17948824. VOICE CALL IDENTIFICATION AND AUTHENTICATION BASED ON APPLICATION USAGE simplified abstract (RED HAT, INC.)

From WikiPatents
Jump to navigation Jump to search

VOICE CALL IDENTIFICATION AND AUTHENTICATION BASED ON APPLICATION USAGE

Organization Name

RED HAT, INC.

Inventor(s)

Nir Magnezi of Pegah Tikva (IL)

Arie Bregman of Gan Yavne (IL)

VOICE CALL IDENTIFICATION AND AUTHENTICATION BASED ON APPLICATION USAGE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17948824 titled 'VOICE CALL IDENTIFICATION AND AUTHENTICATION BASED ON APPLICATION USAGE

Simplified Explanation

The patent application describes systems and methods for call identification and authentication using a pool of phone numbers. When a client device requests a phone number to initiate a voice call, a phone number is provided from the pool. If the client device successfully makes a call using the provided number, it is declared authenticated.

  • Pool of phone numbers maintained for call identification and authentication
  • Client device requests a phone number for initiating a voice call
  • Phone number provided from the pool to the client device
  • Client device authenticated upon successful call using the provided number

Potential Applications

This technology could be applied in:

  • Telecommunications industry for secure voice call authentication
  • Call centers for verifying customer identities

Problems Solved

This technology solves the issues of:

  • Unauthorized access to phone systems
  • Caller ID spoofing

Benefits

The benefits of this technology include:

  • Enhanced security for voice calls
  • Improved authentication processes

Potential Commercial Applications

The potential commercial applications of this technology include:

  • Secure communication platforms
  • Identity verification services

Possible Prior Art

One possible prior art for this technology could be:

  • Two-factor authentication systems for phone calls

Unanswered Questions

How does the system handle multiple authentication attempts?

The patent application does not specify how the system deals with multiple authentication attempts from the same client device.

What measures are in place to prevent unauthorized access to the pool of phone numbers?

The patent application does not detail the security measures in place to protect the pool of phone numbers from unauthorized access.


Original Abstract Submitted

Systems and methods providing call identification and authentication. In one implementation, a pool of phone numbers is maintained. A request for a phone number for initiating a voice call is received from a client device. A first phone number from the pool of phone numbers is transmitted to the client device. Responsive to receiving, from the client device, the voice call at the first phone number, the client device is declared authenticated.