Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verifying authenticity of voice mail participants in telephony networks

一种语音邮件、证书的技术,应用在电话通信、电气元件、用户身份/权限验证等方向,能够解决语音邮件会话未被认证等问题

Inactive Publication Date: 2011-08-03
ALCATEL LUCENT SAS
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention solve the problem of participants in a voicemail conversation not being authenticated when accessing the voicemail system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifying authenticity of voice mail participants in telephony networks
  • Verifying authenticity of voice mail participants in telephony networks
  • Verifying authenticity of voice mail participants in telephony networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention can be readily implemented on a variety of voicemail systems and telephony devices (eg, cell phones, PDAs, etc.). These embodiments utilize strong encryption capabilities based on X.509 certificates delivered through a trusted certificate authority registry, thereby allowing the called party's authentication to be authenticated in association with leaving a voicemail message for the called party and / or to Allows authentication of the caller before the caller leaves a voicemail message. In this way, a telephony device capable of displaying a list of voicemail messages can display authenticated identity information behind a voicemail message (i.e., when acting as an outbound messaging party) and utilize voicemail screening (i.e., when acting as an inbound messaging message participants) and conveniently incorporate this feature.

[0020]The present invention provides an enhanced level of security associated with voicemail system acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to voice mail messaging and in particular to methods for preventing a) that a caller is spoofed into believing that they are leaving a message on an intended voice mail message account, but are in fact leaving the message on a different voice mail message account; and b) fraudulent access to a voice mail box. The problem is solved by authentication certificates. Regarding a), the caller receives an authentication certificate of a voice mail account holder,- and regarding b), the voice mail box receives an authentication certificate of the caller. Authenticating the account holder and / or the caller is performed using authentication information contained within the respective certificate. After such authentication is successfully performed, a voice mail message record can be created in the account of the account holder. Such creating includes allowing the caller to store the message in the account of the account holder in addition to associating authenticated identification information of the caller with the message and / or providing authenticated identification of the account holder to the caller.

Description

technical field [0001] The disclosure herein relates generally to authentication measures in telephone network systems, and more particularly to verifying the authenticity of voicemail participants. Background technique [0002] Fraud related to identity theft attempts is rampant in today's complex telephony (eg voice / data) networks. Malicious entities are exploiting well-established social behaviors to gather confidential (ie, sensitive) information. Identity theft has become a serious problem in almost every part of the world. Identity thieves take advantage of the false sense of security that phone users have when using the phone system, thereby tricking phone users into disclosing confidential information. In some cases, it is the calling party (ie, the caller) who attempts to obtain confidential information from the called party in order to use the confidential information to commit malicious acts (eg, criminal and / or fraudulent acts). In other cases, it is the calle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04M3/533H04L9/32
Inventor C·古斯塔夫S·乔S-L·陈
Owner ALCATEL LUCENT SAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products