en) * | 2011-12-13 | 2012-07-17 | Vonage Network, Llc | Systems and methods for handoff of a mobile telephone call in a VOIP environment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6067347A (en) * | 1997-04-01 | 2000-05-23 | Bell Atlantic Network Services, Inc. | Providing enhanced services through double SIV and personal dial tone |
US6650888B1 (en) * | 2000-05-25 | 2003-11-18 | Sprint Communications Company, L.P. | Validating a transaction with user voice authentication using wireless communications |
US6678359B1 (en) * | 2000-04-06 | 2004-01-13 | Ag Communication Systems Corporation | Called party identification in packet switched networks |
US20040008666A1 (en) * | 2002-07-09 | 2004-01-15 | Verisign, Inc. | Method and system for registering and automatically retrieving digital-certificates in voice over internet protocol (VOIP) communications |
US20040066916A1 (en) * | 2001-12-12 | 2004-04-08 | Brown Michael Wayne | Intermediary device initiated caller identification |
US6757823B1 (en) * | 1999-07-27 | 2004-06-29 | Nortel Networks Limited | System and method for enabling secure connections for H.323 VoIP calls |
US20070150276A1 (en) * | 2005-12-19 | 2007-06-28 | Nortel Networks Limited | Method and apparatus for detecting unsolicited multimedia communications |
US7324946B2 (en) * | 2004-07-30 | 2008-01-29 | At & T Knowledge Ventures, L.P. | Centralized biometric authentication |
US7412386B2 (en) * | 2003-11-26 | 2008-08-12 | International Business Machines Corporation | Directory dialer name recognition |
US7469210B1 (en) * | 2002-08-08 | 2008-12-23 | Voice Signature Llc | Outbound voice signature calls |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6141644A (en) * | 1998-09-04 | 2000-10-31 | Matsushita Electric Industrial Co., Ltd. | Speaker verification and speaker identification based on eigenvoices |
US6219640B1 (en) * | 1999-08-06 | 2001-04-17 | International Business Machines Corporation | Methods and apparatus for audio-visual speaker recognition and utterance verification |
JP2002084360A (en) * | 2000-06-29 | 2002-03-22 | Toshiba Corp | Communication terminal provided with display function for caller information |
DE10150108B4 (en) * | 2001-10-11 | 2004-03-11 | Siemens Ag | Ongoing speaker authentication |
KR100577387B1 (en) * | 2003-08-06 | 2006-05-10 | 삼성전자주식회사 | Method and apparatus for handling speech recognition errors in spoken dialogue systems |
US7212613B2 (en) * | 2003-09-18 | 2007-05-01 | International Business Machines Corporation | System and method for telephonic voice authentication |
US20070201443A1 (en) * | 2006-02-09 | 2007-08-30 | Debanjan Saha | VoIP caller authentication by voice signature continuity |
US7529669B2 (en) * | 2006-06-14 | 2009-05-05 | Nec Laboratories America, Inc. | Voice-based multimodal speaker authentication using adaptive training and applications thereof |
US20080195395A1 (en) * | 2007-02-08 | 2008-08-14 | Jonghae Kim | System and method for telephonic voice and speech authentication |
-
2006
- 2006-02-09 US US11/350,687 patent/US20070201443A1/en not_active Abandoned
-
2008
- 2008-04-02 US US12/061,096 patent/US7920680B2/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6067347A (en) * | 1997-04-01 | 2000-05-23 | Bell Atlantic Network Services, Inc. | Providing enhanced services through double SIV and personal dial tone |
US6757823B1 (en) * | 1999-07-27 | 2004-06-29 | Nortel Networks Limited | System and method for enabling secure connections for H.323 VoIP calls |
US6678359B1 (en) * | 2000-04-06 | 2004-01-13 | Ag Communication Systems Corporation | Called party identification in packet switched networks |
US6650888B1 (en) * | 2000-05-25 | 2003-11-18 | Sprint Communications Company, L.P. | Validating a transaction with user voice authentication using wireless communications |
US20040066916A1 (en) * | 2001-12-12 | 2004-04-08 | Brown Michael Wayne | Intermediary device initiated caller identification |
US20040008666A1 (en) * | 2002-07-09 | 2004-01-15 | Verisign, Inc. | Method and system for registering and automatically retrieving digital-certificates in voice over internet protocol (VOIP) communications |
US7469210B1 (en) * | 2002-08-08 | 2008-12-23 | Voice Signature Llc | Outbound voice signature calls |
US7412386B2 (en) * | 2003-11-26 | 2008-08-12 | International Business Machines Corporation | Directory dialer name recognition |
US7324946B2 (en) * | 2004-07-30 | 2008-01-29 | At & T Knowledge Ventures, L.P. | Centralized biometric authentication |
US20070150276A1 (en) * | 2005-12-19 | 2007-06-28 | Nortel Networks Limited | Method and apparatus for detecting unsolicited multimedia communications |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090276217A1 (en) * | 2006-02-09 | 2009-11-05 | Debanjan Saha | Voip caller authentication by voice signature continuity |
