亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。

Efficient Identification and Content Authentication for Phone Calls

详细技术说明
None
*Abstract

Cryptographically Authenticates Phone Calls for Secure Personal and Professional Communications

This application cryptographically verifies the identity of callers to ensure that phone calls are authentic, assuring users that their information is safe. Financial, medical, or other personal information is commonly communicated through phone calls or other telephony technology. In 2014, 17.6 million Americans lost an estimated total of $8.6 billion in fraudulent phone scams, most of which were a result of caller ID spoofing. Telephony advancement is failing to meet the need for more secure and trustworthy communication channels. Caller identity is currently verified through look-up services or biometrics, such as voice recognition, but neither protect against forgery.

Researchers at the University of Florida have developed the AuthentiCall system, which cryptographically authenticates both parties on a call. AuthentiCall can be implemented on both personal and professional communications servers or as a cellular application.

Application

Authentication system that verifies financial, medical, and personal information is communicated securely, decreasing privacy issues and phone fraud

Advantages

  • Detects 99 percent of tampered audio calls, increasing the integrity and security of conversations
  • Initiates call monitoring within the first second, preventing redirection of calls to an adversary
  • Installs easily on servers or cellular devices, providing protection for corporations, businesses, and individuals

Technology

The AuthentiCall system uses cryptography to provide stronger authentication through the coding and decoding of secure messages in data and audio channels. Cryptographic authentication is more secure than the other available methods, because it provides end-to-end authentication between the callers. The use of formally verified protocols, which bind data and audio channels, provides a stronger guarantee of the integrity of conversations that occur over traditional phone networks. This authentication occurs within the first second after a call is answered, and continuously refreshes during the duration of the call. AuthentiCall detects tampered audio, spoofing calls, or unverifiable identities.
*Principal Investigation

Name: Patrick Traynor

Department:


Name: Bradley Reaves

Department:


Name: Hadi Abdullah

Department:


Name: Logan Blue

Department:


Name: Luis Vargas

Department:


Name: Thomas Shrimpton

Department:

其他
国家/地区
美国

欲了解更多信息,请点击 这里
移动设备