[go: up one dir, main page]

WO2018157211A1 - Securely verifying voice communication - Google Patents

Securely verifying voice communication Download PDF

Info

Publication number
WO2018157211A1
WO2018157211A1 PCT/AU2018/050188 AU2018050188W WO2018157211A1 WO 2018157211 A1 WO2018157211 A1 WO 2018157211A1 AU 2018050188 W AU2018050188 W AU 2018050188W WO 2018157211 A1 WO2018157211 A1 WO 2018157211A1
Authority
WO
WIPO (PCT)
Prior art keywords
individual
verification code
telephone
entity
software application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/AU2018/050188
Other languages
French (fr)
Inventor
Jeremy Machet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2017900733A external-priority patent/AU2017900733A0/en
Application filed by Individual filed Critical Individual
Publication of WO2018157211A1 publication Critical patent/WO2018157211A1/en
Anticipated expiration legal-status Critical
Priority to AU2019101103A priority Critical patent/AU2019101103A4/en
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6027Fraud preventions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation

Definitions

  • the present invention relates to securely verifying telephone discussions.
  • spear phishing A popular media attack known as a spear phishing is used to target unknown customers of entities such as major corporate organisations. While these attacks can sometimes be thwarted at the outset by two factor authentication, spear phishing attacks when successful can enable collection by criminals of key identifying information of customers which allows future tax such as identity fraud to happen on different mediums, including telephone discussion.
  • communications can impersonate corporate entities, and thereby attempt to obtain key identifying information from individuals. Particularly because of the impersonal nature of large entities, where unknown employees or representatives may call a customer, the customer finds it practically impossible to gauge the genuineness of a telephone call .
  • an entity notifying an individual of an intention to conduct a telephone discussion with the individual having access to a communications device connectable to a data network and with a device software application implementing a trusted connection between an entity computer and the individual over the data network, the software application being adapted to generate or receive a verification code of the intention, the verification code being accessible or reproducible by both the entity computer and by the device software application;
  • verifying the intention between the entity and the individual by either receiving a communication of the verification code from the individual and checking that the communication of the verification code matches the verification code, or by
  • the step of the entity notifying the individual of the intention comprises the steps of :
  • the method further comprises the step of the entity initiating a telephone call to the individual; the step of verifying the intention comprises making an utterance of the verification code to the individual in the telephone call, for the individual to check that the utterance matches the verification code.
  • the method may further comprise the step of the entity computer generating the verification code and transmitting the verification code to the device software application over the trusted connection.
  • the entity computer and the device software application are each programmed with a verification code generating algorithm adapted to generate the verification code independently; and
  • the device software application is configured to operate the verification code generating algorithm to generate the
  • the method further comprises the step of storing a record of the intention in the entity computer, and wherein :
  • the step of the entity providing a notification of the intention comprises initiating a telephone call to the
  • the step of verifying the intention comprises the software application, triggered by the individual in response to
  • the entity computer answering the telephone call, communicating the verification code over the trusted connection to the entity computer, the verification code comprising at least a code identifying the individual, followed by the entity computer accessing the data memory to verify that the verification code corresponds to the recorded intention, the entity computer transmitting a
  • the entity computer and the device software application are each programmed with a verification code generating algorithm adapted to generate the verification code independently; the method further comprising steps of:
  • the step of the device software application receiving or generating the verification code comprises the software
  • the step of verifying the intention comprises receiving the verification code from the individual over the return telephone call, and accessing the data memory to verify that the
  • verification code corresponds to the recorded intention, and if so conducting a voice discussion with the individual over the return telephone call .
  • the individual over the return telephone call may diverting the return telephone call from a telephone queue and connecting the individual with an assigned representative for the telephone discussion.
  • Figure 1 is a diagram of method steps of the broad aspect of the invention, not necessarily in order;
  • Figure 2 is a functional block diagram of a system implementing one embodiment of the invention
  • Figure 3 is a visual representation of a notification step according to the embodiment of Figure 2 ;
  • Figure 4 is a functional block diagram of a system implementing another embodiment of the invention.
  • Figure 5 is a functional block diagram of a system implementing still another embodiment of the invention.
  • Figure 6 is a visual representation of code generation and verification steps according to the embodiment of Figure 5;
  • Figure 7 is a functional block diagram of a system implementing yet another embodiment of the invention.
  • the method steps of the broadest aspects of the invention are a notification step 101 of a entity notifying an individual of an intention to conduct a telephone discussion with the individual, a code generation step 102 of generating a verification code, a verification step 103 of verifying the intention between the entity and the
  • the individual has access to a
  • notification step 101 and code generation step 102 may be conducted in a different order or simultaneously.
  • the different steps 101-104 may be performed in different manners.
  • the notification step 101 can be performed in different manners.
  • the notification step 101 can be performed in different
  • the code generation step 102 can be performed in different embodiments by a entity computer, the device software application or both, and may be before or after the notification step 101.
  • verification step 103 verifies the intended telephone call and involves access by both parties to the verification code, and comparison by at least one party of the other party' s copy or version of the verification code.
  • the verification step 103 can involve transmission between the software application and the entity computer, or utterance or other transmission over a telephone call.
  • the discussion step 104 of conducting the telephone discussion can occur as a continuance of an already existing telephone call, or a new telephone call initiated by the individual which may be routed by a telephone answering system of entity to an assigned
  • Entity 1 wishes to conduct a telephone discussion with an individual 2.
  • entity 1 There may be a human representative in entity 1 having the intention, or the intention may be artificially realised by an automatic system fulfilling the role of an entity capable of scheduling or conducting a telephone discussion including imparting and receiving verbal information.
  • Entity 1 in the broadest aspect is any entity capable of communicating with the individual by telephone, and may be a company, business, government
  • Entity 1 in most circumstances will be a
  • Individual 2 is a human person who may be making or potentially making purchases or receiving services from or exchanging services with entity 1, but is not necessarily a customer.
  • entity 1 a single person
  • the interaction which is sought to be verified may be a private communication of non-commercial character .
  • Individual 2 has access to a smart phone 3 which provides wireless mobile telephone communication with entity 1 via wireless telephone towers 4 or directly through Internet 60 via voice call applications, and which also provides the digital communications device housing the device software application 40.
  • the device software application 40 and the medium over which the telephone discussion occurs can be implemented in separate devices, including fixed line telephones for the telephone discussion, and a separate communications device such as smart phone, tablet or personal computer for housing the device software application 40. Further, the
  • VOIP Voice over Internet Protocol
  • Software application 40 implements a trusted connection between individual 2 and entity 1 such that information
  • software application 40 is a dedicated application designed and distributed by entity 1 such as, in the case of a bank, a proprietary application of the bank to enable users to access bank services such as balances, transfers and the like.
  • Entity 1 has access to an entity computer 20 which may be implemented in a single standalone unit or may be distributed amongst several separated units communicating amongst themselves where necessary, as is known in the art.
  • Functional elements of entity computer 10 are typically realised as software modules.
  • Employee server 10 processes interaction with a plurality of employee representatives who may wish to utilise the system to contact customer individual 3.
  • the employee through employee server 10 generates a notification using notification generator 21 which accesses individual data store 23 to obtain contact details such as an email address or other device identifying details to enable direction of the
  • Code generator 22 generates a verification code as described below and may store the generated verification code in code store 24, or may store sufficient related information enabling reconstruction of the generated verification code so that the representative of entity 1 may access the verification code which was used.
  • Code generator 22 may construct the verification code in one of many different possible methods, of which many are known in the art.
  • a simple example is generation of a pseudo-random number which is generated by code generator 22 stored in code store 24 of entity computer 20.
  • a 4-6 digit integer is sufficiently large to provide the required level of security such that the code is effectively unique being difficult to guess.
  • lists of numbers or passwords may be generated for one-time use and stored in entity computer 20 for later use and deletion from storage, improved security can be provided by immediate random number generation to guard against data theft of unused codes .
  • Notification server 25 then formats and transmits the notification and code as a push notification of text to
  • Software application 40 is in a state of readiness to receive notifications from entity 1.
  • Software application 40 comprises modules code
  • Notification receiver 42 receives the push
  • Sensory output generator 43 alerts individual 2, typically by a visual notification which may or may not be configured to appear on a lock screen state.
  • the sensory output contains symbolic graphic
  • FIG. 3 an example sensory output is shown on the smart phone screen showing textual 51 and graphical 52 identifying information of a notification originating from software
  • the notification step 101 is provided simply by the representative initiating a telephone call, and notification server 25 and notification generator 21 in entity computer 20 are not used.
  • Device software application 40 instead comprises code generator 45 and sensory output generator 43 to display or otherwise inform individual 2 of generated codes.
  • Dongle apparatuses which can be attached to keyrings and display rolling codes, or by smart phone applications such as Google Authenticator . For communications which may occur
  • the time parameter which coordinates updating of the code is specified according to a global standard such as universal coordinated time (UCT) rather than any local time zone.
  • Uniqueness associated with individual 2 may be achieved by for example generating a secure hash using an algorithm such as SHA2 , using as inputs a time parameter (such as the current UTC hour and minute) , concatenated with a constant secret identifier (or periodically revised and automatically synchronised) of the individual.
  • the secret identifier does not need to be known by the individual or used for any other purpose.
  • Both the time parameter and the unique secret identifier are accessible by code generator 22 and 45 without access to the Internet, and therefore code generators 22 and 45 are able to both generate the same code at the same time, which renews when the time parameter changes .
  • individual 2 Upon receiving the telephone call, individual 2 opens device software application 40, activates code generator 45 and can see the code displayed on the screen through sensory output generator 43. Individual 2 asks the representative of entity 1 for the verification code, and the representative can access the same verification code through code generator 22 which accesses individual data 23 containing the secret identifier of the individual .
  • Embodiments are envisaged which have both capabilities, whereby individual 2 can ask for the transmitted verification code received as in the first embodiment above, which may be a genuine one time random number, or if Internet connection is unavailable individual 2 can ask for the rolling time-based code which does not require Internet connection.
  • This implementation of the broad aspect of the invention is a class of embodiments which use a verification signal where the verification code is sent over the Internet from the
  • This can be a rolling time-based verification code as described above or in a minimal application can be a constant verification code, such as an account number of individual transmitted securely.
  • implementation #1 also apply to this implementation 2 where feasible .
  • call intention recorder 27 Contemporaneously or prior to the call, the employee through employee server 10 operates call intention recorder 27 to record that a telephone discussion is intended.
  • Call intention recorder 27 uses code generator 22 and stores a generated verification code in code store 2 .
  • this verification code is not necessarily secret and may simply be identifying minimum information such as the identity of individual 2 together with a time or time period at which the intention was formed or the call initiated, or alternatively together with a real-time datum indicating that a telephone call between the employee and individual 2 is in fact in progress routed through entity computer 20.
  • Software application 40 is then caused to operate code generator 45 to generate a verification code.
  • the purpose of this verification code is to securely identify to entity 1 that individual 2 is returning a call. Since individual 2 will already have provided security by way of fingerprint, PIN or other identification to open software application 40 or
  • the generated verification code can be simply a known identifier of individual 2 such as an email address. Extra security can be provided by a more sophisticated verification code such as the rolling time-based verification code mentioned above or other one-time password, but is not necessary for acceptable security.
  • Code verifier 26 then securely communicates a verification signal through Internet 62 device software application 40.
  • Verification receiver 47 receives a verification signal and causes sensory output generator 43 to display (display screen 61) a
  • Individual 2 then either makes a note of the verification code sent over the Internet and displayed through device software application 4, or uses code generator 45 to generate the verification code.
  • Individual 2 then makes a telephone call through smart phone 3, landline or otherwise to entity 1.
  • Telephone call router 26 in entity computer 20 answers the telephone call and presents an option to individual 2 or scans for an utterance or tone dialling or other transmission means over the telephone call of the verification code. If telephone call router 26 receives a valid verification code confirmed from accessing code store 24 as described above, telephone call router 26 is then able to immediately direct the telephone call to the responsible employee, speeding
  • the verification process may also be used to allow individual 2 to bypass an answering queue.
  • individual 2 can simply be a private person, as can entity 1, accordingly the invention extends in its broadest aspects to private communication between individuals who may fear unidentified communication, as well as from the more common application of communication from corporate entities to customers.
  • telephone discussion refers to any electrical or electronic remote voice discussion received or initiated by the individual, and includes traditional telephone connections as well as voice over Internet protocol (VOIP) calls and also includes discussions between an individual and a remote artificial intelligence language understanding algorithm.
  • VOIP voice over Internet protocol
  • the data network connection referred to in the claims over which the trusted connection between the entity and the individual is formed may be the Internet or any other remote data transmission network, including data network connections provided by SMS, MMS or similar.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method of conducting a verified telephone discussion, the method comprising the steps of: an entity (1) notifying an individual (2) of an intention to conduct a telephone discussion with the individual (101), the individual (1) having access to a communications device (3) with an Internet (60) connection and with a device software application (40) implementing a trusted connection between an entity computer (20) and the individual (1), the software application (40) being adapted to generate (45) or receive (41) a verification code of the intention, the verification code being accessible or reproducible by both the entity computer (20) and by the device software application (40); generating the verification code (102,22); verifying the intention between the entity and the individual (103,26); and conducting the telephone discussion (104).

Description

SECURELY VERIFYING VOICE COMMUNICATION
FIELD
[0001] The present invention relates to securely verifying telephone discussions.
BACKGROUND
[0002] While password including the use of two factor
authentication and other secure verification strategies are used routinely to verify internet transactions, verification by an individual of the identity of a telephone caller is less
developed.
[0003] A popular media attack known as a spear phishing is used to target unknown customers of entities such as major corporate organisations. While these attacks can sometimes be thwarted at the outset by two factor authentication, spear phishing attacks when successful can enable collection by criminals of key identifying information of customers which allows future tax such as identity fraud to happen on different mediums, including telephone discussion.
[0004] It is not only the case that email and web based
communications can impersonate corporate entities, and thereby attempt to obtain key identifying information from individuals. Particularly because of the impersonal nature of large entities, where unknown employees or representatives may call a customer, the customer finds it practically impossible to gauge the genuineness of a telephone call .
[0005] There is therefore a need to provide an improved security for telephone communications.
SUMMARY OF THE INVENTION
[0006] In accordance with a broad aspect of the invention, there is provided a method of conducting a verified telephone
discussion, the method comprising the steps of:
an entity notifying an individual of an intention to conduct a telephone discussion with the individual, the individual having access to a communications device connectable to a data network and with a device software application implementing a trusted connection between an entity computer and the individual over the data network, the software application being adapted to generate or receive a verification code of the intention, the verification code being accessible or reproducible by both the entity computer and by the device software application;
generating the verification code;
verifying the intention between the entity and the individual by either receiving a communication of the verification code from the individual and checking that the communication of the verification code matches the verification code, or by
communicating the verification code to the individual for checking by the individual ; and
conducting the telephone discussion.
[0007] In one embodiment, the step of the entity notifying the individual of the intention comprises the steps of :
generating, within the entity computer, a notification signal signifying that the entity intends to conduct a telephone discussion with the individual;
sending the notification signal from the entity computer over the trusted connection to the device software application running on the communications device;
the device software application being configured to inform the individual of the intention and providing the verification code to the individual through a trusted sensory output, in response to receiving the notification signal. [0008] In one embodiment, the method further comprises the step of the entity initiating a telephone call to the individual; the step of verifying the intention comprises making an utterance of the verification code to the individual in the telephone call, for the individual to check that the utterance matches the verification code. The method may further comprise the step of the entity computer generating the verification code and transmitting the verification code to the device software application over the trusted connection. Alternatively, the entity computer and the device software application are each programmed with a verification code generating algorithm adapted to generate the verification code independently; and
the device software application is configured to operate the verification code generating algorithm to generate the
verification code, in response to receiving the notification signal .
[0009] In one embodiment, the method further comprises the step of storing a record of the intention in the entity computer, and wherein :
the step of the entity providing a notification of the intention comprises initiating a telephone call to the
individual ;
the step of verifying the intention comprises the software application, triggered by the individual in response to
answering the telephone call, communicating the verification code over the trusted connection to the entity computer, the verification code comprising at least a code identifying the individual, followed by the entity computer accessing the data memory to verify that the verification code corresponds to the recorded intention, the entity computer transmitting a
verification signal to the device software application over the trusted connection, in response to which the device software application is configured to verify the telephone call to the individual by a trusted sensory output. [0010] In one embodiment, the entity computer and the device software application are each programmed with a verification code generating algorithm adapted to generate the verification code independently; the method further comprising steps of:
recording the intention in a data memory of the entity computer ;
making a first telephone call to the individual which is not answered or is terminated by the individual, thereby providing the step of providing a notification of the intention to conduct a telephone discussion;
receiving a return telephone call from the individual to the entity intending to conduct the voice discussion,
and wherein:
the step of the device software application receiving or generating the verification code comprises the software
application, triggered by the individual in response to
receiving the first telephone call, operating the verification code generating algorithm to generate the verification code; the step of verifying the intention comprises receiving the verification code from the individual over the return telephone call, and accessing the data memory to verify that the
verification code corresponds to the recorded intention, and if so conducting a voice discussion with the individual over the return telephone call . The step of conducting the voice
discussion the individual over the return telephone call may diverting the return telephone call from a telephone queue and connecting the individual with an assigned representative for the telephone discussion.
BRIEF DESCRIPTION OF DRAWINGS
[0011] Figure 1 is a diagram of method steps of the broad aspect of the invention, not necessarily in order;
[0012] Figure 2 is a functional block diagram of a system implementing one embodiment of the invention; [0013] Figure 3 is a visual representation of a notification step according to the embodiment of Figure 2 ;
[0014] Figure 4 is a functional block diagram of a system implementing another embodiment of the invention;
[0015] Figure 5 is a functional block diagram of a system implementing still another embodiment of the invention;
[0016] Figure 6 is a visual representation of code generation and verification steps according to the embodiment of Figure 5;
[0017] Figure 7 is a functional block diagram of a system implementing yet another embodiment of the invention.
DETAILED DESCRIPTION OF EMBODIMENTS
[0018] Embodiments of the current invention will now be
described.
[0019] The broadest aspect of the invention is first explained.
[0020] Referring now to Figure 1, the method steps of the broadest aspects of the invention are a notification step 101 of a entity notifying an individual of an intention to conduct a telephone discussion with the individual, a code generation step 102 of generating a verification code, a verification step 103 of verifying the intention between the entity and the
individual, and finally a discussion step 104 of conducting the telephone discussion. The individual has access to a
communications device with an Internet connection and with a device software application as described above in the broad aspect of the invention. In different embodiments of the invention, notification step 101 and code generation step 102 may be conducted in a different order or simultaneously.
[0021] In different embodiments to be described below, the different steps 101-104 may be performed in different manners. The notification step 101 can be performed in different
embodiments utilising the making of a telephone call or Internet signal transmission to the device software application. The code generation step 102 can be performed in different embodiments by a entity computer, the device software application or both, and may be before or after the notification step 101. The
verification step 103 verifies the intended telephone call and involves access by both parties to the verification code, and comparison by at least one party of the other party' s copy or version of the verification code. In different embodiments, the verification step 103 can involve transmission between the software application and the entity computer, or utterance or other transmission over a telephone call. The discussion step 104 of conducting the telephone discussion can occur as a continuance of an already existing telephone call, or a new telephone call initiated by the individual which may be routed by a telephone answering system of entity to an assigned
representative .
Implementation #1 - telephonic transmission of verification
[0022] In this implementation, embodiments are described wherein utterance or other transmission over a telephone call is used in the verification step 103.
Referring now to Figure 2, system elements implementing this embodiment are shown. An entity 1 wishes to conduct a telephone discussion with an individual 2. There may be a human representative in entity 1 having the intention, or the intention may be artificially realised by an automatic system fulfilling the role of an entity capable of scheduling or conducting a telephone discussion including imparting and receiving verbal information. Entity 1 in the broadest aspect is any entity capable of communicating with the individual by telephone, and may be a company, business, government
department, club, society, partnership, single person, automatic system or any other entity having a need to contact one or more individuals in circumstances where the one or more individuals may not recognise the identity of a telephone caller, as a result of the entity size or complexity or remoteness or any other factors. Entity 1 in most circumstances will be a
corporate entity having many human representatives who may wish to contact customer individuals by telephone. Individual 2 is a human person who may be making or potentially making purchases or receiving services from or exchanging services with entity 1, but is not necessarily a customer. For example, embodiments where entity 1 a single person, the interaction which is sought to be verified may be a private communication of non-commercial character .
[0023] Individual 2 has access to a smart phone 3 which provides wireless mobile telephone communication with entity 1 via wireless telephone towers 4 or directly through Internet 60 via voice call applications, and which also provides the digital communications device housing the device software application 40. In other examples, the device software application 40 and the medium over which the telephone discussion occurs can be implemented in separate devices, including fixed line telephones for the telephone discussion, and a separate communications device such as smart phone, tablet or personal computer for housing the device software application 40. Further, the
telephone discussion need not occur over wireless mobile, and can occur over any medium capable of transmitting a voice discussion, including Voice over Internet Protocol (VOIP) .
[0024] Software application 40 implements a trusted connection between individual 2 and entity 1 such that information
emanating from software application 40 can be trusted by
individual 2 to be genuine information emanating from entity 1. Typically, software application 40 is a dedicated application designed and distributed by entity 1 such as, in the case of a bank, a proprietary application of the bank to enable users to access bank services such as balances, transfers and the like.
[0025] Entity 1 has access to an entity computer 20 which may be implemented in a single standalone unit or may be distributed amongst several separated units communicating amongst themselves where necessary, as is known in the art. Functional elements of entity computer 10 are typically realised as software modules. Employee server 10 processes interaction with a plurality of employee representatives who may wish to utilise the system to contact customer individual 3. When an employee wishes to conduct a telephone discussion with individual 3, the employee through employee server 10 generates a notification using notification generator 21 which accesses individual data store 23 to obtain contact details such as an email address or other device identifying details to enable direction of the
notification to the communications device 3 of individual 2, typically by push notification. Code generator 22 generates a verification code as described below and may store the generated verification code in code store 24, or may store sufficient related information enabling reconstruction of the generated verification code so that the representative of entity 1 may access the verification code which was used.
[0026] Code generator 22 may construct the verification code in one of many different possible methods, of which many are known in the art. A simple example is generation of a pseudo-random number which is generated by code generator 22 stored in code store 24 of entity computer 20. Typically, a 4-6 digit integer is sufficiently large to provide the required level of security such that the code is effectively unique being difficult to guess. While lists of numbers or passwords may be generated for one-time use and stored in entity computer 20 for later use and deletion from storage, improved security can be provided by immediate random number generation to guard against data theft of unused codes .
[0027] Notification server 25 then formats and transmits the notification and code as a push notification of text to
communications device 3 over Internet 60. Software application 40 is in a state of readiness to receive notifications from entity 1. Software application 40 comprises modules code
receiver 41, notification receiver 42 and sensory output
generator 43. Notification receiver 42 receives the push
notification and code receiver 41 unpacks the verification code from the text of the push notification. Sensory output generator 43 alerts individual 2, typically by a visual notification which may or may not be configured to appear on a lock screen state. Preferably, the sensory output contains symbolic graphic
information trusted by individual 2 to indicate a notification from the genuine device software application 40. Referring now to Figure 3, an example sensory output is shown on the smart phone screen showing textual 51 and graphical 52 identifying information of a notification originating from software
application 40, together with the verification code 53 in the form of a "secret number" 2323903 and the name "Tom" of the representative intending to hold a telephone discussion. While sensory output in this example is purely visual, the sensory output may include any combination of senses . [0028] The representative "Tom" of entity 1 at the same time or later makes a telephone call to smart phone 3 or other telephone of individual 2. When individual 2 answers the phone, he or she asks "Tom" for the secret number. "Tom" is able to access code store 24 to retrieve the verification code and utter the code 2323903 over the telephone call to individual 2 who checks that the uttered code is. Individual 2 may then conduct the telephone discussion by continuing the phone conversation with confidence because the secret number came through the trusted connection with entity 1.
[0029] Referring now to Figure 4, an alternative embodiment of the telephonic implementation #1 does not need to involve
Internet transmission of the verification code. In this
embodiment, the notification step 101 is provided simply by the representative initiating a telephone call, and notification server 25 and notification generator 21 in entity computer 20 are not used. Device software application 40 instead comprises code generator 45 and sensory output generator 43 to display or otherwise inform individual 2 of generated codes.
[0030] Code generator 22 of entity computer 20 and code
generator 45 of device software application 40 are each
programmed with an algorithm that can independently generate the same code at the same time, which is unique or sufficiently specific for the individual 2. Heightened security is provided by the code being a time-based code which changes in a rolling manner according to time. In the prior art, such a method is used to authenticate Internet logins such as by security
"dongle" apparatuses which can be attached to keyrings and display rolling codes, or by smart phone applications such as Google Authenticator . For communications which may occur
worldwide, the time parameter which coordinates updating of the code is specified according to a global standard such as universal coordinated time (UCT) rather than any local time zone. Uniqueness associated with individual 2 may be achieved by for example generating a secure hash using an algorithm such as SHA2 , using as inputs a time parameter (such as the current UTC hour and minute) , concatenated with a constant secret identifier (or periodically revised and automatically synchronised) of the individual. The secret identifier does not need to be known by the individual or used for any other purpose. Both the time parameter and the unique secret identifier are accessible by code generator 22 and 45 without access to the Internet, and therefore code generators 22 and 45 are able to both generate the same code at the same time, which renews when the time parameter changes .
[0031] Upon receiving the telephone call, individual 2 opens device software application 40, activates code generator 45 and can see the code displayed on the screen through sensory output generator 43. Individual 2 asks the representative of entity 1 for the verification code, and the representative can access the same verification code through code generator 22 which accesses individual data 23 containing the secret identifier of the individual .
[0032] While the second method of implementation #1 is somewhat less secure, being dependent on the secrecy of the secret identifier used in the synchronised remote code generation, it has advantage of not necessarily requiring Internet connection which may not always be available during a telephone call .
Embodiments are envisaged which have both capabilities, whereby individual 2 can ask for the transmitted verification code received as in the first embodiment above, which may be a genuine one time random number, or if Internet connection is unavailable individual 2 can ask for the rolling time-based code which does not require Internet connection. Implementation #2-Internet transmission of verification
[0033] This implementation of the broad aspect of the invention is a class of embodiments which use a verification signal where the verification code is sent over the Internet from the
individual 2 to the entity 1 via the device software
application. This can be a rolling time-based verification code as described above or in a minimal application can be a constant verification code, such as an account number of individual transmitted securely. Possible types of entities and other general descriptions as described above in relation to
implementation #1 also apply to this implementation 2 where feasible .
[0034] In this implementation #2, referring now to Figure 5 and Figure 6, an employee of entity 1, a bank called MyyBank, places a telephone call with individual 2, constituting the
notification step 101. Contemporaneously or prior to the call, the employee through employee server 10 operates call intention recorder 27 to record that a telephone discussion is intended. Call intention recorder 27 uses code generator 22 and stores a generated verification code in code store 2 . As discussed below, this verification code is not necessarily secret and may simply be identifying minimum information such as the identity of individual 2 together with a time or time period at which the intention was formed or the call initiated, or alternatively together with a real-time datum indicating that a telephone call between the employee and individual 2 is in fact in progress routed through entity computer 20.
[0035] Having received a telephone call, individual 2 named Jeremy wishes to continue with the telephone conversation subject to verification, and therefore operates a "verify phone call" option 62 on a menu shown on screen display 60 of device software application 40. Individual 2 selects the "verify phone call" option 62.
[0036] Software application 40 is then caused to operate code generator 45 to generate a verification code. The purpose of this verification code is to securely identify to entity 1 that individual 2 is returning a call. Since individual 2 will already have provided security by way of fingerprint, PIN or other identification to open software application 40 or
smartphone 3, and also since the communications between software application 40 and entity 1 is trusted and secure (typically encrypted) , the generated verification code can be simply a known identifier of individual 2 such as an email address. Extra security can be provided by a more sophisticated verification code such as the rolling time-based verification code mentioned above or other one-time password, but is not necessary for acceptable security.
[0037] After generating the unique verification code, software application 40 is then caused to operate code transmitter 46 which securely communicates the verification code over Internet 60 to entity computer 20 through code verifier 26. Code verifier 26 accesses code store 24, and locates the corresponding
verification code or corresponding matching information
indicating that an intended telephone discussion exists. Code verifier 26 then securely communicates a verification signal through Internet 62 device software application 40. Verification receiver 47 receives a verification signal and causes sensory output generator 43 to display (display screen 61) a
verification confirmation 63 on digital communications device 3 reading "The call from Tom at MyyBank is legitimate. You may proceed". If an intended telephone discussion does not exist, the system preferably does not remain silent but communicates a non-verification signal causing sensory output generator 43 to display a warning that the call is illegitimate.
[0038] Individual 2 then proceeds reassured to conduct the telephone discussion in the knowledge that a communication from entity 1 was intended at the same time and therefore acceptably verified.
Implementation #3- call-back verification and routing.
[0039] This implementation allows the individual 2 to use a verification code to facilitate return calling. Possible types of entities and other general descriptions as described above in relation to implementation #1 also apply to this implementation
3 where feasible.
[0040] Referring now to Figure 7, this implementation is illustrated as an add-on feature to the implementation of Figure 2, but can also be implemented as an add-on feature to the implementation of Figure 4 or 5 or otherwise. In all versions, individual 2 receives a first telephone call from the entity which individual 2 does not answer, either because individual 2 is not available or for any other reason. The phone call from entity 1 may be preceded by the entity 1 activating the
notification steps and code storage through software application
4 described above, or the making of a telephone itself may provide the step 101 of notification, depending on the
implementation. Individual 2 then either makes a note of the verification code sent over the Internet and displayed through device software application 4, or uses code generator 45 to generate the verification code. Individual 2 then makes a telephone call through smart phone 3, landline or otherwise to entity 1. Telephone call router 26 in entity computer 20 answers the telephone call and presents an option to individual 2 or scans for an utterance or tone dialling or other transmission means over the telephone call of the verification code. If telephone call router 26 receives a valid verification code confirmed from accessing code store 24 as described above, telephone call router 26 is then able to immediately direct the telephone call to the responsible employee, speeding
communication and requiring no further verification. In this embodiment, the verification process may also be used to allow individual 2 to bypass an answering queue.
[0041] Persons skilled in the art will also appreciate that many variations may be made to the invention without departing from the scope of the invention, which is determined from the
broadest scope and claims.
[0042] For example, individual 2 can simply be a private person, as can entity 1, accordingly the invention extends in its broadest aspects to private communication between individuals who may fear unidentified communication, as well as from the more common application of communication from corporate entities to customers.
[0043] Further, the term "telephone discussion" refers to any electrical or electronic remote voice discussion received or initiated by the individual, and includes traditional telephone connections as well as voice over Internet protocol (VOIP) calls and also includes discussions between an individual and a remote artificial intelligence language understanding algorithm.
[0044] Further still, the data network connection referred to in the claims over which the trusted connection between the entity and the individual is formed may be the Internet or any other remote data transmission network, including data network connections provided by SMS, MMS or similar.
[0045] In the claims which follow and in the preceding
description of the invention, except where the context requires otherwise due to express language or necessary implication, the word "comprise" or variations such as "comprises" or
"comprising" is used in an inclusive sense, i.e. to specify the presence of the stated features but not to preclude the presence or addition of further features in various embodiments of the invention. Further, any method steps recited in the claims are not necessarily intended to be performed temporally in the sequence written, or to be performed without pause once started, unless the context requires it.
[0046] It is to be understood that, if any prior art publication is referred to herein, such reference does not constitute an admission that the publication forms a part of the common general knowledge in the art, in Australia or any other country.

Claims

1. A method of conducting a verified telephone discussion, the method comprising the steps of :
an entity notifying an individual of an intention to conduct a telephone discussion with the individual, the individual having access to a communications device connectable to a data network and with a device software application implementing a trusted connection between an entity computer and the individual over the data network, the software application being adapted to generate or receive a verification code of the intention, the verification code being accessible or reproducible by both the entity computer and by the device software application;
generating the verification code;
verifying the intention between the entity and the individual by either receiving a communication of the verification code from the individual and checking that the communication of the verification code matches the verification code, or by
communicating the verification code to the individual for checking by the individual ; and
conducting the telephone discussion.
2. The method of conducting a verified telephone discussion of claim 1, wherein the step of the entity notifying the
individual of the intention comprises the steps of :
generating, within the entity computer, a notification signal signifying that the entity intends to conduct a telephone discussion with the individual;
sending the notification signal from the entity computer over the trusted connection to the device software application running on the communications device;
the device software application being configured to inform the individual of the intention and providing the verification code to the individual through a trusted sensory output, in response to receiving the notification signal.
3. The method of conducting a verified telephone discussion of claim 2, further comprising the step of the entity initiating a telephone call to the individual;
the step of verifying the intention comprises making an utterance of the verification code to the individual in the telephone call, for the individual to check that the utterance matches the verification code. . The method of conducting a verified telephone discussion of claim 2 or claim 3, further comprising the step of the entity computer generating the verification code and transmitting the verification code to the device software application over the trusted connection.
5. The method of conducting a verified telephone discussion of claim 2 or claim 3, wherein the entity computer and the device software application are each programmed with a
verification code generating algorithm adapted to generate the verification code independently; and
the device software application is configured to operate the verification code generating algorithm to generate the
verification code, in response to receiving the notification signal .
6. The method of conducting a verified telephone discussion of claim 1, further comprising the step of storing a record of the intention in the entity computer, and wherein:
the step of the entity providing a notification of the intention comprises initiating a telephone call to the
individual ;
the step of verifying the intention comprises the software application, triggered by the individual in response to
answering the telephone call, communicating the verification code over the trusted connection to the entity computer, the verification code comprising at least a code identifying the individual, followed by the entity computer accessing the data memory to verify that the verification code corresponds to the recorded intention, the entity computer transmitting a
verification signal to the device software application over the trusted connection , in response to which the device software application is configured to verify the telephone call to the individual by a trusted sensory output.
7. The method of conducting a verified telephone discussion of claim 1, wherein the entity computer and the device software application are each programmed with a verification code
generating algorithm adapted to generate the verification code independently; the method further comprising steps of:
recording the intention in a data memory of the entity computer ;
making a first telephone call to the individual which is not answered or is terminated by the individual, thereby providing the step of providing a notification of the intention to conduct a telephone discussion;
receiving a return telephone call from the individual to the entity intending to conduct the voice discussion,
and wherein:
the step of the device software application receiving or generating the verification code comprises the software
application, triggered by the individual in response to
receiving the first telephone call, operating the verification code generating algorithm to generate the verification code; the step of verifying the intention comprises receiving the verification code from the individual over the return telephone call, and accessing the data memory to verify that the
verification code corresponds to the recorded intention, and if so conducting a voice discussion with the individual over the return telephone call .
8. The method of conducting a verified telephone discussion of claim 7, wherein the step of conducting the voice discussion the individual over the return telephone call comprises
diverting the return telephone call from a telephone queue and connecting the individual with an assigned representative for the telephone discussion.
PCT/AU2018/050188 2017-03-03 2018-03-01 Securely verifying voice communication Ceased WO2018157211A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2019101103A AU2019101103A4 (en) 2017-03-03 2019-09-24 Securely verifying voice communication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2017900733A AU2017900733A0 (en) 2017-03-03 Securely verifying voice communication
AU2017900733 2017-03-03

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2019101103A Division AU2019101103A4 (en) 2017-03-03 2019-09-24 Securely verifying voice communication

Publications (1)

Publication Number Publication Date
WO2018157211A1 true WO2018157211A1 (en) 2018-09-07

Family

ID=63369607

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2018/050188 Ceased WO2018157211A1 (en) 2017-03-03 2018-03-01 Securely verifying voice communication

Country Status (1)

Country Link
WO (1) WO2018157211A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11695779B2 (en) 2021-01-28 2023-07-04 MSP Solutions Group LLC User management system for computing support

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2755372A1 (en) * 2013-01-11 2014-07-16 British Telecommunications public limited company Validating communications
US20150063552A1 (en) * 2011-07-24 2015-03-05 Emue Holdings Pty Ltd. Call authentification methods and systems
US20150087265A1 (en) * 2013-09-24 2015-03-26 Telesign Corporation Call center sms verification system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150063552A1 (en) * 2011-07-24 2015-03-05 Emue Holdings Pty Ltd. Call authentification methods and systems
EP2755372A1 (en) * 2013-01-11 2014-07-16 British Telecommunications public limited company Validating communications
US20150087265A1 (en) * 2013-09-24 2015-03-26 Telesign Corporation Call center sms verification system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11695779B2 (en) 2021-01-28 2023-07-04 MSP Solutions Group LLC User management system for computing support
US12041060B2 (en) 2021-01-28 2024-07-16 MSP Solutions Group LLC User management system for computing support
US12301585B2 (en) 2021-01-28 2025-05-13 MSP Solutions Group, LLC User management system for computing support

Similar Documents

Publication Publication Date Title
US12256040B2 (en) Authentication using DTMF tones
US8751801B2 (en) System and method for authenticating users using two or more factors
KR101268702B1 (en) Verifying authenticity of voice mail participants in telephony networks
US20110211682A1 (en) Telephony fraud prevention
US20110026699A1 (en) Method and system for authenticating telephone callers and avoiding unwanted calls
JP4633059B2 (en) Authentication method and device in telecommunication network using portable device
US8254542B2 (en) Phone key authentication
CA2831527C (en) Computer-implemented system and method for validating call connections
JPH10136086A (en) Universal authenticating device used on telephone line
KR102748605B1 (en) Technology for currency authentication
US20070094497A1 (en) Secure authentication with voiced responses from a telecommunications terminal
WO2016144806A2 (en) Digital voice signature of transactions
KR101718368B1 (en) System and method of a security communication using biometrics
KR102335892B1 (en) Method for identifying user using sound and apparatus therefor
JP2004185454A (en) User authentication method
AU2019101103A4 (en) Securely verifying voice communication
WO2018157211A1 (en) Securely verifying voice communication
EP1119147A1 (en) Provision of secure access for telecommunications system
EP3340560A1 (en) Mobile device user validation method and system
KR20160076494A (en) Method for Preventing Voice Phishing by using Qualified Caller Information
RU2829208C1 (en) Mobile communication subscriber authentication method
KR20100092074A (en) System and method for providing distinguishable sound of registered caller for preventing voice pishing and record medium
JP4483380B2 (en) Portable information terminal search system, portable information terminal and search method thereof
RU2833407C1 (en) Method of authenticating mobile communication subscriber using information on local area of its location
KR20090127759A (en) Method and system for synchronizing between IP phone terminal and user terminal and recording medium therefor

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18761913

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18761913

Country of ref document: EP

Kind code of ref document: A1