US7920680B2 (en) * | 2006-02-09 | 2011-04-05 | International Business Machines Corporation | VoIP caller authentication by voice signature continuity |
US20080172728A1 (en) * | 2007-01-17 | 2008-07-17 | Alcatel Lucent | Mechanism for authentication of caller and callee using otoacoustic emissions |
US8102838B2 (en) * | 2007-01-17 | 2012-01-24 | Alcatel Lucent | Mechanism for authentication of caller and callee using otoacoustic emissions |
US8510116B1 (en) | 2007-10-26 | 2013-08-13 | United Services Automobile Association (Usaa) | Synchronized voice signature |
US8135119B1 (en) * | 2008-11-04 | 2012-03-13 | Trend Micro Incorporated | Techniques for protecting telephone users from caller ID spoofing attacks |
US20130097303A1 (en) * | 2011-10-12 | 2013-04-18 | Nokia Corporation | Method and apparatus for providing identification based on a multimedia signature |
US10200363B2 (en) * | 2011-10-12 | 2019-02-05 | Nokia Technologies Oy | Method and apparatus for providing identification based on a multimedia signature |
US20140359739A1 (en) * | 2013-05-31 | 2014-12-04 | International Business Machines Corporation | Voice based biometric authentication method and apparatus |
US9183367B2 (en) * | 2013-05-31 | 2015-11-10 | Globalfoundries U.S. 2 Llc | Voice based biometric authentication method and apparatus |
US9544424B1 (en) * | 2015-12-28 | 2017-01-10 | Cisco Technology, Inc. | Trust enabled communication system |
US9633659B1 (en) * | 2016-01-20 | 2017-04-25 | Motorola Mobility Llc | Method and apparatus for voice enrolling an electronic computing device |
US20170351848A1 (en) * | 2016-06-07 | 2017-12-07 | Vocalzoom Systems Ltd. | Device, system, and method of user authentication utilizing an optical microphone |
US10311219B2 (en) * | 2016-06-07 | 2019-06-04 | Vocalzoom Systems Ltd. | Device, system, and method of user authentication utilizing an optical microphone |
CN113168849A (en) * | 2018-12-04 | 2021-07-23 | 沙特阿拉伯石油公司 | System and method for information leakage identification using one-way watermarks |
Also Published As
Publication number | Publication date |
---|---|
US7920680B2 (en) | 2011-04-05 |
US20090276217A1 (en) | 2009-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7920680B2 (en) | VoIP caller authentication by voice signature continuity | |
US10764043B2 (en) | Identity and content authentication for phone calls | |
US10984802B2 (en) | System for determining identity based on voiceprint and voice password, and method thereof | |
EP3158719B1 (en) | Method and system for filtering undesirable incoming telephone calls | |
US20090025075A1 (en) | On-demand authentication of call session party information during a telephone call | |
JP2023511104A (en) | A Robust Spoofing Detection System Using Deep Residual Neural Networks | |
US20090046839A1 (en) | Verifying authenticity of called party in telephony networks | |
CN101578637B (en) | A mechanism for authentication of caller and callee using otoacoustic emissions | |
US20130132091A1 (en) | Dynamic Pass Phrase Security System (DPSS) | |
US20110026699A1 (en) | Method and system for authenticating telephone callers and avoiding unwanted calls | |
WO2015192450A1 (en) | Identity identification method and apparatus and communication terminal | |
US8345871B2 (en) | Fast authentication over slow channels | |
CA3111257C (en) | System and method for audio content verification | |
JP6594349B2 (en) | Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information | |
JP2010109619A (en) | Authentication device, authentication method, and program | |
CN1815484A (en) | Digitalized authentication system and its method | |
CN102802150B (en) | phone number verification method, system and terminal | |
US9461987B2 (en) | Audio authentication system | |
JP2010109618A (en) | Authentication device, authentication method, and program | |
KR101626302B1 (en) | Natural enrolment process for speaker recognition | |
US11503154B1 (en) | Independent notification system for authentication | |
JP2002269047A (en) | Sound user authentication system | |
JP2008234398A (en) | Voice authentication system and authentication station server | |
WO2016144806A2 (en) | Digital voice signature of transactions | |
US20080198991A1 (en) | Telephone and method of transmitting caller token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: CORRECTION DOCUMENT ID #700247937A;ASSIGNORS:SAHA, DEBANJAN;SHAE, ZON-YIN;SRIPANIDKULCHAI, KUNWADEE;REEL/FRAME:017350/0249;SIGNING DATES FROM 20051117 TO 20051120 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |