CA2247170A1 - Method and system for the secure communication of data - Google Patents

Method and system for the secure communication of data Download PDF

Info

Publication number
CA2247170A1
CA2247170A1 CA002247170A CA2247170A CA2247170A1 CA 2247170 A1 CA2247170 A1 CA 2247170A1 CA 002247170 A CA002247170 A CA 002247170A CA 2247170 A CA2247170 A CA 2247170A CA 2247170 A1 CA2247170 A1 CA 2247170A1
Authority
CA
Canada
Prior art keywords
user
tone
tones
signals
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002247170A
Other languages
French (fr)
Inventor
Andrew R. Mark
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smart Tone Authentication Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2247170A1 publication Critical patent/CA2247170A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/275Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips implemented by means of portable electronic directories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/02Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/16Automatic or semi-automatic exchanges with lock-out or secrecy provision in party-line systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q1/00Details of selecting apparatus or arrangements
    • H04Q1/18Electrical details
    • H04Q1/30Signalling arrangements; Manipulation of signalling currents
    • H04Q1/44Signalling arrangements; Manipulation of signalling currents using alternate current
    • H04Q1/444Signalling arrangements; Manipulation of signalling currents using alternate current with voice-band signalling frequencies
    • H04Q1/45Signalling arrangements; Manipulation of signalling currents using alternate current with voice-band signalling frequencies using multi-frequency signalling
    • H04Q1/453Signalling arrangements; Manipulation of signalling currents using alternate current with voice-band signalling frequencies using multi-frequency signalling in which m-out-of-n signalling frequencies are transmitted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/271Devices whereby a plurality of signals may be stored simultaneously controlled by voice recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/2753Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
    • H04M1/2757Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/30Devices which can set up and transmit only one digit at a time
    • H04M1/50Devices which can set up and transmit only one digit at a time by generating or selecting currents of predetermined frequencies or combinations of frequencies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/40Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/44Additional connecting arrangements for providing access to frequently-wanted subscribers, e.g. abbreviated dialling

Abstract

A user-authentication system includes an AUD for transmission of dtmf tones to a user-verification system over a telephone network. In a memory module of the AUD, voice and access data are stored for subsequent transmission to a user-verification system. A compensating system associated with the AUD generates two low frequency and two high frequency tones, and selectively amplifies them to varying levels to compensate for transmission efficiencies associated with conventional telephone microphones. The user-verification system further detects unauthorized users, and includes memory storing data relating to access numbers used, and a user's voice, a transmitter transmitting a first signal requesting voice information and a second signal relating to time, a receiver receiving the tones and the signal relating to time, and an analyzer device determining whether the access number used to reach the user-verification system is identical to previous access numbers used, whether the signal relating to time corresponds to the time of user-transmission of the tones, and whether the user's voice corresponds to the stored data. A system for routing a tone signal from the AUD to an intended user-verification system includes a central switch receiving tones from the AUD including an initial alert tone followed by data tones representing voice-related and destination-related data. The central switch includes an analyzer device analyzing the tones, and a routing device routing the tones to a user-verification system in response to the alert tone. A system for performing amplitude equalization associated with each of the user-verification systems has a receiver receiving tones relating to a user's voice, an amplifier generating an amplification factor for each of the tones, and a correcting device using the amplification factors to correct subsequent voice tones.

Description

METHOD AND SYSTEM
FOR THE SECURE COMM[~ICATION OF DATA

Cross-Reference to a Related Application This application is related to Serial Number 08/286,825, filed August 5, 1994, which is incorporated in its entirety by reference.
Field of the Invention This invention relates to a user~ tll~.ntication system, and more particularly to a user-thentication system using voice-related data.
Back~round of the Invention Telephone transactions are often used by consumers to obtain extensions of credit, make payment of debts, perform fund ~ r~l~, and order products from catalogs. Typically such tr~n~ctinns are carried out by a user with a touch-tone telephone, who enters a telephone number to access a service and enters numbers relating to the service such as credit card numbers or menu selections, from the telephone keypad after obtaining access.
Touch tones are the dual tone multi-frequency signals ("DTM~" tones), generated as the user enters numbers from the keypad. In accordance with the DTMF tech~ique used to generate touch tone signals, a touch tone signal is produced by generating two tones, one tone being selected from a high frequency band group and the other being selected from a low frequency band group. Each of the low frequency tones corresponds to one of the four rows of keys on a 20 standard telephone keypad, while each one of the four high frequency tones corresponds to one of the four columns of keys on a standard Pxt-~.n~1ed telephone keypad. A standard telephone keypad typically has three columns, but can be ex~Pn(le-1 as the tones generated by a fourth column are recognized by most central office receivers. In telephone transactions, the touch tones typically leplt;se~ a number or character that corresponds to user-information ~e.g., entering numbers that 25 represent a credit card number, PntPring letters that represent a surnarne) or service selections (e.g., çntçrin~ a " 1 " to choose a list of products offered, versus PntPring a "0" to order products).

W O 97/31472 PCT~US97/02907 Although telephone transactions afford convenience to those who use them, they are often wrought with security problems. For example, a person viewing or overhearing the initi~tion of a telephone transaction can record a credit card number entered through the telephone keypad or spoken into the h~nllset microphone~ The recorded credit card number is later, and often s llndetecf~bly, used to carry out fra ~ lent transactions by l]n~llthnri7ed individuals. Similarly, a person overhearing or viewing another entering a personal identification number ('pin') can use the pin to access, and often deplete or use, such accounts as one's bank account or telephone calling card account, with the account holder discovering the theft only after the damage has been done.
lo While portable electronic il~ollllaLion cards have attempted to solve the problem by providing a system that can be acoustically coupled to a telephone system, the data tr~n.~mi.~ion errors and security problems inherent in such cards has inhibited widespread acceptance and use of them. Security problems such as pin detection remain common, particularly when one uses the card with a cellular phone. Moreover, errors associated with such cards are often due to the 5 neces~ry acoustic couplings associated therewith. Also common are errors due to temperature variations affecting battery voltages, amplification levels applied to DTMF signals, speaker proxirnity to a telephone h~n~1set's microphone, distortions introduced by the microphone receiving DTMF tones, and ambient noise. Although promising a measure of convenience and privacy, the implement~tion of electronic i~ alion cards has brought about a host of new 20 problems without ~i~nific~ntly alleviating or solving many existing security problems associated with telephone transactions.
As the accuracy and security associated with telephone tr~n~ction~ is often co, .,prolllised, there exists a need for a system capable of m~ -g the fl~xihilit.y and convenience inherent in telephone transactions, while not comprising the privacy and security 25 necessary to prevent the occurrence of fraudulent transactions.
The present invention provides a user-allthentication system that avoids the above-noted problems, while ilnl)lOVillg signal tr~n~mi~inn, signal routing, and system security.
Sumlll~y ofthe Invention In brief s~ .lllaly, the invention relates to an improved user~ thentication system that 30 incl~ es a user-activated authorized user device (AUD) and a user-verification system (IJVS). In -CA 02247l70 l998-08-2l W 097/31472 PCTAU~97JO29~7 one embodiment the system incllldes a user-activated AUD that is portable and easily couplable to a telephone or microphone for tr~n.qmi~qion of dtmf tones to the user-verific~tinn system ~cc~s~ihle by the telephone network. In one embodiment, the user-activated AUD has stored therein, voice-related data representing the human voice characteristics of the authorized user, as s well as encoded access data enabling the voice-related data to be tr~nqmitted to the deeign~fetl user-verification system. Tones tr~nqmitted from the user-activated AUD reach a publicly switched network from which they are passed through an integrated services digital network to a routing system which ensures that the tones reach their int~n-led WS.
In one embodiment of the invention, the user-authentication system comprises a lo co~ .q~ g system associated with the user-activated AUD and designPd to compensate for the variances in the tr~n.qmi.~.~ion ch~nnel inrlll~ing v~ri~nces associated with handset microphones.
The compenq~ting system comprises a pair of tone generator devices that generate low frequency tones and high frequency tones, respectively. In electrical commllnir~tion with the tone generator devices are amplifiers that amplify each of the low frequency tones and high frequency tones to 5 predetermined, di~Le"~ amplification levels. 'rhe amplification levels compensate for the low and high frequency tone tr~n.qmi.q.qion characteristics associated with di~ microphones in use in a public telephone system. The comp~n.q~ting system combines each of the low frequency tones with a respective one of each of the high frequency tones to form at least two tone pairs, each tone pair having a low frequency tone and a high frequency tone specifically configured to 20 compensate for any deficiencies in the tr~n.~miq.qit-n ~.fficiency of the particular microphone used.
In other embodiments of the user~ thentication system, the system pc;lru~ s channel norm~li7~ti()n with the user-activated AUD and the WS. The ch~nnel is the comml-nic~ti~-n m~ lm over which signals are ll ~ n.~il "; l l ed between the AUD and the WS . In one embodiment tone signals 1 ~les~"~a~ive of the access telephone number tr~n.qmitted by the AUD to reach the 2s WS, have a reference amplitude of zero. The WS receives the tones and a variable amplifier generates gain factors that compensate for deviations in the expected signal strength of each of the tones, caused by deficiencies in the telephone system. In another embodiment, the AUD
generates a first plurality of standard tones that are representative of the portion of the frequency spectrum in which an ~llthori7ed user's voice typically lies. A tr~n~mittPr transmits the first 30 plurality of standard tones to the WS. The WS receives the first plurality of standard tones and 2 PCT~US97/02907 a variable amplifier generates amplification gain factors that compensate for deviations in the expected signal skength of each of the first plurality of standard tones, caused by deficiencies in the telephone system. In yet another embodiment, an inter-digit pause between tone signals tr~n.~mitting data, is used to transmit single frequencies of predetermined amplitudes. In response 5 to reception of the single frequencies at the WS, the variable amplifier generates ~mrli~c~tion gain factors. In each of the above embotliment~, the WS then amplifies any further signals using the amplification gain factors derived from the compensation of the tones. This compensation permits the WS to have an accurate repres~nt~ion oftr~n~mitte~l signals such as the user's voice, prior to pe-rolllf,llg user-verification.
0 In yet another embodiment of the invention the user-zluth~ntication system includes a routing system for routing a tone signal from the user-activated AUD to a WS where user-verification can take place. The user-activatable AUD includes a tone-generator that transmits a plurality of tones comprising an initial alert tone followed by data tones representing information-related data and destin~tion-related data. A central switch on the telephone network comprises a receiver that receives the tones; a processor that analyzes the plurality of tones; and a router which routes the plurality of tones to a WS in response to the alert tone. More specifically, this aspect of the present invention routes the plurality of tones to another switch on the network when the alert tone is not recognizable, and routes the plurality of tones to a WS when the alert tone is recognizable.
In still another embodiment of the invention, a WS incl~ es a system clock to prevent fraudulent access of a system or networl~ by an lln~llthori2ed user who transmits a tape recording ofthe authorized user's voice. The WS ~ Sl~ S a time signal relating to the time supplied by the system clock during the time period when a user is supplying information by way of the telephone network. A receiver in electrical communication with an analyzer, receives the user-2s supplied information and the time signal if present. The analyzer determines whether the time signal corresponds to a~p~ aLely the present time. The user is denied access if the signal relating to time corresponds to a time other than the present time at which the user was requested to provide the information.
These and other objects, aspects, features and advantages of the invention will become more appalenl from the following drawings, detailed description and claims.
-WO 97/31472 PC~JlJS97J~2907 Brief Description of the Drawin~s T~is invention is pointed out with particularity in the appended claims. The above and further advantages of this invention may be better understood by referring to the following description taken in conjunction with the accolllpally;ng drawings, in which:
Fig. 1 is a block diagram showing the user~ th(~ntication system of the present invention.
Fig. 2A is a block diagram of an embodiment of the user-activated AUD in use with a telephone.
Fig. 2B is a block diagram illustrating an embodiment of the dtmf decoder components of Fig. 2A and the associated data path taken when the AUD is used for data reception.
Fig. 2C is a block diagram illustrating an embodiment of the dtmf encoder components of Fig. 2A and the associated data path taken when the AUD is used for data tran~mission.
Fig. 3A is a diagrarnmatic representation of an embodiment of tone pairs generated by the AUD of the present invention.
Fig. 3B is a dia~ iC repres~nt~tinn of the tone pairs and the data e~tensions in the gaps between tone pairs.
Fig. 4A is a block diagram showing a telephone network central switch configured on the telephone network with the user-authentication system of the present invention.
Fig. 4B is a dia~ la~ic representation of the format of tones tr~n~mitted from the user-activated AUD.
Fig. 5 is a block diagram of an embodiment of the components of a user-verification system.
Fig. 6A~ 6B, and 6C are graphical illustrations of the process of correcting signals using standard tones.
Fig. 7A is a fiow chart describing the process by which tones reach a user-verification 2~ system.
Fig. 7B is a flow chart describing the process by which the system performs user-verification.
Fig. 8 is a block diagram showing a service ?~cc~ihle to an authorized user through the user-authentication system.

W O 97/31472 PCT~US97/02907 Detailed Description of the Invention Referring generally to PIG. 1, the user-allth~ntication system 1 ofthe present invention is shown. The user-auth~ntic~tion system incllldes a user-activated AW 2 that is ple~l~ly portable for use with a landline or cellular telephone. Alle.llalivt~ly, the AUD can be installed in 5 or attached to, a system capable of ll ~n.c" ~ tone signals, such as a telephone 4 or colllL,ulel 6.
The AW 2 is a user-activatable device carrying authorized user-identifying information in volatile memory, as fi~rther described below. User-identifying information pertains to data relating to a user's characteristics such as user-chosen identifying numbers or words (~ mplçs of which are pin numbers and passwords or passphrases), identifying char~ct~.ri~tics or data (examples of which lo are eye color, social security number, and place of birth), as well as authorized user voice-related data, an example of which is a spectral representation ofthe user's voice.
As will be further described, the user-activated AW 2 has a tr~n~m;tter for tr~n.qmitting the user-identif~ing illrollnalion over a telephone network in the form of low frequency and high frequency tone signals. If used with a landline telephone or computer, the tone signals are initially 1~ tr~ncmitted to a telephone exchange switch, hereinafter referred to as a central switch 8 capable of routing the signals to a user-verification system (IJVS) 12 by accessing the telephone network 10, for example, a local exchange carrier such as NYNEX, and possibly a long distance carrier such as AT&T, as further described below. If used with a ce11ular telephone, for example if one is calling from a car phone, the tone signals are initially tr~n~mitted to a cellular telephone switch 20 (not shown) which ll~slll,ls the tone signals to the central switch 8 which routes them to the WS 12 as described above. Upon reaching the WS 12, as further described herein, a voice prompt will ask the user to transmit user data from his A~JD, whereupon the WS 12 transmits signals int~n~1e-1 to frustrate an interloper who is using the AW as part of a fraudulerlt attempt to impersonate the actual owner of the A~JD.
In one embodiment, there are preferably a plurality of WS's 12 available to the user on both the local and the long distance telephone network, however the signals are typically only routed to only one of them. Preferably, the WS 12 that receives the signals is ~ccessihle over the local telephone network. The WS 12 includes electronic processing components, as further tli~cu~sed below, which are capable of pe~ ing tone-signal level correction, voice verification, time stamp verification, knowledge-based verification, and other functions such as pin number W O g7131472 PCT~US97J02907 v~rific~tion~ The WS 12 upon determinin~ a valid and ~thor7:ed user, serves as the user's gateway to accessing services including but not limited to private records, e.g., telephone or b~nking, mail order companies, the internet and certain chat groups, as well as other h~,lnaLion services such as DIALOG, WESTLAW, and various reporter services. The WS 12 is further 5 equipped with additional security safeguards for detecting un~llthQrized users, as further described below. The WS 12, based upon its analysis of the user-spoken data, ~et~rm;nes the level of ce, ~aillLy that the liUll el-lly spoken utterances match those of the user to whom the AUD
has been ~ ne-l The call architecture for transmitting the tones to an int~ndçd WS 12 ;n the embodiment 0 shown in Fig. 1 is as follows. The user activates the AUD 2 when he/she desires to access a service for which user-~uL1~ ;c~tinn is required. If the user is a~;LivaLi~l~, the AUD with a cellular telephone, the number dialed by the AUD 2 is first ~l~n.~ ed to a cellular switch (not shown), which may have preliminary autll~nticating tests associated therewith. If the user is prç~imin~rily-~llti~ntic~ted the call is ~ n~ ed to a Far End Local Switching Office (FSO) (not shown).
1S With l~n-lline communications, the number dialed by the AUD 2 reaches an FSO located on the network nearest the telephone. The FSO, upon receipt of signals from the AUr) 2 decodes the alert tone and destin~tion data to cletl~.rmine which WS 12 the signals should be routed to. The FSO receives destination data, e.g. a telephone number, for the user's local WS 12. Often, however the user is located outside of the calling area in which the WS is located. Thus, after 20 receiving the destin~tion data, the FSO c~ ..ul~icates with a network database to detçrmine, based on the telephone number that the user is dialing in from, to deterrnine which local WS 12 the tone signals should be sent to. The FSO, after receipt of a signal from the database in~ tin~
the telephone number associated with a local WS 12, the FSO will send the tones to an Near End Switching Office (NSO) (not shown) located on the network nearest the local WS 12. In 2s this manner, the tones will be tr~nimitted from the FSO to an NSO over a local carrier. Upon reaching the NSO, the signals are routed to the central switch 8. The central switch 8 thus ~ decodes an alert tone (602), as further described below, which is indicative of a request to be transferred to a WS 12, and dçstin~tion data (610), as further described below, which typically design~tes the user's local WS 12. If the alert tone (6~2) is recognized, the central switch 8 30 routes the signals back to a WS nearest the NSO. In the event that the central switch 8 does not recognize the alert tone (602), the signals are routed according to the d~stin~tinn data (610), thus W O g7/31472 - PCTrUS97/02907 the signal is sent back to the NSO over appropliate carriers via a packet switching system and other central switches to an applopli~Le WS 12.
Also shown in this figure is the call ar~hitectllre of the system when a new AUD 2 is activated. In this scenario, an AUD device m~mlf~ct-lrer 18 comm--niç~tt?.~ with an AUD
5 fulfillment center 16 responsible for loading the user's speech file and other identifying data into the AUD 2. The fillfillm~nt center 16 communicates with an AUD device issuance and control system 14 responsible for ~n.curing that the central switch 8 and appropriate UVS 12 acknowledge the AUD 2 upon initial use by the user. The issuance and control system 14 also communicates with a packet switching system (not shown) which provides the necessary data to the FSOs, lo NSOs, and centrai switch 8 on the local network, as well as other central switches located on long distance ne~wo.k~. In this manner any FSO, NSO, or central switch on a local or long distance carrier can process any call request made by any user of an AUD 2.
As stated above, the AUD issuance and control system 14 which is responsible foractivating new AUDs. AUD fulfillment centers 16 receive "blank" AUD's, i.e. those without any 15 idellLiryillg hlrol~Lion relating to a user, from an AVD m~nllfact~rer 18. Users become subscribers and thus obtain an AUD 2 by calling the AUD issuance and control system 14. The AUD issuance and control system 14 thus receives the name of the subscriber who will be the plh~laly subscriber, to "head" the account. Typically, if a family account is to be issued, the prirnary will be the mother or father. Nolwi~ ing the de~ign~tion of a primary, a spouse will 20 have privileges equal to those ofthe plim~y.
The p~ l~y, upon contact with the i~ nr.e and control system is asked a series of questions, typically requesting the plilll~y's: name, telephone number, social security number, address, age, date of birth, place of birth, mother's maiden name, number of siblings, children' s birthdays, number of children, and descriptive characteristics like eye and hair color, as well as 2s height. Responses to the questions are stored as identifying information needed to later identi~f the user through knowledge-based questioning. Additionally, the user will be asked to select a personal i(l~.ntifi~ion number (PIN) and a plurality of passwords or passphrases, for recordation in a speech file which will later be used for user and voice-verification. As the primary states the passwords or passphrases, his/her voice will be recorded by the system 14 in a speech file. If the 30 pl;nlaly is calling the AUD issuance and control system 14 using a cellular phone, the p~ laly will WO 97/3~472 PCT/US97102907 be requested to state the passwords or passphrases through the telephone handset as well as through the speakerphone, due to the increased ambient noise levels associated with the speakerphone.
The AUD issuance and control system 14 is also responsible ffir pelr~lmillg password or s passphrase sufficiency screening to ensure that that the proposed password or passphrases have the proper characteristics to allow it to be used for a user's typical channel conditions and the level of security desired. The proper characteristics can incl~ldç, but are not limited to: the proper phonetic makeup, the spectral distribution of the user's voice, and the proper cadence. After the user speaks a password or passphrase, it is evaluated using one or more of these characteristics.
lo If it does not possess desirable levels of one or more of these characteristics, the password or passphrase is rejected and the user is prom~led to choose another password or passphrase.
Typically a deficiency in one of these characteristics can be col~t;nsated for in the other characteristics. Algebraically, each characteristic is ~ n~d a value, which when added to the values ~ igned to the other characteristics results in a measure of acceptability of the password or 15 passphrase. This is shown as: P + ~ + C = K
where P represents the phonetic makeup, ~ represents the spectral di~lil u~ion, C represents the ç7~çnçe, and K ~ sen~s the " ~ ll l l acceptability value which is a function of the types of eh~nnel~ the user intends to use, and the desired }evel of security. If the level acceptability is less than the desirable level required to ~llthentic~te the user, the password or passphrase is rejected 20 and the user is prompted to propose another password or passphrase. It should be noted that i~
one of the char~cteri~tics for which the password or passphrase is evaluated is insu~cient, one or more of the other values can compensate for it. For example, if the user has a low cadence password or passphrase, but the phonetic makeup is high, then the combination of cadence and phonetic m~k~lp can lead to an acceptable value, making the password or passphrase acceptable 25 to the WS 12.
Should the primary desire other users to be inclllded on the account, the plilnaly contacts the system 14 and enables the user as a subordinate. Identif~ring information and speech files are then compiled by the system 14 for such subordinates. ~tlrlitinn~lly, restrictions on time limits as well as the ability to access certain services through the WS 12 may be placed upon the 30 subordinate's account by the pLhll~y. The AUD fillfillment centers 16, under the direction of the W O 97/31472 PCTnUS97/02907 AUD issuance and control system 14 thus installs both primary and subordinate users' personal identifying data, pin, and speech files into an AUD 2. After in~t~lling such information, the AUD
fillfillm~nt centers 16 transmit the serial numbers ofthe "identified" AUDs 2 back to the issuance and control system 14, and the AUD 2 is mailed to the primary and subordinate users.
s Hereinafter, the term user7 unless otherwise specified will mean either the primary or subordinate user.
As shown in Table I below, the AUD 2, in one embodiment of the invention, stores the personal identifying data, pin and speech file in ROM, as further described in Fig. 2A. In Table I, the following he~-ling.c appear: field, quantity, bytes and extension. The column de~ign~ted lo 'Field' design~tes the items to which the data relates. Data relating to these items is typically installed by the AUD m~n-lf~cturer 18, AUD ffilfillment center 16, or AUD issuance and control system 14, or as an update received after it has been registered to the user, described in further detail below. The column de~i~n~e~ 'Quantity' refers to the number of such field items for which data is stored. The colurnn de,~ign~ted 'Bytes' references the number of bytes of memory-15 allocated to the data in each ofthe fields. The column de.~i~n~ted 'Extension' relates to theamount of memory required to store the data. The memory allocations in Table I are exemplary, as other allocations may be used by those of Ol dillaly skill without departing from the scope of the invention.
In this embodiment, the AUD is assigned a device number and a body number, each of 20 which is stored using 8 bytes of memory. The device is further ~signed an encrypt code, should the data stored therein be encrypted, which is stored using 4 bytes of memory. The user name is stored using 20 bytes of memory, and the user's l~ ge is stored using 1 byte of memory. The user's speech file co,.~ g at least two passwords or passphrases is stored using 50 bytes of memory. The user's identifying data, used for knowledge-based questions is stored using 4 bytes 2s of memory. The identifying data is typically descriptive data as described above as well as a~ls~tl~ to the previously asked knowledge-based questions. The issue date and fillfilime.nt center that issued the AUD 2 are stored in 5 bytes of memory. The type of user that the AUD 2 is ned to, either an adult or child, and that user's status, p~ y or subordinate, is stored in 6 bytes of memory. Access numbers are the telephone numbers that the AUD 2 calls to reach a 30 WS 12. ~n original, or seed access number is used by an algorithm for generating subsequent access numbers, each of which con-nect the user to the WS 12. In one embodiment, the _ WO 97/31472 PCT~US97~a2907 algoliL~ will increment the access number by a constant multiple, e.g. last digit of number plus two. The access number dialed by the AUD 2 f~ lit~tes the WS 12 in detPrrninin~ whether the user is ~lt~tic.

WO 97/31472 PCTrUS97tO2907 Field Qty Bytes Extension Device ~ 1 8 8 Body # 1 8 8 Encrypt Code 1 4 4 User Name . 20 20 Language Speech File 1 50 50 Identification 8 4 32 File Issue Date 1 3 3 Fulfillment 1 2 2 Center Type/Status Original Access # 1 15 15 Total 116 TABLE I
Referring to Fig. 2A the basic processing elements in the AUD 2 are illustrated, in accordance with one exemplary embodiment of the present invention. The AUD 2 eo,~ ises a microprocessor 104 coupled to a read only memory (ROM) 106, an input device 105, e.g., input keys, and a volatile random access memory (RAM) 108. The ROM 106 may be located within the microprocessor 104 or externally thereto. The microprocessor 104 receives input signals from a user by way of input device 105, as further described below. These signals upon receipt, 10 are stored in the RAM 108 or processed by the microprocessor 104 using other information and programs stored in the ROM 106.
For the purposes of the discussion to follow, the tone pairs which are used for standard tone based switching systems are d~ign~ted DTMF. Tone pairs which are utilized by the AUD
and WS which include DTMF tones as well as modifications to DTMF tones are de~;gn~ted 15 dtmf. The AUD 2 comprises a dtmf encoder 1 10 and dtmf decoders 1 12, one of which has an input coupled to a speaker 114 and an output coupled to the microprocessor 104, the other of which has an input coupled to a microphone 109 and an output coupled to the microprocessor 104. In the illustrated embodiment, the speaker 114 serves as both an input device for receiving acoustic signals, such as dtmf tones, and as an output device for outputting signals such as dtmf 20 tones and other signals generated by the encoder 110. Alternatively, the microphone 109 can be used for receiving audio signals with the speaker 114 being used only for outputting signals.

W O 97/31472 - PCTfiU597~02907 The AUD 2, in one embodiment, is acoustically coupled to a standard telephone 122 such as a public pay phone. When receiving signals from the handset 121, the speaker 114, which serves as a tr~n.cclucçr, is positioned in close p~ y to the handset's speaker 120 and while sending signals to the handset's microphone 118 the speaker 114 is positioned in close plOxi~ y s to the microphone 1 18. Thus, to change between the send and receive functions, in the illustrated embodiment, a user moves the AUD 2 from being in close pro~ll"ly to the microphone 118 to a position where it is in close plOx~ll~Ly to the speaker 120. ~ v~ly, the microphone 109 can be included for the receipt of data in addition to the speaker 114. In accordance with such an embodiment, data may be received and ~ n~ Led .eimlllt~neously by the AUD 2 without the requireme~t of moving the AUD 2.
The AUD 2 is designed to acoustically monitor its output and pel~llll an auto-calibration sequence at the be~innin~ of each period of use that follows a period of dorrnancy of a preselected time period or when the AUD 2 is used at certain predefined temperatures. For example, after a number of hours or days of inactivity, or alternatively when the AUD 2 senses a 1~ te~ wc; outside of a preselected temperature range, the auto-calibration sequence permits the AUD 2 to compensate its signal levels for the temperature at which it is expected to work.
Such compensation ensures smooth operation, as battery voltage output valies as a function of temperature, with variations in battery voltage output being particularly noticeable in cold weather. Other components of the AUD 2 such as the housing and the membrane of the speaker, may also be subject to the effects of temperature and may require calibration.
In more detail, the AUD 2 in one embodiment further includes a display device 202 for displaying data and other h~fu~ a~ion output by the microprocessor 104, a main battery 208 for powering the A~JD 2, a back-up battery 206 for supplying power to the microprocessor 104 as well as other system components and a voltage comparator 210 for detecting the condition of the 2s main and backup batteries 206,208.
The AUD 2 further includes a micro-power amplifier 226 coupled to the output of the speaker 114. The amplifier 226 serves to provide a wake-up signal to the microprocessor 104 as ~ described below. The amplifier 226 generates a signal in response to a signal generated by the speaker 114 in response to received acoustic signals. The signal output by the amplifier 226 causes the microprocessor 104 to become fully active from, a "sleep mode" that is autom~tir~lly W O 97/31472 PCT~US97/02907 entered into after a long period of inactivity in order to conserve power. In an ~ltern~tive embodiment, an input of the microprocessor 104 is coupled to a light sensor or other activation device such as a radio frequency sensor, which causes the microprocessor 104 to become fuIly active in response to an outside stim~ which may be provided by, e.g., a light or sound source s associated, for example, with a telephone device. Thus, in accordance with such an embodiment, the AUD 2 can be made active by the excitation of a tr~n~d~lcer or other sensor, by, e.g., a light, radio -frequency signal or the receipt of an acoustic signal having a pre-defined frequency and a minim-lm, pre-defined intensity level. These pre-defined levels or values are a matter of design choice and are pro~rammed into the ROM 106, preferably at the time of m~mlf~-~.ture. The wake-10 up signal ensures that the AUD is fully active when the user wants to gain access to a service.
The ROM 106 pl ~rel ~bly includes a series of volatile memory locations that containinformation that serves as a set of permanent data tables, as well as COl~ uLer program instructions for controlli~g the operation of the microprocessor 104. The RAM 108 has dedicated volatile memory space for storing dtmfkansfer and receive parameters 214 used for 15 encoding/decoding signals, il.ro,,.,aLion 216, such as, frequency information relating to tone pairs, display memory 218, device data 220, such as the numeric and alpha-numeric sequences described in Table I, which identify the particular AUD 2, m~mlf~ rin~ date information, user ide~lLiryi~lg data 222, and system control data 224, such as calibration parameters. The RAM 108, also has modifiable memory 107 that is used to store inl'orm~tion that is user or device dependent, 20 is likely to change, or for other reasons is more easily stored in an alterable memory device.
Stored in the modifiable memo~y 107 is data that inclll~les c~est;n~tion phone numbers and billing inform~tion relating to the individual who is authorized to use the AUD 2, lo~g distance carrier illrollllaLion, area code h~l~ Lion, data encoding/decoding illrc,ll.~aLion, and credit or service related information. The RAM 108 is also a write area for the ROM 106.
A more detailed description of an embodiment of the dtmf decoder device 1 12 illustrated in Fig. 2A will now be described with reference to the schematic block diagram of Figure 2B. As illustrated in Fig. 2B, the dtmf decoder device 112 comprises a combination amplifier and filter device 302 that has an input coupled to the output ofthe speaker 114 and its output coupled both to the input of a high band p~sb~ncl f Iter 3 04 and a low band passband filter 306. In this embodiment, the speaker 114 acts as a tr~n.c~ cer conver~ing acoustic signals received from the W~ 97131472 PCTAUS97/~2907 speaker 120 of the telephone handset 121, into electrical signals which are amplified and filtered by the device 302 and then further filtered by the passband filters 304, 306.
The high band passband filter 304, is designed to pass the corresponding high band frequency dtrnf signals while elimin~ting noise and other signals. Similarly, the low band filter 306 5 is designed to pass the low band frequency dtmf signals and to elimin~te other signals. In this m~nner, the low band and high band signals are segregated from each other with noise (signals having frequencies outside the bands of the dtmf signals) being removed to facilitate the later decoding of the signals.
As briefly discussed above, the acoustic signals rm~n~t;ng from the speaker are typically lo generated using a dual tone multifrequency ~dtmf~ encoding technique, which generates two tones such that one tone is selected from a high frequency band group and the other tone is selected from a low frequency band group. In standard telephone systems, the high frequency band group includes four frequencies, norninally 1209, 1336, 1477, and 1633 Hz while the low band frequency group ;ncllldes four low frequencies, norninally 697, 770, 852, and 951 Hz. Each of 15 the high and low frequencies is referred to as a filntl~mrnt~l frequency. These frequencies are norninal frequencies for error avoidance purposes.
Each one of the low frequencies corresponds to one of the four rows of keys on astandard P.~t~ntled telephone keypad while each one of the four high frequencies corresponds to one of the four columns of keys on standard extended telephone keypads. Accordingly, low 20 frequency tones represent row tones and high frequency tones represent column tones.
P~rtf~ntled keypads include the additional fourth column of keys not found on non-extended standard keypads such as those commonly used with public telephones and household telephones, although these additional tones are found in most modem hardware/soQw~ systems. Each di~t;r~ telephone key is represented by a signal inr.lll~1inE a unique colllbhla~ion of one tone from 25 the high band and one from the low band. Sixteen di~lell~ signal states may be represented by this encoding technique with one signal state corresponding to each one of the sixteen keys that can be found on a standard telephone keypad.
To be a valid signal, the received tone signal must contain exactly one valid tone from each of the low and high band frequency groups, and each of the low and high tones must be 30 present for a minimllm time duration, typically at least 35-40 milliseconds. The signal, cont:~ining W O97/31472 PCT~US97102907 a valid tone signal from each of the low and high frequency band groups, is referred to as a tone pair, which will be further described below. Additionally, the difference in amplitude between the low and the high tone, known as the "twist", must fall within a predet~rmined range. Typically the high band tone cannot be greater than 4 dBm more or 8 dBm less than the low band tone 5 signal power level, where dBm is a log~ .ic measure of power with respect to a reference power of 1 milliwatt. Additionally, the amplitude level of each tone signal in the tone pair must be in the range of 0 to -25 dBm. Consecutive tone-pairs, each repres~nting a ~li~e~ L digit to be tr~n~mitted are typically separated by a period of silence equal to a tone-offperiod required for standard DTMF decoding. Typically the period is within the range of 25 to 50 milliseconds.
0 Referring again to Figure 2B, an output ofthe high band filter 304 is coupled to the input of a column frequency detector 38 for detecting which frequency of the set of high band tone frequencies is being received. Similarly, the low band filter 306 has an output coupled to an input of a row frequency detector 310 for detecting which frequency of the set of low band frequencies is being received. In particular embodim~nt~, the column and row frequency detectors 30g, 310 as well as high and low band filters 304,306 may be designed to recognize and pass additional or substitute high band and low band tones, respectively, which are outside the range of standard DT~F tones to thus increase the number of signals that can be used to L~ l~iL data to add additional security, increase data tr~n~mi~ion rates, or provide additional features.
An output of the column frequency detector 308 and an output of the row frequency detector 310 are coupled to corresponding inputs of a dtmf signal detector 3 }2. The dtmf signal detector 312 receives the low band and high band tones output by the column and row frequency detectors 308,310 along with inforrnation signals in~ic~ting the frequency of the received tones.
The dtmf detector 312 det~ormines if the received tones constitute a valid tone pair or other signal which the dtmf signal detector 312 is programmed to recognize. If the dtmf signal detector 312 detects a valid tone pair or a signal it recognizes, it sends a signal to a tone to data converter 316 of the microprocessor 104 to convert the detected dtmf tone or signal into the data it represents, e.g., a symbol or number.
Because the AUD 2 is programmable, it can be reprogrammed to accept one or more signals as valid tones. In one embodiment, a signal characteristic (e.g. m~ximl~m tone-length) may be remotely modified by the acoustic repro~ "".,il-g ofthe AUD 2 in response to the AUD 2 WO 97/31472 PCT~US97~02907 receiving a series of predetermined dtmf tones. Such tones act as a signal or key which is required to enable the repro~ "~ g ofthe AUD 2. Alternatively, the AUD can include an IR
receiver (not shown) to accept IR radiation signals for repro~l~ " " ";,-g In addition, because the AUD 2 is designed to be both responsive to, and capable of, generating audio tones, e.g., both 5 standard and encoded DTMF tones, the AUD 2 is capable of receiving, storing and tr~n~m;t~ing both standard and encoded DTMF tones for a variety of purposes. Such purposes include the use of such tones as "keys" to enable certain fimctions of the AUD 2 or the device which the AUD 2 is used to comm-lnicate with. Alternativefy, these tones may include tones other than those used for standard DTMF signals. To prevent fraudulent tampering with the AUD, it can be o programmed to reject or ignore input data that does not col~l,ll to predet~rmined signal characteristics which are stored in the RAM 108 of the AUD 2. In another embodiment, it can be programmed to cease functioning in the event that the input data does not co~olm to such predeterrnined characteristics.
In one embodiment, the dtmf signal detector 312 of the present invention is able to 15 monitor alterable characteristics of a dtmf signal, such as the signal twist, which is the difference in the amplitude of the low band tone and the high band tone, as well as the low band and high band tone duration, and tone frequencies. By monitoring such alterable characteristics, information may be encoded into the dtmf signal without affecting the ability of a standard DTMF
signal detector, for example in a central switch, to detect the symbol/number represented by a 20 DTMF tone pair. If the dtmf signal detector 312 detects encoded i~ lalion, the encoded information is supplied to the dtmf tone to data collvel L~l 316 for processing. A particular signal or sequence of tones is used in some embodiments to provide an indicator signal to in~1ir.~te to a receiver that encoded dtmf signals are being ll n~ l . ,; l led In such embotlim~nt~ a dtmf signal detector detects the receipt of encoded dtmf signals by monitoring a received signal for such an 25 in~lir~tor signal or indicator sequence of tones.
The dtmf signal detector 312 also has start and stop signal outputs coupled to corresponding inputs of a non-tone demodulation circuit 314 of the microprocessor 104. In this manner, the non-tone demodulation circuit 314 receives timing information concernin~ the starting and stopping of each received signal. This information can be used, in accordance with 30 one embodiment of the present invention, for decoding illrollllaLion encoded into one or more W O g7/31472 PCTrUS97/02907 dtmf signals and/or for di~tin~ hin~ of a string of signals which r~l-est;lll me~ningfill data as opposed to nonsense signals added for security reasons as well as to enable the device to provide non-frequency dependent data that is encoded into the inter-digit periods, i.e., the time between dtmf tone pairs.
Referring to Fig. 2C, the microprocessor 104 and a dtmf encoder 110 illustrated above in Fig. 2A, will now be described in greater detail. The dtmf encoder 110 comprises a high frequency register 424, a tone select register 426, and a low frequency register 428. The high and low frequéncy registers 424, 428 have a first input coupled to a data output of the microprocessor 104, a second input coupled to a tone select output of the microprocessor 104 and a third input lo coupled to a tone select signal output of the tone select register 426. The tone select register 426 receives tone signal inro~ ion from a tone store output of the microprocessor 104 which is then processed to generate a control signal which is supplied to the low and high frequency registers 424, 428 through the third input of the registers 424, 428. The high and low frequency registers 424, 428 are responsive to signals received from the rnicroprocessor 104 and the tone select 15 register 426 to produce a control signal in~icc~ting the fraction of the microprocessor's clock frequency the desired high and low tones correspond to.
The high band tone of each dtmf tone signal pair is generated by a high band frequency signal generation circuit 401. The high band frequency signal generation circuit 401 comprises a programmable divider 430, whose output t~.rmin~l~ are coupled to a Johnson counter 434. The 20 output t~rmin~ of the Johnson counter 434 are coupled to digital to analog converter 438 which has an output coupled to an amplifier 458. The amplifier 458 is responsible for amplifying the high band dtmf tone signals of each tone pair.
The programmable divider 430 receives as input signals the output of the high frequency register 424 and the microprocessor's oscillator. Using the control i~o,l"~tion provided by the 2~ high frequency register 424, the programmable divider generates a pair of digital signals having the desired frequency of the high band tone to be generated from the oscillator signal. The digital signals are then further processed by the Johnson counter 434 before being converted into analog signals by the D/A converter 438. The analog high tone output signals, output of the D/A
Collvt~lLt:l 438, are amplified by the arnplifier 458 which has a gain control input coupled to a high 30 band amplitude control signal output of the microprocessor 1û4.

W O 97/31472 PCT~US97~29a7 As ~ cllssPd above with respect to the generation of high-band frequency signals, low-band frequency signals are generated in a similar manner. Low-band frequency signal generation > device 403 comprising a prog~ able divider 432, a Johnson counter 436, a ~D/A) digital to analog converter 440, and an amplifier 460 is responsive to the output of the low frequency register 428, the microprocessor's oscillator, and the microprocessor's low band amplitude control signal, to generate a pair of low band dtmf tones in the same manner as described above with regard to the generation of High band dtmf tones.
Referring to Fig. 3A, illustrated are a pair of tone groups 500, 502 ll~n~ led by the AUD over the telephone network. As shown, the first tone pair 501 comprises a low tone 504 0 and a high tone 506, amplified to diL~rell~ arnplification levels. For example, this tone pair 501 can be ~mplified to compensate for the tr~n.cmi.csiQn characteristics of an electret microphone.
Sirnilarly, ~ c~nt to the first tone pair 501 is a second tone pair 503 compri~in~ a low tone 508 and a high tone 510 amplified to cli~lt;nt amplification levels can compensate ~or the tr~n~mi~ion char~c.t~ri~tics of a carbon rnicrophone. Furthermore, there are channel conditions under which a tone pair normally targeted for a carbon microphone compensates for the tr~n~mis~ion char~ctPri~tics of an electret microphone, and vice versa. Together, the tone pairs forrn a tone group 500, as stated above. In this embodiment of the invention, the duration of the tone group 500 is roughly 90 ms separated by a period of 45 ms which is an inter-digit pause 512.
During the inter-digit pause 512 various other identifying data can be tr~n~mittefl By using high or low tones that are outside of the standard range for standard high or low tones used for DTMF signals, it is possible to encode data into a tone signal by asserting such high and low tones during the inter-digit period without affecting the ability of a standard DTMF detector to detect an in-range tone signal. ~ltçrn~tively, as described in further detail below, the tone signals tr~n~mitte~l during the inter-digit pause perform channel norm~li7~ion. After 45 ms, another tone group 502, comprising similarly amplified tone pairs 501, 503 is t~ ed followed by an inter-digit pause 512. During the inter-digit pause, the WS 12, as shown in Fig. 1, samples the ambient noise. The ambient noise can be noise generated in the environment around the telephone h~n~iset, or noise generated from on-line systems. The tone signals later received at the WS 12 can be corrected to çlimin~te such noise.

W O 97/31472 PCTrUS97/02907 Referring again to Fig. 2C, the degree of amplification performed by each of the amplifiers 458, 460 is controlled by the n1icroprocessor 104. In this manner, the microprocessor 104 can compensate for spectral tran.emi.e.eion inefficiencies as well as introduce intentional twist (i.e.
amplification level difference between the low tone and the high tone), into the dtmf signal being generated and/or encode h~ll~Lion into the dtmf signal by selectively varying signal strength with the tone pairs comprising the dtrnf signal being generated. More specifically, to compensate for spectral tr~n.emie~ n inefflciencies, the microprocessor retrieves ~mplific~tic)n levels stored in memory to compensate for the tr~nemi.c.ei--n characteristics of microphones typically used in a public teiephone system. Typically used are electret microphones and carbon microphones, each lo having specific tran.emie.eion deficiencies associated therewith. These microphones are commonly used in standard telephone handsets because of their low cost and high degree of reliability.
Carbon microphones typically require a substantially higher level low tone to compensate for their inefficiency at lower frequency. Thus, arnplification levels specific to such types of microphones are stored in memory 108 and retrieved by the rnicroprocessor to set the level of amplification of 15 the ~mpli~ier. The amplifier then ~mplifies each of the high frequency tone signals and low frequency tone signals for a tone pair group to predetermined amplitude levels, one amplitude level being specific to the tr~n.emie~ion characteristics of a carbon microphone and another ~mplitude level being specific to the tr~nemieei~ n charactprietics of an elecket microphone. Thus, each of the high frequency and low frequency tones are arnplified to correspond to the type of 20 rnicrophone being used.
The output of each of the amplifiers 458 and 460 comrri.ee at least two pairs of high band and low band tones, respectively. The tone pairs are then supplied to amplifier 452 for additional amplification. The amplifier 452 has a control input which is coupled to a timing control output of the microprocessor 104. As shown above, one of each of the low tone signals and one of each 2s of the high tone signals are joined to form a tone pair by timing the amplifier, 458, 460 to sequentially output the tones. After a first tone pair is created, a second tone pair is created immediately following the first tone pair. Each tone pair has a duration of 45 rns. The two tone pairs forrn a tone group Preferably, when a plurality of tone groups are tr~n.emitted over a telephone network, a period of 25- 55 milliseconds elapses between each tone group, preferably a 30 period of 45 mjlliseconds elapses. After the tone groups are tr~n.emitted over the telephone network, they are routed by the central switch to an intended destin~tion.

W O 97/31472 PCT~US97~02907 When a tone pair is amplified to compensate for the tr~n.~mi~ion characteristics of a carbon rnicrophone is transmitted through an electret m~crophone, it will be either viewed as out-of-band or in-band by the dtmf receiver. If viewed as out-of-band, the receiver ignores the tone pair. Alternatively if viewed as in-band, it will be treated as the beginnin~ or continuation of the s adjacent tone-set. The detection of a tone pair specific to the tr~n~mi~sion char~ct~ri.~tics of an electret microphone when tr~n~mitted through a carbon microphone will be treated by the dtmf recelver ln a slmllar manner.
The tirning control output generates an output signal that is used to control the amount or level of amplification the amplifier 452 provides. Furthermore, by asserting the timing control signal the rnicroprocessor 104 activates the amplifier 452 during periods of data tr~n~mi~iit n. On the other hand, when the speaker 114, which has an input coupled to the output of the arnplifier 452, is being used as a receiving device or when the microphone 109 is used, the microprocessor 104 de-asserts the timing control signal thereby deactivating the amplifier 452 and thus the output of the dtmf tone encoder 400. The timing control signal may also be used to inhibit signal output 15 during the inter-digit periods.
Notwittl~t~nding the tr~n.~mi~ion problems described above, another source of tr~n~mi.e~ion errors are related to unwanted h~rrn-)nics produced by microphones and, generally referred to as the "third tone" problem. This problem is associated with the detection of a third, otherwise valid tone, at the detector stage of a leceivel where a DTMF tone signal is being 20 decoded. Such errant third tones can cause errors in some tone detection receivers, and pa~ticularly those systems which do not utilize digital signal processing equipment for tone detection. As stated above, a DTMF tone signal is only considered valid if it inchldes a single pair of valid tones, e.g., one valid high band tone and one valid low band tone. Thus, when multiple valid high band or low band tones are received at the same time, the DTMF signal is 25 considered invalid and can not be properly decoded. Often this problem is present when DTMF
signals are generated using the numbers 3 and 6 on a standard telephone handset. In one embodiment of the invention, the access numbers dialed by the AUD 2 ~limin~te the use of 3 or 6.
In other embotlim~nt~ the relative amplitude of a received tone is compared to the other received tonçs and is used to distin~ h valid tones from erroneous invalid tones. This process however, 30 requires int~ .nt digital signal processing of signals which is not available on many local loops .

WO 97/31472 PCTAUS97/~2~07 The third tone problem is typically found when a carbon microphone is used as a transducer of DTMF tones. Carbon microphones often generate and transmit erroneous third tones, in addition to the tones actually received by the microphone. As DTMF tone signals are tr~n.~mitted through the carbon microphone, the carbon granules within the carbon microphone s vibrate in relation to the driving frequencies. As a result of the harmonic effect of the varying vibrations of the granules, various residual tones are generated, with the third tone being the most powerful of these residual tones. This third tone can be relatively powerful, e.g. as much as one half the power level of the higher of the two received acoustic DTMF tones passing through the rnicrophone. The frequency of this unwanted harmonic, will normally be the arithmetic difference 0 between the ~requencies of high band and Low band tones being received by the carbon microphone.
To compensate for third tone problems, in one embodiment, the dtmf tone encoder 110 in one embodiment, produces frequencies which still fall within the industry-acceptable tolerance of DTMF signals but the arithmetic difference falls outside of the pP~rmi~ihle DTMF range. In doing s so, the u~lw~led harmonic falls outside of the sensitivity range of the dtmf receiver. This is achieved by selecting the nominal center frequencies of the low and high frequency tones, towards the outer edge of the ~Caccept range" of standard DTMF detector devices. The microprocessor 104 can perform this function by being programmed to select and control the generation of DTMF tones of various tone pairs, so that the tones of a tone pair fall within the accept range of 20 conv~.ntion~l detectors, but create an arithmetic difference which is outside the tolerance range of such detectors.
Fig. 3B is a diag~ aLic lepl~s~ ;nn ofthe tone pairs and the inter-digit pauses, and the data extensions associated therewith. As stated above, DTMF tones comprise a high tone selected from a high frequency band group and a low tone selected from a low frequency band 25 group. For example, the digit one is transmitted by a combination of the fun~ment~l frequencies of 697 Hz and 1209 Hz. A central switch will recognize this as a " 1 " typically if the period of the tones are 4~ ms, and the ~mplit~lde is zero. After the 45 ms duration has passed however, data extensions may be incorporated into the tones to convey addition~l information that will be ignored by the central switch, but can be decoded for inforrn~tinn at a user verification system.

.

WO 97/3t472 PCT/US97~02907 This additional information can be identifying information for use in detç. .~ iug whether answers given to knowledge-based questions, as further described below, are correct.
The data extensions 505, 507 extend the duration of each of the tones 504, 506, 508, 510 and/or the change the amplitude of each of the tones to covey such additional information. As shownforeachofthelowtones504, andeachofthehightonesS06,threeamplitudelevelsLT1, LT2, LT3 are available in 10 milli~econd increments for a total of 40 ms. Therefore, a data extension collld extend from the high tone 504 at the third amplitude level for an additional 40 ms after the 45 ms period ofthe tone pair S01 has ended, to transmit ~d~iticn~l data. Likewise, at the sarne time, a data extension could extend from the low tone 506 at the first arnplitude level for 0 only 10 ms after the 45 ms period, to L~ SllliL additional data. As additionally shown, within the inter-digit period 512, information can also be tran~mitted using data extensions 513. As shown at the end of the inter-digit period S 12, a single tone 513 can be Ll A ~ ed which will be disregarded by the central of fice, because it is not a coll~ aLion of tones that would be recognized as clç~ign~ting a digit. Like the data P.~tP.n~inns described above, the duration of the S tone and/or the amplitude level of the tone can be modified to transmit additional data to the user verification system (not shown in this figure).
Referring to Fig. 4A, a block diagram of one embodiment of the configuration of a network having a central switch and a user~ th~ntication system of the present invention is illuskated As previously described, the AUD transmits tone signals from a telephone 2 or 4, a 20 computer 6, or a cellular phone 7 which routes the tone signals via a cellular switch 9, over the telephone neLwulk to a central switch 8. At the cellular switch 9 certain pr~limin~ry security measures can be imposed before the tone signals are routed to a WS 12, to prevent a call from reaching the WS if the user' s authenticity is ~ul,~t~Lially in question. As shown, the central switch 8 is part of a public switched network 11, and aids in routing the tone signals to a local 25 WS 12. The central switch 8, upon receipt of the tone signals, determines the destination of the call.
In more detail, the central switch 8 has electronic haldwale for processing the tone signals and routing them to the de~i~2;n~ted WS 12. The central switch 8 includes a non-tone demodulator 514 for monitoring alterable characteristics of the tone signals and decoding 30 information. The cenkal switch 8 further in~ des a processor 518 coupled with the tone demodulator 515, a dtmf tone to data converter device 520 and a database, that typically ;ncl~](les a device database 522 and a billing database 524. Upon receipt of a tone signal, it is demodulated by the tone demodulator 515 and digitally converted to data. The device database 522 contains for example, h~.ma~ion concerning locally ~- cçs~ihle WSs, long-distance accessible WSs, as well as information relating to the body number or device identification number of valid AUD
devices, and encoding schemes used by each AUD listed in its database. After demodulation and Collv~l~ion has occurred, the processor 518 at the central switch 8 c-~mmllnicates with the device t~h~.~e 522 which aids in determining where and how the signal should be routed. The central switch 8 routes the tone signals to an intended UVS 12, which is preferably accessible over the 0 local network, but may be accessible over a long-distance network if necessary.
Referring to Fig. 4B, illustrated is a diag~ maLic representation of the format of the tone signals 600 transmitted to the central switch by the AUD. As shown, the tone signals 600 include a system alert tone signal 602 l~r~iP.,Ii~g that the message requires user-verification and should be tr~n~mittecl to a WS. In one embodiment, the alert tone 602 is followed by identification tone 1S signals (not shown), ~pl ~s~ i. .g the identity of the AUD and the identity of the authorized user.
Inter-digit periods 603,605, 607 between the idP.ntification signals can be used to transmit _iscellaneous data in the forrn of tone signals as described previously. In this embodiment, the inter-digit periods 603, 605, 607 preferably transmit user-related data or data that aids the central switch in transferring the data to the WS. Following the inter-digit period 603 is a dtrnf string 20 604 that provides the destination number ofthe WS. The destin~tion data 610 preferably inr.l~ld~s the numerical system of the phnn~:me string, a tlçstin~tion number related to a WS 12, as well as a carrier desi~n~tion in~ ting which telephone carrier should transmit the tone signals to the int~nded WS 12. The dtmf string 604, can for exa_ple, take the form of a plurality of dtmf signals having inter-digit periods of variable duration, çn~hlin~ additional data such as 2~ memory allocation tables, to be L~ ",;l~ed therewith. ~ollowing the next inter-digit period 605, system adjustment tones 606 are transmitted to norm~li7e the ch~nnel, as will be further described below. The system adiustment tones can comprise tones of single, dual or multiple frequencies.
Following the next inter-digit period 607, the user's speech verification file 608 is k~n~mitted as a plurality of tone signals. This file 608 preferably includes voice-related data such as user-selected 30 passwords or passphrases, as previously spoken by the user. In an ~It~.rn~te embodiment, the user's speech verification file 608 is ~cces.~ihle via the network and thus not tr~n~mitted by the W O 97131472 PCT~US97~Z907 AUD 2. The WS 12 may contain the speech file in a memory module 816, as shown in Fig. 5, or a site on or ~f c~ihle by the network (not shown) can be devoted to storage of speech files. In this manner, the tone signals described above would be tr~n~m;tted by the AUD 2 without the user's speech vçri~c~tiC n file 608.
Referring again to Fig. 4A, upon receipt of these tone signals at the central switch 8, the tone demodulator 515 demodulates the tone signals and ~ them to the dtmf tone to data c~llvel ~el device 520, which transrnits them to the processor 518 . The processor 518 d~Lc;lll.ines whether the alert tone (602) is recognizable. In det~rmining whether the alert tone (602) is recognized by the processor 518, the processor 518 communicates with the database 522 to 0 determine if the route and intçnfled WS 12 are stored, and therefore known to the central switch 8. If the database 522 indicates that the route and the inten~led WS 12 are known, the central switch 8 routes the tone signals to the int~n~le~ WS 12. The tones used as alert tones set are preferably not among those commonly used in in-band si$n~ling Should the ~l~t~ba~e 522 not have data colles~ollding to the route and intended-user-15 verification data stored therein, the processor 518 does not recognize the alert tone (602). In such a scenario, the destin~tion data is ~ mined by the processor 518 so that the processor 518 can determine which WS 12 is int~n-le(l After the processor 518 det~rmines which WS 12 is intP!n~led, the central switch 8 routes the tone signals over the public switched network 11. The central switch 8 indicates to other switches on the public switched network 11, that the tone signals are to be routed to a certain WS 12. The tone signals are eventually tr~n~mitted to the intended WS 12 often through a series of switches located on the public switched network 11.
Referring to Fig. 5, shown is a highly srhpm~tic block diagram of one embodiment of the WS 12 ofthe present invention. As previously t~i.ccu.c~ced in Fig. 1, the AUD 2 transrnits tone signals to the central switch which routes the tone signals to the appl~p-iate WS 12. As shown 2s in this figure, the WS 12 includes a processor 802 in electrical co~ c~tit~n with a receiver 804 which receives the tone signals from the AUD 2 and decodes them, a Lli1n~in;ller 806 which transmits signals to the network 808, and a variable amplifier 818 which corrects received signals.
The processor 802 is also in electrical co,,,~ ic~tion with a correction device 808, an analyzer device 810, and a tirning device 814. A memory module 816, typically inçlu~1ing RAM and ROM, is in electrical communication with the processor 802 and stores data represented by the tone CA 02247l70 l998-08-2l W O 97/31472 PCT~US97/02907 signals received. The tone signals comprise data reprçs~ntin~ the user's speech file, as described below, along with data representing the user's identifying information and pin. In another embodiment of the invention, the processor 802 can include analyzing capabilities, correction capabilities and the ability to generate a timing signal.
s As shown in the table below, the WS 12 stores the speech file, personal identifying data, and pin. As shown, the AUD device number is stored, as well as the user type~ e.g. whether the current user is a primary or subordinate. The access number and the primary user's telephone number is recorded, as such information can be used to preliminarily screen the user. For example, if the user is calling from his home phone, the likelihood of fraudulent use of the AUD is o low, in contrast to when a user is calling from a pay phone geographically distanced from his home phone. The user's name and l~n~ c are also recorded. At least two user speech files are recorded, each speech file co~ a di~~ password or passphrase, in the event that the WS 12 chooses to rotate the passwords or passphrases that must be spoken by the user prior to thPntication. Also recorded is identification data, which includes the user's previousl,v recorded responses to identification questions. This data is useful, as further described in Fig. 7B, to authenticate a user when voice verification is problematic. Data relating to the subordinates are also stored, particularly, their name, any restrictive access requirements placed thereon by the primarv, at least two speech files, and knowledge data, as described above. Similarly, if voice-verific~ti-)n is problematic, the knowledge date can be used to ~llthP.ntie~e the subordinate.

FieldSample A/N/b Source Bytes Rec'd Application lA B AUD 3 Registration Device or 1234567890ABC B AUD 12 Registration Number User Type Primary N AUD 1 Registration Source12334567AA B AUD lO Registration Primary2127210332 N AUD 5 Registration User Home PrimaryJones A AUD 3 Registration Name Primary Lee A AUD 3 Registration Name Primary Ms A AUD 1 Registration Name .anguage 1 N AUD 1 Registration .I.ge ADULT A AUD 3 Registration peech File DATA AUD/ 100 Registration No. 1 WS
Speech File DATA AUD/ 100 Registration No. 2 UVS
Knowledge 3228 N AUD/ 2 Registration _ W O 97~31472 PCT~US97~29~7 Data Q1 UVS
Knowledge 212 N AUD/ 2 Registration Data Q2 WS
KnowledgeDecember N AUD/ 2 Registration Data Q3 UVS
Knowledge 10023 N AUDJ 2 Registration Data Q4 UVS
Knowledge 5 N AUD/ 1 Registration Data Q5 UVS
Knowledge 73 N AUD/ 2 Registration Data Q6 WS
KnowledgeNovember N UVS 1 Registration Data Q7 Knowledge January N AUD/ 1 Registration Data Q8 WS
Access 18004782642 N AUD/ 15 Manu~acture um~e WS
.. es~r ction A2 N AUD 3 Registration ubor~inateCarl A AUD 3 16 Name Restriction A2 B AUD 3 ADD
(Primary) Language 1 N AUD 1 ADD
(Primary) Age CHILD A AUD/
WS
Speech Filedata AUD/ 100 ADD
No. 1 WS
Speech FileDATA AUD/ 100 ADD
No. 2 WS
Knowledge 3228 N AUD/ 2 ADD
Data Q1 UVS
TABLE I I
Referring again to Fig. 5, the processor 802 in electrical co.. l."ir~tion with a receiver 804, receives decoded signals from the receiver 804 and det~nnin~s if voice-related data is 5 represented thereby, i.e. if the tones represent the speech file. As previously stated, the speech file incllldes a password or passphrase or a multiplicity of passwords or passphrases, previously spoken by the user and recorded in the AUD 2. Ul~l luua~ely, the tr~n~mitted tone signals are sometimes distorted in amplitude while traveling through the tr~n.~mi~.~ion çh~nn~l, when received by the receiver 804 at the WS 12.
lo To correct for such distortions, the AUD 2 communicates with the processor 802 on the system to compensate for the degree of amplitude distortion that takes place when tone signals are L~ ed to the WS 12. In one embodiment ofthe invention, the channel is norn ~I;7ed by the AUD 2 transmitting the speech file as a first plurality of standard tone signals to an intçn(led WS 12. The standard tone signals are a plurality of signals forming a spectral representation of 15 the frequencies typically embodying a user's voice. The WS 12, upon receipt of such signals W O 97/31472 PCT~US97/02907 compares the signals received with signals previously stored in memory module 816 that are representative of the user's voice to det~rmin~ if any frequency or arnplitude deviations have occurred during trS~n~mi~.~ion. Amplitude deviations are typically more common than fre~uency deviations, and are generally a function of the distance an analog signal is tr~n~mitted over copper s cable without amplification. In another embodiment, the AUD 2 transmits tones that enable the WS 12 to normalize the channel. In one embodiment, the tone signals preferably have a predetermine(l ~n~plit~l(le that is known to the WS 12. The WS 12, upon receipt of such tone signals simply compares the received signal to the expected signal to determine the degree of distortion. Similarly, in yet another embodiment of the invention, the AUD 2 transmits 0 norm~ ing tone signals during the inter-digit periods or pauses, previously described above.
In each of the above-described embo-iim~nt.~, in the event that amplitude deviations have occurred, the variable amplifier 818 in electrical co~ llunication with the processor generates arnplification gain factors that compensate for the deviations in the arnplitude of each of the plurality of tones ~ e~l The compensation gain factors are thus stored in the memory 1S module 816 for subsequent use to correct the tone signals representing a password or passphrase spoken into a rnicrophone by a user. The user-verification processor 802, upon receipt of the signals repres~ting a password or passphrase, amplifies the signals using the gain factors, and achieves an accurate representation ofthe user's voice prior to p~lrOlll~g user-verification.
Referring to Fig. 6A, 6B, and 6C, illustrated are graphs showing the process of correctin~
20 tone-signals l epl ~.s~ g voice-related data in accordance with the first embodiment of the invention for norm~li7ing the ch~nnel, described above. The graph of Fig. 6~ represents the tone signals transmitted from the AUD to the WS repl ~st;nla~iv~ of stored voice-related data. The frequency and amplitude of the signals in the graph of Fig. 6A are known to the WS. Note that the tone signals represent a portion of the fre~uency spectrum in which the user' s voice typically 25 appears. The graph of Fig. 6B represents the distortion a~ecting the tone signals in the graph of Fig. 6A, and shows the distortion of the tone signals upon receipt at the receiver located at the WS. Also shown in this graph are the level or amplification gain factors, Gl - G8, that are applied to the tone signals of graph of Fig. 6B by the WS to compensate for the distortions in the amplitude levels. In the graph of Fig. 6C, the amplification gain factors amplify the tone 30 signals in the of graph of Fig. 6B so that they reach the amplification levels of the tone signals W O 97131472 PCT~US97/02907 shown in the graph of Fig. 6A The amplification gain factors are stored in the memory module of the WS for later application in the correction device, thereby comp~n.~Ating for any signal distortions in a later-received live voice sample.
Notwithstanding the above process of correcting tone signals as described above, referring 5 to Fig. 2A, the AUD 2 may also re-test the generation of tones to insure that the tones have a correct tone signal level. If the desired output level was not achieved, the microprocessor repeats the calibration sequence. In one embodiment, when it is detected that a tone signal level fails to achieve the pre-determin~d level, e.g., desired signal level after one or more attempts to adJust the output level, the AUD 2 indicates a "don't use" condition on a display device 202.
o R~e~ to the flow chart of Fig. 7A, the process by which tones reach a WS is shown.
As shown in step S2, operation is typically initiAted when the caller activates the AUD to transrnit a signal into the telephone handset, via a modem associated with a computer, or via a pbx switch.
~It~rnAtively, the user may call a number associated with a service, and then activate the AUD.
Upon activation, in step S4, the AUD transmits an access number in the form of tone signals over the n~lw~lk to a central switch. The tone signals typically include an alert tone signal and a d~.stinAtion data signal using standard DTMF. The tones are received at the central switch, shown in step S6, and the tone demodulator demodulates the tone signals. In step S8, a processor associated with the central switch, det~rmines if the alert tone is recognizable. If the alert tone is recognizable by the processor, the tone signals are directly routed to the intended WS as shown in step S 11. If the alert tone is not recognizable at the processor, as shown in S 9, the central switch routes the tone signals to a public switching network switch in step S10. In this step, the switch recognizes the d~.stinAtion data and routes the tone signals to the WS over local and/or long distance carriers. The tone signals eventually reach the WS as shown in step S 1 1, where plt;li l..nary screening for frA~7dulP.nt users is ini~iAted in step S12. In this step, the WS 12 2s examines the access number used by the AIJD 2 to reach the WS 12 and det.o.nnin~s whether this access number has already been used within a predetermined time period set by the WS 12, typically one day.
As stated above, an algorithm is used in the AUD 2 to increment an original, or seed access number so that the AUD 2 dials a di~l~nl access number with each successive use. In the 30 event that a fraudulent user has tape recorded the tone signals comprising user's access number, W O 97/31472 PCT~US97/02907 which can occur for example, if the user used his AUD 2 with a cellular telephone, the fr~lld~ nt user will have picked up the AUD's last used access number. The comparison in step S 12 allows the WS 12 to detect this. In the event that the access number has been used within the predetermined time period, control goes to step S39 shown in Fig. 7B. If the ~io~ alison s indicates that the access number used by the AUD 2 has not been used within the predet~rmined time period, in this embodiment ofthe invention, control goes to step S~3. In this step, the user is prompted to in~iif.~te the service he/she desires to access. For example, the user rnay inclic~te via the digits on the telephone keypad or by voice, that he/she wishes to access a service, such as a bank, the internet, or database. The WS 12, depending on the service required, will adjust the lo degree of stringency required, as shown in step S 14. This is further described as the percentage match, in steps S33, and S35 shown in Fig. 7B. After pel~olll~ g an adjustment, control is routed to step S 15 in Fig. 7B.
Referring to the flow chart of Fig. 7B, the user-~uth~ntic~tion system verifies the validity of the user by p~ ng the following steps. In step S15, the AUD 2, in one embodiment ofthe 15 invention transmits standard tones that are reprcsL~ e ofthe portion of the frequency spectrum in which an authorized user's voice typically lies, to normalize the c h~nnel. As stated above, in other embodiments, the tone signals comprising the access number or the tone signals transmitted during the inter-digit periods between dtmf signals can be used to normalize the çh~nnlql In step S 16, the WS receives the tones and in step S 18, a processor at the WS generates arnplification 20 factors for each of the standard tones and stores them in the memory module. In step S20, the AUD lla~ s tone representing voice-related data, previously described in Fig. 4B as the speech verification file. In step S22, the processor at the WS retrieves the amplification factors stored in a memory module and the correction device corrects the ~mpTit~lde of the received tones. In step S24, the processor accesses the timing device which generates a timing signal which is stored 25 in the memory module. In step S26, the processor via the l~ L~r then lla~ s a request to the user, requesting the user to speak a password or passphrase into the telephone h~n~1set. As also shown in this step, the tr~n.cmitt~r Ll~lsll~LS the timing signal, however this tr~n.~mi.c~ion occurs after the request signal has been ll~uUed, so that receipt of the timing signal by the user ap~ ro~mately coincides with the time that the user will speak the password or passphrase. If 30 the user is ~cescing the WS through a telephone, the request signal is tr~n.cmittecl as an operator' s voice through the handset. If the user is accessing the UVS through his/her computer, WO 97~31472 PCT/US97/02907 the computer monitor will provide a visual request directing the user to state a password or passphrase into the microphone ~tt~ch~d to the computer. ~ItP.rn~tively, if the user has a multi-media computer system with audio capability, an audible request can also be generated as an operator's voice. As an added measure of security the re~uest signal can ask the user for non-s voice information, for example, the request can ask the user to enter his/her personal identificationnumber ("pin") by pushing the buttons on a touch-tone phone, or by ent~ring the numbers f rom a keyboard.
As shown in step S28, the user speaks a password or passphrase into the microphone causing signals related to the user's voice to be L~ ed to the WS. In addition to the tone 10 signals, the timing signal is tr~n~mitte~J back to the WS. In step S30, the correction device at the WS performs amplitude correction on the tone signals ~ esk~ g the live voice-related data.
As shown in step S32, the processor after receipt of the corrected tone signals the corrected tone si~,nals to the analyzer device where voice v~rific~ti- n takes place. To perform voice-verification, the processor comm-ln;c.~t~.s with the memory module, and directs the memory module to 15 transmit the stored voice-related data (~,~ia the processor) to the analyzer device which co~ )ales the voice-related data with tones related to the live voice sample lt;pres~.lL;-~ the user's password or passphrase, referred to as speaker-dependent recognition. The analyzer device then determines if the stated password or passphrase is the sarne as the password or passphrase stored in the memory module. The analyzer device also det~rmin~s if the voice frequencies leplesell~ g the 20 user-stated password or passphrase are the same as those stored in the memory module. The match is d~ ed based on a range of 0%-100%. Typically, if the likelihood that the tone signals match the stored voice-related data is above 80%, the user is considered authorized. Of course, other factors such as the degree of noise in the ch~nnel, often a problem when the user is calling from a cellular phone, can result in the stringency of the match being reduced to a lower 25 percentage, for example 60%. On the other hand, the security requirements imposed by the service can require the stringency of the match to be adjusted such that it is closer to 100%, for example, when a user is calling a bank to accomplish a wire ~ srer. Additionally, stringency requirements may be hPi~htened in the event that the user has been impersonated before by a fralldlllent. user. Still other factors may warrant red~lcing or increasing the percentage of the 30 match.
-WO 97/31472 ~ PCTrUS97/02907 Should the analyzer detPrminP in step S35 that the user's voice in an uncertainty range, which in one embodiment, is typically between 60% - 80%, the analyzer will ask the user knowledge based questions, referred to as speaker-dependent recognition, as further described in step S38. If the user correctly answers many ofthe knowledge based questions asked in step S38, s control goes to step 34. If the user answers many questions incorrectly, control goes to step 3 9, indicating that the user is not authorized. If in step 3~, the analyzer determines that the match percentage is below 60%, the user is considered lln~l~thorized, as set forth in step S39.
As indicated in step S34, to perform time-verification, the processor co~ tP.~ with the memory module, and directs the memory module to transmit the stored timing signal (via the o processor) to the analyzer device which compares the stored timing signal with the timing signal received with the user's password or passphrase, to detPrmine if the two signals match. Note that this match should be close to 100%. DetP, ~ ;ons from step S33 or S38, along with the det~rrnin~tion from step S34, are sent by the analyzer device to the processor, where in step S36, the processor detPrmines whether the analyzer device found both the tone signals related to the 15 live voice sample and the timing signal as m~t~hinp~ those stored in memory Upon making a determin~tion ~ffirm~tively, the processor indicates to that the user is ~lthc)ri7e(1~ as set forth in step S40. If one of the signals did not match that stored in memory, the processor indicates that the user is not autll- ri7ed, as set forth in step S39.
In the event that the user is not ~uthnri7:ecl due to the likelihood of a match falling in the 20 60%-80% range as shown in step S32, the WS provides further auth~ntic~tion measures, and the analyzer asks knowledge-based questions as shown in step S38. However, in an ?ltern~te embodiment, depending on the stringency of the match required by the service, the WS 12 may not in.~titute such questions for those users whose voice falls within that range, instead design~ting them ~ln~utllorized users. In yet another alternate embodiment, the analyzer will initiate 25 knowledge-based questioning notwith~tS~ntiing a near 100% voice match. Such an embodiment is typically used when the stringency requh~lllellls of the service require a higher level of scrutiny before granting user access.
In one embodiment, knowledge-based questions are stored a t the WS 12, and the WS
selects in step S38, a number of questions for the user to answer, the number being greater when 30 the user's voice is closer to the 60% mark. The questions will range from user's pin, home zip W0 97/31472 PCT~S97~02907 code, first four digits of phone number, last four digits of phone number, social security number, date of birth, mother's maiden name, children's names, children's dates of birth, etcetera.
Preferably, the knowledge-based questions are randomly selected or selected from a circular list, such that the same question is not repeated within a predetermined number of questions.
S However, if a user has offered an incorrect answer to a knowledge-based ~uestion, the WS 12 marks that question for subsequent repetition, following at least one intervening question, in an effort to catch a fr~ llent user. If the user fails to answer all of the guestions correctly, the user is denied access to the service as being an unauthorized user. Note that the user will typically not be asked his address to protect his privacy, however, the WS will be able to ask such a question 10 with perrnission from the user, such as when the user says the word "address".
Referring to Fig. 8, illustrated are the services accessible to a user through the user-tl~entication system of the present invention. Once the WS 12 determines that a user is authorized, the processor associated with the WS 12 provides a signal to the user telling the user that he/she is authorized to access a service available through the user-~llt~lentication system and cor,.. -icates with the central switch 8. The central switch 8 signals the desired service and connects the user to the desired service shown as a bank 904, the internet 906, and an electronic d~t~h~ee 908. In one embodiment, the WS 12 thereafter remains dormant, and the user commllnicates with the service 904, 906, 908 through a co~ lul~ication route est~bti~hed by the central switch 8 The rl~re oh.g description has been limited to a specific embodiment of this invention. It will be al,pal~llL however, that variations and modifications may be made to the invention, with the ~tt~inm~-nt of some or all of the advantages of the invention. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the present invention.

't~f~ f~ h~J

-

Claims (55)

Claims
1. A device for generating a series of tone pairs, each tone pair including simultaneously asserted first and second tones, said device comprising:
a first tone generator generating a plurality of first tones;
a second tone generator generating a plurality of second tones;
a first amplifier in electrical communication with said first tone generator, said first amplifier amplifying the first tones to a first predetermined signal level and a second predetermined signal level, respectively;
a second amplifier in electrical communication with said second tone generator, said second amplifier amplifying the second tones to a third predetermined signal level and a fourth predetermined signal level, respectively; and a control device in electrical communication with said first and second tone generators and in electrical communication with said first and second amplifiers, said control device controlling said first and second tone generators and said first and second amplifiers to generate a tone group comprising at least two tone pairs:
a first tone pair of the at least two tone pairs comprising the first tone amplified to the first predetermined signal level and the second tone amplified to the third predetermined signal level, the first tone pair compensating for a first predetermined transmission characteristic; and a second tone pair of the at least two tone pairs comprising the first tone amplified to the second predetermined signal level and the second tone amplified to the fourth predetermined signal level, the second tone pair compensating for a second predetermined transmission characteristic, wherein the first and second tone pairs each represent the same data item, the first predetermined signal level differs from the third predetermined signal level, and the second predetermined signal level differs from the fourth predetermined signal level.
2. The device of claim 1, wherein said control device controls said first and second tone generators and said first and second amplifiers to generate at least two tone groups.
3. The device of claim 2, wherein each of the at least two tone groups is separated from an immediately adjacent tone group by a period equal to a tone-off period required for standard DTMF
decoding.
4. The device of claim 3, wherein the period is approximately 25 to 50 milliseconds
5. The device of claim 1, wherein the first predetermined transmission characteristic is related to the transmission characteristics of a first microphone, and the second predetermined transmission characteristic is related to the transmission characteristics of a second microphone.
6. The device of claim 5, wherein the first microphone is a carbon microphone and the second microphone is an electrer microphone.
7. A method of generating a DTMF signal, comprising the steps of:
generating a plurality of first frequency tones;
amplifying a first one of the first frequency tones to a first signal level and a second one of the first frequency tones to a second signal level;
generating a plurality of second frequency tones;
amplifying a first one of the second frequency tones to a third signal level and a second one of the second frequency tones to a fourth signal level;
combining the first frequency tone having the first signal level with the secondfrequency tone having the third signal level to form a first tone pair for compensating for a first predetermined transmission characteristic, wherein the first signal level differs from the third signal level;
combining the first frequency tone having the second signal level with the second frequency tone having the fourth signal level to form a second tone pair for compensating for a second predetermined transmission characteristic, wherein the second signal level differs from the fourth signal level; and outputting a tone group comprising the first and second tone pairs, the first and second tone pairs representing the same data item.
8. The method of claim 7, further including the step of outputting a second tone group comprising third and fourth tone pairs comprising third and fourth frequency tones a predetermined period after the first tone group.
9. The method of claim 8, wherein the predetermined period is approximately equal to a tone-off period required for standard DTMF decoding.
10. The method of claim 7, further comprising the steps of:
relating the first and third signal levels to transmission characteristics of a carbon microphone; and relating the second and fourth signal levels to transmission characteristics of an electret microphone.
11. A user-verification system comprising:
a generating device generating predetermined signals;
a transmitter transmitting said predetermined signals to a user;
a receiver receiving, from said user, signals characteristic of said user; and an analyzer determining if said signal characteristics of said user includes at least one of said predetermined signals previously transmitted by said transmitter and if said predetermined signal is included, determining that the user is authorized in response to said predetermined signal previously transmitted by said transmitter.
12. The user-verification system of claim 11, wherein said predetermined signals relate to time.
13. The user-verification system of claim 11, further comprising a user-activated transmitter transmitting said signal characteristics of said user to said receiver, said user-activated transmitter comprises a memory module for storing characteristics of said user, and a processor for generating said signal characteristics of said user.
14. The user-verification system of claim 11, said characteristics of said user including voice information.
15. A method of performing user-verification comprising the steps of:
transmitting to a user from a user verification system a signal related to clock time transmitting from said user to said user verification system a signal characteristic of an authorized user;
determining whether the signal characteristic of an authorized user includes a signal related to clock time previously transmitted by said user verification system; and if said signal characteristic of an authorized user includes a signal related to clock time previously transmitted by said user verification system determining whether the user is authorized in response to said signal related to clock time previously transmitted said user verification system.
16. The method of performing user-verification according to claim 15 further comprising the steps of:
transmitting tones relating to a user's voice from a prerecorded database.
17. The method of performing user-verification according to claim 16, wherein said tones comprise a user-stated password or passphrase.
18. A telephone communication system comprising:
a user-activatable tone generator transmitting a plurality of tones over a telephone network, said telephone network comprising a central switch and a data processor, wherein said plurality of tones comprise an initial alert tone followed by data tones representing information-related data and destination-related data;
said central switch comprising:
a receiver receiving said plurality of tones;
a tone processor analyzing said plurality of tones; and a router routing said plurality of tones to said data processor in response to said alert tone.
19. The system according to claim 18, said central processor further comprising:
a first module routing said tones to said data processor indicated by said alert tone when said processor recognizes said alert tone; and a second module routing said tones to said data processor indicated by said tones representing destination-related data when said processor does not recognize said alert tone.
20. The system according to claim 18, the data processor further comprising: a decoder decoding said tones;
a processor electrically coupled to said decoder, processing said tones and prompting the user to speak;
a receiver electrically coupled to said processor, receiving tone signals representing the user's voice; and an analyzer electrically coupled to said processor for analyzing said tone signals.
21. A method of routing a signal in a telephone network comprising a central switch and a data processor, said method comprising the steps of:
transmitting a plurality of tones over said telephone network, said tones comprising an initial alert tone and data tones representing information-related data and destination-related data;
receiving said plurality of tones by said central switch;
analyzing said plurality of tones by said central switch; and routing said plurality of tones from said central switch to said data processor in response to said alert tone.
22. The method of claim 21, further comprising the steps of:
routing said plurality of tones to said data processor when said alert tone is recognizable, and routing said plurality of tones to another central switch when said alert tone is not recognizable.
23. A system for performing signal normalization over a channel comprising:
a controller generating a first plurality of tones and a second plurality of tones, said first plurality of tones representative of at least a portion of said frequency range of a user's voice;
a transmitter in electrical communication with said controller transmitting said first plurality of tone and said second plurality of tones over a telephone network to a processor;

said processor comprising:
a memory module storing predetermined tone signals therein;
a receiver receiving said first plurality of tones;
a comparing module coupled to said receiver and said memory module, comparing said first plurality of tones to said predetermined tone signals;
a compensating module coupled to said comparing module to compensate for signal deviations in said first plurality of tones; and a correcting module coupled to said compensating module correcting said second plurality of tones in response to said compensating module.
24. A method for performing signal normalization over a channel comprising:
generating a first plurality of tones representative of at least a portion of a frequency range of a user's voice;
transmitting said first plurality of tones over a telephone network to a controller;
comparing said first plurality of tones to predetermined tones stored in a memory module coupled to said controller;
generating compensating factors corresponding to said first plurality of tones to compensate for signal deviations in said first plurality of tones;
transmitting a second plurality of tones to said controller; and correcting signal deviations for each of said second plurality of tones using said compensating factors.
25. A method of using a user-authentication system to perform password sufficiency screening comprising:
prompting a user over a communications medium to state a passphrase;
receiving signals at a verification system representing a spoken passphrase stated by a user;
and determining if an audio characteristic of said spoken passphrase satisfies predetermined criteria;
validating said passphrase if said passphrase satisfies predetermined criteria.
26. The method of claim 25, further comprising the steps of:
determining if the spectral distribution and phonetic makeup of said spoken passphrase satisfies predetermined criteria.
27. The method of claim 25, further comprising the steps of:
determining if the cadence of said spoken passphrase satisfies predetermined criteria.
28. The method of claim 25, further comprising the steps of:
determining if the phonetic makeup of said spoken passphrase satisfies predetermined criteria;
determining if the spectral distribution of said spoken passphrase satisfies predetermined criteria;
determining if the cadence of said spoken passphrase satisfies predetermined criteria; and combining said determinations for phonetic makeup, spectral distribution, and cadence; and determining if said combination satisfies predetermined criteria.
29. A method for performing user-verification comprising:
transmitting from a user device a plurality of tone signals, said plurality of one signals representing a telephone number;
receiving said plurality of tone signals at a user-verification system;
comparing said plurality of tone signals with stored tone signals previously received, said stored tone signals representing telephone numbers previously used by said user-device;
determining if said plurality of tone signals match said stored tone signals; and authorizing a user in response to a match between said plurality of tone signals and said stored tone signals.
30. The method of claim 29, further comprising the step of:
performing voice verification to determine if the user is authorized when said plurality of tone signals do not match said stored tone signals.
31. The method of claim 30, the step of performing voice verification further comprising:
obtaining a user's electronic voice file, said voice file comprising a recorded passphrase;
prompting the user to speak a passphrase into a microphone;
receiving signals representing said passphrase at said user verification system;comparing said signals with said recorded passphrase to determine if said signals match said passphrase; and if said signals match said passphrase, indicating that the user is authorized.
32. A method for performing user verification comprising:
obtaining a user's electronic verification file in response to a signal received from a user device, said file comprising at least one recorded passphrase and data identifying the user;
prompting the user to speak a passphrase into a microphone;
receiving signals representing said passphrase at said user verification system;comparing said signals with said recorded passphrase to determine if said signals match said passphrase; and determining a degree of match between said recorded passphrase and said signals.
33. The method of claim 32, further comprising the steps of:
indicating that the user is authorized if said degree of match is greater than a predetermined degree.
34. The method of claim 32, further comprising the steps of:
prompting the user to answer questions relating to said data identifying the user if said degree is below a first predetermined degree and above a second predetermined degree.
35. The method of claim 32, further comprising the steps of:
indicating that a user is not authorized if said degree of match is less than a predetermined degree.
36. A method of performing user verification comprising:

receiving signals by a user verification system, said signals generated by a user device relating to a service to be accessed;
adjusting a stringency requirement for user-verification in response to said signals relating to said service.
37. The method of claim 36, further comprising determining at least one or more parameters associated with said signals, wherein said parameters comprise: a level of security previously assigned to said service, and a level of noise simultaneously received with said signals.
38. The method of claim 36, wherein said signals relate to a service provider member.
39. The method of claim 36, further comprising the steps of:
prompting a user to speak a passphrase into a microphone for transmission to said user-verification system; and comparing said spoken passphrase with a previously stored passphrase to determine if said spoken passphrase meets said stringency requirement.
40. The method of claim 39, further comprising the steps of:
prompting the user to answer identification questions if said spoken password or passphrase does not meet said stringency requirement.
41. A method of performing user verification comprising;
transmitting tone signals from a user device in communication with a user verification system;
receiving tone signals at said user verification system, said tone signals representing a number transmitted to reach said user verification system;
determining a security level associated with said number;
determining a degree of noise with said tone signals; and adjusting a stringency requirement for user verification in response to said security level or said degree of noise.
42. The system according to claim 23, wherein said second plurality of tones represent user-stated information.
43. The system according to claim 42, and processor further comprising:
a transmitter prompting a user to speak a passphrase into a microphone;
wherein said receiver receives said passphrase spoken by the user and said correcting module corrects signal deviations in said spoken passphrase, said signal deviations including amplitude deviations.
44. The system according to claim 43, said processor further comprising a second comparing module comparing tones representing said corrected spoken passphrase with said corrected second plurality of tones to determine if the user is authorized.
45. The method according to claim 24, wherein said second plurality of tones represent user-stated information.
46. The method according to claim 45, further comprising:
prompting a user to speak a passphrase into a microphone in communication with said controller;
receiving said spoken passphrase;
correcting deviations in said spoken passphrase using said compensation factors, wherein said compensation factors comprise amplification factors.
47. The method according to claim 46, further comprising:
comparing tones representing said corrected spoken passphrase with said corrected second plurality of tones to determine if the user is authorized.
48. The method of claim 32, wherein said signal represents said user's electronic verification file.
49. The method of claim 32, wherein said signal is a pointer for locating said user's electronic verification file on a telephone network.
50. A user-verification system comprising:
a storage module storing identifying data relating to a user;
a processor communicating a query signal to a transmitter;
said transmitter transmitting said query signal to the user, said query signal prompting the user to answer a question relating to said identifying data;
a receiver receiving user-stated information responsive to said query signal; and an analyzer comparing said user-stated information with said identifying data; and a repeater assigning certain of said identifying data for a repetition in a successive query signal when said user-stated information does not match said identifying data.
51. The user verification system of claim 50, wherein said identifying data comprises data relating to name, sex, date of birth, social security number, and mother's maiden name.
52. A method for compensating for transmission characteristics over a telecommunications network, comprising:
transmitting a tone group comprising at least two tone pairs, each of the at least two tone pairs representing the same data item, wherein the step of transmitting the tone group further comprises the steps of:
transmitting for at least a first predetermined minimum duration at first tone pair comprising a low frequency tone having a first predetermined amplification level and a high frequency tone having a second predetermined amplification level, the first tone pair compensating for a first predetermined transmission characteristic; and transmitting, before the end of a period equal to a tone-off period required for standard DTMF decoding, for at least a second predetermined minimum duration a second tone pair comprising a low frequency tone having a third predetermined amplification level and a high frequency tone having a fourth predetermined amplification level, the second tone pair compensating for a second predetermined transmission characteristic;
wherein the first predetermined amplification level and the second predeterminedamplification level differ, and the third predetermined amplification level and the fourth predetermined amplification level differ.
53. A method for compensating for transmission characteristics over a telecommunications network, comprising:
transmitting a tone group comprising at least two tone pairs, each of the at least two tone pairs representing the same data item, wherein the step of transmitting the tone group further comprises the steps of:
transmitting for at least a first predetermined minimum duration a first tone pair comprising a low frequency tone having a first amplification level and a high frequency tone having a second amplification level, the amplitude difference between the first amplication level and the second amplication level being adjustable to compensate for a first predetermined transmission characteristic; and transmitting, before the end of a period equal to a tone-off period required for standard DTMF decoding, for at least a second predetermined minimum duration a second tone pair comprising a low frequency tone having a third amplification level and a high frequency tone having a fourth amplification level, the amplitude difference between the third amplification level and the fourth amplification level being adjustable to compensate for a second predetermined transmission characteristic.
54. A method of performing user verification comprising:
receiving signals by a user verification system, said signals generated by a user device relating to a call destination;
determining a degree of noise received with said signals;
adjusting a stringency requirement for user-verification in response to said determination of noise.
55. The method of claim 54, further comprising:
determining a security level associated with said call destination;
adjusting a stringency requirement for user-verification in response to said security level.
CA002247170A 1996-02-23 1997-02-21 Method and system for the secure communication of data Abandoned CA2247170A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/606,151 1996-02-23
US08/606,151 US5907597A (en) 1994-08-05 1996-02-23 Method and system for the secure communication of data

Publications (1)

Publication Number Publication Date
CA2247170A1 true CA2247170A1 (en) 1997-08-28

Family

ID=24426777

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002247170A Abandoned CA2247170A1 (en) 1996-02-23 1997-02-21 Method and system for the secure communication of data

Country Status (6)

Country Link
US (3) US5907597A (en)
EP (1) EP0882350A2 (en)
JP (1) JP2000505617A (en)
AU (1) AU2055997A (en)
CA (1) CA2247170A1 (en)
WO (1) WO1997031472A2 (en)

Families Citing this family (155)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6292782B1 (en) * 1996-09-09 2001-09-18 Philips Electronics North America Corp. Speech recognition and verification system enabling authorized data transmission over networked computer systems
FR2753857B1 (en) * 1996-09-25 1998-12-11 METHOD AND SYSTEM FOR SECURING THE DELIVERY OF SERVICES BROADCASTED ON AN INTERNET-TYPE COMPUTER NETWORK
ATE227868T1 (en) * 1996-10-15 2002-11-15 Swisscom Ag METHOD FOR VERIFYING A SPEAKER
SE9604601L (en) * 1996-12-16 1998-06-17 Ericsson Telefon Ab L M Device, system and method of access to and control of telecommunications
US6542583B1 (en) * 1997-03-06 2003-04-01 Avaya Technology Corp. Caller identification verification system
DE19722424C5 (en) * 1997-05-28 2006-09-14 Telefonaktiebolaget Lm Ericsson (Publ) Method of securing access to a remote system
US6405036B1 (en) * 1997-09-29 2002-06-11 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement in a telecommunication system
US6385202B1 (en) * 1997-10-01 2002-05-07 At&T Corp. Method and system for allowing access to traditional voice mail and interactive voice response systems over internet-like networks
US20050114705A1 (en) * 1997-12-11 2005-05-26 Eran Reshef Method and system for discriminating a human action from a computerized action
US6754820B1 (en) 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
US6845453B2 (en) * 1998-02-13 2005-01-18 Tecsec, Inc. Multiple factor-based user identification and authentication
AU2790399A (en) * 1998-02-25 1999-09-15 E-Lysium Transaction Systems Inc. Electronic commerce methods and apparatus
US6480958B1 (en) * 1998-06-01 2002-11-12 Xerox Corporation Single-use passwords for smart paper interfaces
US6236967B1 (en) * 1998-06-19 2001-05-22 At&T Corp. Tone and speech recognition in communications systems
JP3768685B2 (en) * 1998-07-01 2006-04-19 株式会社日立製作所 Brake fluid pressure control device
US6046977A (en) * 1998-09-23 2000-04-04 Advanced Microdevices, Inc. Method and apparatus for detecting signal misalignment
US20020040377A1 (en) * 1998-09-25 2002-04-04 Newman Edward G. Computer with audio interrupt system
US6339766B1 (en) * 1998-12-02 2002-01-15 Transactionsecure Electronic payment system employing limited-use account number
US6400709B1 (en) * 1998-12-02 2002-06-04 Intel Corporation DTMF detection in internet telephony
US6175923B1 (en) 1998-12-08 2001-01-16 Senetas Corporation Limited Secure system using images of only part of a body as the key where the part has continuously-changing features
AU1681699A (en) * 1998-12-31 2000-07-24 Perfecto Technologies Ltd. Method and system for discriminating a human action from a computerized action
US6584613B1 (en) * 1999-03-19 2003-06-24 International Business Machines, Corporation Simplified TV viewer response system and method using special codes and subscriber custom calling codes
US7423983B1 (en) * 1999-09-20 2008-09-09 Broadcom Corporation Voice and data exchange over a packet based network
US6393305B1 (en) * 1999-06-07 2002-05-21 Nokia Mobile Phones Limited Secure wireless communication user identification by voice recognition
US6477390B1 (en) * 1999-09-28 2002-11-05 Qualcomm, Incorporated Apparatus and method for intuitive audio keypad navigation for a wireless communication device
US6618839B1 (en) * 1999-11-30 2003-09-09 Synplicity, Inc. Method and system for providing an electronic system design with enhanced debugging capabilities
US7920697B2 (en) * 1999-12-09 2011-04-05 Broadcom Corp. Interaction between echo canceller and packet voice processing
EP1120752A1 (en) * 2000-01-24 2001-08-01 Franke & Co. Verwaltungs KG System for controlling the entry or access authorisations
WO2001077991A2 (en) * 2000-04-12 2001-10-18 Configate Inc. Voice-based authentication over a noisy channel
US6502070B1 (en) * 2000-04-28 2002-12-31 Nortel Networks Limited Method and apparatus for normalizing channel specific speech feature elements
US7721109B1 (en) * 2000-07-28 2010-05-18 Verizon Business Global Llc Secure transaction card using biometrical validation
US20070254636A1 (en) * 2000-08-17 2007-11-01 Roamware, Inc. Method and system using an out-of-band approach for providing value added services without using prefix
FR2814025B1 (en) * 2000-09-08 2004-08-06 France Telecom INDIVIDUALIZED COMMUNICATION MANAGEMENT FOR COLLECTIVE USE OF A TELEPHONE TERMINAL
FR2814022B1 (en) * 2000-09-14 2005-05-13 France Telecom METHOD AND SYSTEM FOR AUTOMATED RESPONSE TO TELEPHONE CALL
US6774908B2 (en) 2000-10-03 2004-08-10 Creative Frontier Inc. System and method for tracking an object in a video and linking information thereto
US6801622B1 (en) * 2000-10-31 2004-10-05 Cisco Technology, Inc. Devices, software and methods for passing DTMF signals under voice compression
US20020059532A1 (en) * 2000-11-16 2002-05-16 Teruaki Ata Device and method for authentication
US20070106903A1 (en) * 2001-01-30 2007-05-10 Scheidt Edward M Multiple Factor-Based User Identification and Authentication
US20020112241A1 (en) * 2001-02-14 2002-08-15 Cocchi Ronald P. Internet service provider callback for satellite systems
KR20020088023A (en) * 2001-05-16 2002-11-25 주식회사 크레디트라인 Certification system utilizing questions and answers of indivisual information and method thereof
JP2003018622A (en) * 2001-07-03 2003-01-17 Fujitsu Ltd Push button signal receiver and gain control method
JP3795409B2 (en) * 2001-09-14 2006-07-12 富士通株式会社 Speech recognition apparatus and method
US20030084352A1 (en) * 2001-10-30 2003-05-01 Schwartz Jeffrey D. Appliance security model system and method
US20030105959A1 (en) * 2001-12-03 2003-06-05 Matyas Stephen M. System and method for providing answers in a personal entropy system
US8914411B1 (en) * 2002-01-10 2014-12-16 Verizon Patent And Licensing Inc. Method, system and computer program product for controlling data access through question and answer mechanism
IL151573A (en) * 2002-09-02 2008-11-26 Douglas York Malawsky Device for transfer of data from external carrier to handheld electronic device
US20060116167A1 (en) * 2002-09-02 2006-06-01 Roni Raviv Selectable functionality communication system and methodologies
ZA200306032B (en) * 2002-11-06 2005-03-11 Telkom Sa Ltd A telephone fraud prevention system.
US7222072B2 (en) 2003-02-13 2007-05-22 Sbc Properties, L.P. Bio-phonetic multi-phrase speaker identity verification
US8472792B2 (en) 2003-12-08 2013-06-25 Divx, Llc Multimedia distribution system
US20060200744A1 (en) * 2003-12-08 2006-09-07 Adrian Bourke Distributing and displaying still photos in a multimedia distribution system
US7519274B2 (en) * 2003-12-08 2009-04-14 Divx, Inc. File format for multiple track digital data
US20090224889A1 (en) * 2003-12-12 2009-09-10 Abhinav Aggarwal System and method for universal identity verification of biological humans
WO2005076589A1 (en) 2004-01-30 2005-08-18 Koninklijke Kpn N.V. Method and system for dynamic tariffing and billing
US20050273626A1 (en) * 2004-06-02 2005-12-08 Steven Pearson System and method for portable authentication
JP2006011550A (en) * 2004-06-22 2006-01-12 Sony Corp Information transmission system by cooperative filtering, information processing apparatus to be used for the same, and program to be used in information processing
US7813917B2 (en) * 2004-06-22 2010-10-12 Gary Stephen Shuster Candidate matching using algorithmic analysis of candidate-authored narrative information
US8014496B2 (en) 2004-07-28 2011-09-06 Verizon Business Global Llc Systems and methods for providing network-based voice authentication
KR100678169B1 (en) * 2004-10-28 2007-02-02 삼성전자주식회사 System and method for transmitting data between two terminal equipments distant from each other
US8171303B2 (en) * 2004-11-03 2012-05-01 Astav, Inc. Authenticating a login
US20060159246A1 (en) * 2005-01-14 2006-07-20 Avaya Technology Corp. Private branch exchange with remote access to features
US7995722B2 (en) * 2005-02-04 2011-08-09 Sap Ag Data transmission over an in-use transmission medium
US8792634B2 (en) * 2005-02-16 2014-07-29 Arris Enterprises, Inc. Method and system for adjusting line interface level to compensate for induced loss
US20060293898A1 (en) * 2005-06-22 2006-12-28 Microsoft Corporation Speech recognition system for secure information
WO2007019307A2 (en) 2005-08-03 2007-02-15 Somatic Technologies, Inc. Somatic, auditory and cochlear communication system and method
US8677377B2 (en) 2005-09-08 2014-03-18 Apple Inc. Method and apparatus for building an intelligent automated assistant
US7515710B2 (en) 2006-03-14 2009-04-07 Divx, Inc. Federated digital rights management scheme including trusted systems
EP1848241A3 (en) * 2006-04-17 2008-05-21 Roamware, Inc. Method and system using In-Band Approach for providing value added services without using prefix
US8521510B2 (en) 2006-08-31 2013-08-27 At&T Intellectual Property Ii, L.P. Method and system for providing an automated web transcription service
US9318108B2 (en) 2010-01-18 2016-04-19 Apple Inc. Intelligent automated assistant
US20100106647A1 (en) * 2007-02-28 2010-04-29 Raja Raman Method and system for close range communication using audio tones
US8385363B2 (en) * 2007-05-15 2013-02-26 Centurylink Intellectual Property Llc System and method for adapting analog systems to communicate with packet networks
US20090043654A1 (en) * 2007-05-30 2009-02-12 Bates Daniel L Method And System For Enabling Advertising And Transaction Within User Generated Video Content
US20090089876A1 (en) * 2007-09-28 2009-04-02 Jamie Lynn Finamore Apparatus system and method for validating users based on fuzzy logic
WO2009065137A1 (en) 2007-11-16 2009-05-22 Divx, Inc. Hierarchical and reduced index structures for multimedia files
US8687650B2 (en) 2007-12-07 2014-04-01 Nsgdatacom, Inc. System, method, and computer program product for connecting or coupling analog audio tone based communications systems over a packet data network
US8996376B2 (en) 2008-04-05 2015-03-31 Apple Inc. Intelligent text-to-speech conversion
US8504365B2 (en) * 2008-04-11 2013-08-06 At&T Intellectual Property I, L.P. System and method for detecting synthetic speaker verification
US8489399B2 (en) * 2008-06-23 2013-07-16 John Nicholas and Kristin Gross Trust System and method for verifying origin of input through spoken language analysis
US9266023B2 (en) * 2008-06-27 2016-02-23 John Nicholas and Kristin Gross Pictorial game system and method
CN105072454B (en) 2009-01-07 2019-04-19 索尼克Ip股份有限公司 For the specialization of the media guidance of online content, centralization, automation creation
US10241752B2 (en) 2011-09-30 2019-03-26 Apple Inc. Interface for a virtual digital assistant
US10241644B2 (en) 2011-06-03 2019-03-26 Apple Inc. Actionable reminder entries
US9431006B2 (en) 2009-07-02 2016-08-30 Apple Inc. Methods and apparatuses for automatic speech recognition
EP2507995A4 (en) 2009-12-04 2014-07-09 Sonic Ip Inc Elementary bitstream cryptographic material transport systems and methods
WO2011106716A1 (en) 2010-02-25 2011-09-01 Secureauth Corporation Security device provisioning
US8682667B2 (en) 2010-02-25 2014-03-25 Apple Inc. User profiling for selecting user specific voice input processing information
US8914534B2 (en) 2011-01-05 2014-12-16 Sonic Ip, Inc. Systems and methods for adaptive bitrate streaming of media stored in matroska container files using hypertext transfer protocol
DE102011007002B4 (en) * 2011-04-07 2014-04-03 Contnet AG Verification of the validity of a record transmitted using acoustic coding between two devices
US8818171B2 (en) 2011-08-30 2014-08-26 Kourosh Soroushian Systems and methods for encoding alternative streams of video for playback on playback devices having predetermined display aspect ratios and network connection maximum data rates
CN108989847B (en) 2011-08-30 2021-03-09 帝威视有限公司 System and method for encoding and streaming video
US9467708B2 (en) 2011-08-30 2016-10-11 Sonic Ip, Inc. Selection of resolutions for seamless resolution switching of multimedia content
US8909922B2 (en) 2011-09-01 2014-12-09 Sonic Ip, Inc. Systems and methods for playing back alternative streams of protected content protected using common cryptographic information
US8964977B2 (en) 2011-09-01 2015-02-24 Sonic Ip, Inc. Systems and methods for saving encoded media streamed using adaptive bitrate streaming
US20130079058A1 (en) * 2011-09-23 2013-03-28 Alex Bell Device effective to modulate a code and to provide content to a user
US8401569B1 (en) * 2011-09-23 2013-03-19 Sonic Notify, Inc. System effective to demodulate a modulated code and provide content to a user
US8532644B2 (en) * 2011-09-23 2013-09-10 Alex Bell System effective to modulate a code and provide content to a user
US9721563B2 (en) 2012-06-08 2017-08-01 Apple Inc. Name recognition system
WO2013186755A2 (en) * 2012-06-14 2013-12-19 David Cohen Methods circuits systems software applications and associated computer executable code for checking an implied or declared age and or gender of a party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device
US10452715B2 (en) 2012-06-30 2019-10-22 Divx, Llc Systems and methods for compressing geotagged video
US9547647B2 (en) 2012-09-19 2017-01-17 Apple Inc. Voice-based media searching
US10255558B1 (en) * 2012-09-27 2019-04-09 EMC IP Holding Company LLC Managing knowledge-based authentication systems
WO2014100236A1 (en) * 2012-12-19 2014-06-26 Visa International Service Association System and method for voice authentication
US9313510B2 (en) 2012-12-31 2016-04-12 Sonic Ip, Inc. Use of objective quality measures of streamed content to reduce streaming bandwidth
US9191457B2 (en) 2012-12-31 2015-11-17 Sonic Ip, Inc. Systems, methods, and media for controlling delivery of content
US9167396B2 (en) * 2013-01-15 2015-10-20 Marvell World Trade Ltd. Method and apparatus to transmit data through tones
KR102516577B1 (en) 2013-02-07 2023-04-03 애플 인크. Voice trigger for a digital assistant
US9906785B2 (en) 2013-03-15 2018-02-27 Sonic Ip, Inc. Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata
US10397292B2 (en) 2013-03-15 2019-08-27 Divx, Llc Systems, methods, and media for delivery of content
DE102013006351A1 (en) * 2013-04-12 2014-10-30 Unify Gmbh & Co. Kg Method and device for managing a call to a call center
US9094737B2 (en) 2013-05-30 2015-07-28 Sonic Ip, Inc. Network video streaming with trick play based on separate trick play files
WO2014197334A2 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for user-specified pronunciation of words for speech synthesis and recognition
US9967305B2 (en) 2013-06-28 2018-05-08 Divx, Llc Systems, methods, and media for streaming media content
US9813905B2 (en) 2013-10-14 2017-11-07 U.S. Bank, National Association DTMF token for automated out-of-band authentication
US9866878B2 (en) 2014-04-05 2018-01-09 Sonic Ip, Inc. Systems and methods for encoding and playing back video at different frame rates using enhancement layers
US9430463B2 (en) 2014-05-30 2016-08-30 Apple Inc. Exemplar-based natural language processing
US9338493B2 (en) 2014-06-30 2016-05-10 Apple Inc. Intelligent automated assistant for TV user interactions
US9369462B2 (en) * 2014-08-05 2016-06-14 Dell Products L.P. Secure data entry via audio tones
US9668121B2 (en) 2014-09-30 2017-05-30 Apple Inc. Social reminders
US10484513B2 (en) 2015-07-17 2019-11-19 Nsgdatacom, Inc. System, method, and computer program product for connecting or coupling audio communications systems over a software defined wide area network
US10158732B2 (en) * 2015-07-27 2018-12-18 International Business Machines Corporation Delegated updates
US10747498B2 (en) 2015-09-08 2020-08-18 Apple Inc. Zero latency digital assistant
US10671428B2 (en) 2015-09-08 2020-06-02 Apple Inc. Distributed personal assistant
US10366158B2 (en) 2015-09-29 2019-07-30 Apple Inc. Efficient word encoding for recurrent neural network language models
US11010550B2 (en) 2015-09-29 2021-05-18 Apple Inc. Unified language modeling framework for word prediction, auto-completion and auto-correction
US10691473B2 (en) 2015-11-06 2020-06-23 Apple Inc. Intelligent automated assistant in a messaging environment
US10049668B2 (en) 2015-12-02 2018-08-14 Apple Inc. Applying neural network language models to weighted finite state transducers for automatic speech recognition
US10090880B2 (en) * 2015-12-18 2018-10-02 Qualcomm Incorporated Narrow band PRACH with multiple tone hopping distances
US10223066B2 (en) 2015-12-23 2019-03-05 Apple Inc. Proactive assistance based on dialog communication between devices
CN111954174B (en) 2015-12-31 2022-07-29 华为技术有限公司 Method for prompting calling
US10446143B2 (en) 2016-03-14 2019-10-15 Apple Inc. Identification of voice inputs providing credentials
US9934775B2 (en) 2016-05-26 2018-04-03 Apple Inc. Unit-selection text-to-speech synthesis based on predicted concatenation parameters
US9972304B2 (en) 2016-06-03 2018-05-15 Apple Inc. Privacy preserving distributed evaluation framework for embedded personalized systems
US10249300B2 (en) 2016-06-06 2019-04-02 Apple Inc. Intelligent list reading
US10049663B2 (en) 2016-06-08 2018-08-14 Apple, Inc. Intelligent automated assistant for media exploration
DK179309B1 (en) 2016-06-09 2018-04-23 Apple Inc Intelligent automated assistant in a home environment
US10586535B2 (en) 2016-06-10 2020-03-10 Apple Inc. Intelligent digital assistant in a multi-tasking environment
US10509862B2 (en) 2016-06-10 2019-12-17 Apple Inc. Dynamic phrase expansion of language input
US10067938B2 (en) 2016-06-10 2018-09-04 Apple Inc. Multilingual word prediction
US10192552B2 (en) 2016-06-10 2019-01-29 Apple Inc. Digital assistant providing whispered speech
US10490187B2 (en) 2016-06-10 2019-11-26 Apple Inc. Digital assistant providing automated status report
DK179049B1 (en) 2016-06-11 2017-09-18 Apple Inc Data driven natural language event detection and classification
DK179343B1 (en) 2016-06-11 2018-05-14 Apple Inc Intelligent task discovery
DK179415B1 (en) 2016-06-11 2018-06-14 Apple Inc Intelligent device arbitration and control
DK201670540A1 (en) 2016-06-11 2018-01-08 Apple Inc Application integration with a digital assistant
US10148989B2 (en) 2016-06-15 2018-12-04 Divx, Llc Systems and methods for encoding video content
WO2018053537A1 (en) 2016-09-19 2018-03-22 Pindrop Security, Inc. Improvements of speaker recognition in the call center
AU2017327003B2 (en) 2016-09-19 2019-05-23 Pindrop Security, Inc. Channel-compensated low-level features for speaker recognition
US10593346B2 (en) 2016-12-22 2020-03-17 Apple Inc. Rank-reduced token representation for automatic speech recognition
US10397398B2 (en) 2017-01-17 2019-08-27 Pindrop Security, Inc. Authentication using DTMF tones
US10498795B2 (en) 2017-02-17 2019-12-03 Divx, Llc Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming
DK179745B1 (en) 2017-05-12 2019-05-01 Apple Inc. SYNCHRONIZATION AND TASK DELEGATION OF A DIGITAL ASSISTANT
DK201770431A1 (en) 2017-05-15 2018-12-20 Apple Inc. Optimizing dialogue policy decisions for digital assistants using implicit feedback
US11336644B2 (en) * 2017-12-22 2022-05-17 Vmware, Inc. Generating sensor-based identifier
US11019201B2 (en) 2019-02-06 2021-05-25 Pindrop Security, Inc. Systems and methods of gateway detection in a telephone network

Family Cites Families (171)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3637943A (en) * 1970-06-24 1972-01-25 Digital Telephone Systems Inc Telephone-signaling unit
US3689702A (en) * 1970-07-09 1972-09-05 Com U Trol Corp Remote dialing telephone apparatus
US3706855A (en) * 1970-10-02 1972-12-19 Gte Automatic Electric Lab Inc Generator for digital pulse signals representative of analog signal pairs
BE787377A (en) * 1971-08-09 1973-02-09 Waterbury Nelson J SECURITY CARDS AND SYSTEM FOR USING SUCH CARDS
CA1004362A (en) * 1972-04-11 1977-01-25 Gretag Aktiengesellschaft System for the individual identification of a plurality of individuals
NL160687C (en) * 1972-06-10 1979-11-15 Philips Nv TONE GENERATOR FOR GENERATING SELECTED FREQUENCIES.
FR2304965A2 (en) * 1974-03-25 1976-10-15 Innovation Ste Int ELECTRONIC CONTROL PROCESS AND DEVICE
US4058805A (en) * 1975-06-16 1977-11-15 Comdial Corporation Digital multitone generator for telephone dialing
US3976840A (en) * 1975-07-14 1976-08-24 Spencer Cleveland Portable securities selector system
GB1584159A (en) * 1976-06-10 1981-02-04 Sandstedt G Data transfer and storage system
US4126768A (en) * 1977-06-27 1978-11-21 Bell Telephone Laboratories, Incorporated Portable automatic number outpulser
FR2409652A1 (en) * 1977-11-18 1979-06-15 Materiel Telephonique MULTI-FREQUENCY CODED DIGITAL SIGNAL RECEIVER
US4201887A (en) * 1978-05-11 1980-05-06 Cordura Marketing, Inc. Data telecommunications terminal
US4205203A (en) * 1978-08-08 1980-05-27 Wescom Switching, Inc. Methods and apparatus for digitally signaling sounds and tones in a PCM multiplex system
US4320387A (en) * 1978-12-28 1982-03-16 Powell William S Information communicating apparatus and method
DE2940490A1 (en) * 1979-10-03 1981-04-09 Hagenuk Vormals Neufeldt & Kuhnke Gmbh, 2300 Kiel AUTOMATIC PAUSE GENERATOR FOR SELECTOR DEVICES
US4302810A (en) * 1979-12-28 1981-11-24 International Business Machines Corporation Method and apparatus for secure message transmission for use in electronic funds transfer systems
US4355210A (en) * 1980-09-22 1982-10-19 Midian Electronics, Inc. Sub-miniature tone encoder with automatic number identification
US4471165A (en) * 1980-10-28 1984-09-11 Pinetree Systems, Inc. Portable keyboard operated telecommunications system
US4451701A (en) * 1980-10-30 1984-05-29 Oclc Online Computer Library Center, Incorporated Viewdata system and apparatus
US4399535A (en) * 1981-06-18 1983-08-16 Siemens Corporation Digital tone generator
JPS6014385B2 (en) * 1981-09-18 1985-04-12 株式会社日立製作所 Transaction processing method
US4585904A (en) * 1982-02-05 1986-04-29 General Telephone Inc. Programmable computerized telephone call cost metering device
JPS599809A (en) * 1982-07-09 1984-01-19 株式会社日立製作所 Superconductive conductor
US4761807A (en) * 1982-09-29 1988-08-02 Vmx, Inc. Electronic audio communications system with voice authentication features
US4490579A (en) * 1983-04-15 1984-12-25 Vanig Godoshian Auto-dialing pager receiver
NL8301366A (en) * 1983-04-19 1984-11-16 Philips Nv TRANSMISSION CIRCUIT FOR A DTMF TELEPHONE.
NL8303701A (en) * 1983-10-27 1985-05-17 Philips Nv DTMF TELEPHONE WITH MULTIPLE USE OF THE DIGITAL TONE GENERATOR LOGIC.
GB2149159B (en) * 1983-10-28 1987-07-08 Membrain Ltd Method and apparatus for generating sequence of multibit words
CA1222586A (en) * 1983-11-11 1987-06-02 Tadahiko Akiyama Personal-servicing communication system
US4570260A (en) * 1983-12-02 1986-02-11 Stromberg-Carlson Corporation Digital tone signal generator for telephony system
US4494114B1 (en) * 1983-12-05 1996-10-15 Int Electronic Tech Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event
EP0147791B1 (en) * 1983-12-26 1990-08-29 Kabushiki Kaisha Toshiba Dual-tone multiple-frequency-signal generating apparatus
US4563548A (en) * 1984-04-10 1986-01-07 Advanced Micro Devices, Inc. Method and circuit for telephone dialing signal generation
US4571463A (en) * 1984-06-01 1986-02-18 Code-A-Phone Corporation Method and system for automatically inserting at least one pause into means for memorizing a dialing sequence
JPS6141262A (en) * 1984-07-31 1986-02-27 Omron Tateisi Electronics Co Voice recordable card
JPH0670818B2 (en) * 1984-09-07 1994-09-07 カシオ計算機株式会社 Verification card and its authentication method
US4620064A (en) * 1984-09-10 1986-10-28 Novation, Inc. Pocket sized telephone line data communication systems
US4689760A (en) * 1984-11-09 1987-08-25 Digital Sound Corporation Digital tone decoder and method of decoding tones using linear prediction coding
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US4885778A (en) * 1984-11-30 1989-12-05 Weiss Kenneth P Method and apparatus for synchronizing generation of separate, free running, time dependent equipment
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5168520A (en) * 1984-11-30 1992-12-01 Security Dynamics Technologies, Inc. Method and apparatus for personal identification
US4856062A (en) * 1984-11-30 1989-08-08 Kenneth Weiss Computing and indicating device
US4720860A (en) * 1984-11-30 1988-01-19 Security Dynamics Technologies, Inc. Method and apparatus for positively identifying an individual
JPS61139873A (en) * 1984-12-13 1986-06-27 Casio Comput Co Ltd Authorization system
US4679236A (en) * 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
US4689478A (en) * 1984-12-24 1987-08-25 Ncr Corporation System for handling transactions including a portable personal terminal
EP1148699B1 (en) * 1985-07-10 2004-09-22 Ronald A. Katz Technology Licensing, L.P., a California limited partnership Operations control
US4679233A (en) * 1985-08-30 1987-07-07 Motorola, Inc. Microphone
EP0218176B1 (en) * 1985-10-07 1991-11-13 Kabushiki Kaisha Toshiba Portable electronic device
US5245652A (en) 1985-10-16 1993-09-14 Supra Products, Inc. Secure entry system with acoustically coupled telephone interface
US4667087A (en) * 1986-03-31 1987-05-19 Max A. Quintana Secure credit card
US4866756A (en) * 1986-04-16 1989-09-12 Call It Co. Interactive computerized communications systems with voice input and output
US4797910A (en) * 1986-05-07 1989-01-10 American Telphone And Telegraph Company, At&T Bell Laboratories Automated operator assistance calls with voice processing
US4719322A (en) * 1986-05-22 1988-01-12 Motorola, Inc. Radio housing and expandable chassis with integral keypad and acoustic speaker seal
US5056141A (en) * 1986-06-18 1991-10-08 Dyke David W Method and apparatus for the identification of personnel
US4799254A (en) * 1986-06-30 1989-01-17 Wang Laboratories, Inc. Portable communication terminal for remote database query
US4815128A (en) * 1986-07-03 1989-03-21 Motorola, Inc. Gateway system and method for interconnecting telephone calls with a digital voice protected radio network
JP2654007B2 (en) * 1987-01-21 1997-09-17 株式会社リコー Communication device
JP2514954B2 (en) * 1987-03-13 1996-07-10 三菱電機株式会社 IC card
US4763355A (en) * 1987-03-24 1988-08-09 Cox James A Combined writing and signaling instrument
JPS63245784A (en) * 1987-04-01 1988-10-12 Omron Tateisi Electronics Co Terminal equipment for card identification
US4776006A (en) * 1987-04-23 1988-10-04 At&T Bell Laboratories Multiplexed data channel controlled telephone system
IT1211194B (en) * 1987-07-10 1989-10-12 Olivetti & Co Spa AUTOMATIC DISTORTION MEASUREMENT AND COMPENSATION SYSTEM OF A CONNECTION BETWEEN A TELEPHONE AND A CENTRAL VOICE TREATMENT UNIT
US4972479A (en) * 1987-07-10 1990-11-20 Tobias Jr Ray W Method and apparatus for providing privacy/security in a communication system
US4930160A (en) * 1987-09-02 1990-05-29 Vogel Peter S Automatic censorship of video programs
US4941172A (en) * 1987-11-24 1990-07-10 U.S. News Preprogrammed autodialer and related process
US4817135A (en) * 1987-11-24 1989-03-28 U.S. News Limited Partnership CRT mass-distribution, preprogrammed automatic dialing mechanism and related processes
US5199062A (en) * 1988-01-20 1993-03-30 Phone Base Systems Inc. Telephone communications system including a digital telephone switch, a voice response unit and a stored program sequence for controlling both the switch and the voice response unit
US5073941A (en) * 1988-02-01 1991-12-17 Ibm Corporation Multifrequency detection
DE68923575T2 (en) * 1988-02-26 1996-03-21 Sharp Kk Electronic system for storing and displaying information.
US4882750A (en) * 1988-03-23 1989-11-21 Henderson Daniel A Programmable dialer system
JPH01259483A (en) 1988-04-08 1989-10-17 Minolta Camera Co Ltd Ic card
US4980910A (en) * 1988-04-28 1990-12-25 Sharp Kabushiki Kaisha Portable automatic dialing unit
US5485370A (en) 1988-05-05 1996-01-16 Transaction Technology, Inc. Home services delivery system with intelligent terminal emulator
US4866773A (en) * 1988-05-20 1989-09-12 Dan Lubarsky System for interfacing a digital encryption device to a time-division multiplexed communication system
KR910001675B1 (en) * 1988-05-27 1991-03-18 삼성전자 주식회사 Dtmf and high-lowtone generating circuit
JPH025192A (en) * 1988-06-24 1990-01-10 Oki Electric Ind Co Ltd Ic card reader/writer device
JPH0226167A (en) * 1988-07-15 1990-01-29 Mitsubishi Electric Corp Compact electronic equipment
US4935961A (en) * 1988-07-27 1990-06-19 Gargiulo Joseph L Method and apparatus for the generation and synchronization of cryptographic keys
JPH02249345A (en) * 1988-08-29 1990-10-05 Ind Technol Res Inst Dual tone multifregnency generater
US4879743A (en) * 1988-10-03 1989-11-07 American Telephone And Telegraph Company PBX and adjunct using multi-frequency tones for communication therebetween
US4862492A (en) * 1988-10-26 1989-08-29 Dialogic Corporation Measurement of transmission quality of a telephone channel
US4910767A (en) * 1989-01-03 1990-03-20 Zenith Electronics Corporation ANI auto dialer with carrier current interface
US5239166A (en) 1989-01-17 1993-08-24 Graves Marcel A Secure data interchange system erasing a card memory upon an invalid response
US5227613A (en) 1989-01-24 1993-07-13 Matsushita Electric Industrial Co., Ltd. Secure encrypted data communication system having physically secure ic cards and session key generation based on card identifying information
KR920001542B1 (en) * 1989-02-28 1992-02-18 삼성전자 주식회사 Automatic answering method for a vehicle radio-telephone and device therefor
CA2033983C (en) * 1989-05-19 1994-10-18 John M. Saltwick System and method for communications security protection
US5181238A (en) * 1989-05-31 1993-01-19 At&T Bell Laboratories Authenticated communications access service
JP2856769B2 (en) * 1989-06-12 1999-02-10 株式会社東芝 Speech synthesizer
JPH0356255U (en) * 1989-06-29 1991-05-30
FR2651347A1 (en) * 1989-08-22 1991-03-01 Trt Telecom Radio Electr SINGLE NUMBER GENERATION METHOD FOR MICROCIRCUIT BOARD AND APPLICATION TO COOPERATION OF THE BOARD WITH A HOST SYSTEM.
US5199061A (en) * 1989-09-06 1993-03-30 Electronics And Telecommunications Research Institute Communication method and equipment for freeze-frame video phone
US4995077A (en) * 1989-10-30 1991-02-19 Malinowski Igor P Card-like device having a microprocessor and speaker for communicating with a telephone line
US5050207A (en) * 1989-11-03 1991-09-17 National Transaction Network, Inc. Portable automated teller machine
US5120939A (en) * 1989-11-09 1992-06-09 At&T Bell Laboratories Databaseless security system
JPH03171384A (en) * 1989-11-30 1991-07-24 Sony Corp Information reader
US5109408A (en) * 1989-11-30 1992-04-28 At&T Bell Laboratories Arrangement for intentionally blocking telephone calls to predefined destination numbers but allowing such blocking to be selectively overridden
DE69028185T2 (en) * 1989-12-15 1997-02-20 Toshiba Kawasaki Kk System for recording an image with an image of the face and with identification information
FR2657706B1 (en) * 1990-01-30 1992-11-27 Gemplus Card Internal Sa METHOD AND DEVICE FOR MANAGING TRANSACTIONS USING MICROCIRCUIT CARDS.
US5054051A (en) * 1990-01-31 1991-10-01 At&E Corporation Autodial from database in an electronic wristwatch
US5452352A (en) 1990-03-20 1995-09-19 Talton; David Automatic dialing system
FR2660776B1 (en) * 1990-04-05 1994-06-17 Alain Bernard ELECTRONIC TELEPHONE DEVICE.
JPH05284228A (en) * 1990-04-05 1993-10-29 Texas Instr Inc <Ti> Method for approving access to telecommunication service
JPH05304567A (en) * 1990-04-05 1993-11-16 Texas Instr Inc <Ti> Remote communication system, its remote communication service presentation interface and remote communication network
JPH05284203A (en) * 1990-04-05 1993-10-29 Texas Instr Inc <Ti> Method and system for user interface for speaking based on telecommunication
US5022080A (en) * 1990-04-16 1991-06-04 Durst Robert T Electronic notary
US5060255A (en) * 1990-04-25 1991-10-22 Bell Atlantic Network Services, Inc. Telecommunications system with timed-do-not-disturb
US5127043A (en) 1990-05-15 1992-06-30 Vcs Industries, Inc. Simultaneous speaker-independent voice recognition and verification over a telephone network
US5365574A (en) 1990-05-15 1994-11-15 Vcs Industries, Inc. Telephone network voice recognition and verification using selectively-adjustable signal thresholds
US5517558A (en) 1990-05-15 1996-05-14 Voice Control Systems, Inc. Voice-controlled account access over a telephone network
US5036461A (en) * 1990-05-16 1991-07-30 Elliott John C Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
US5454035A (en) 1990-05-16 1995-09-26 Sharp Kabushiki Kaisha Electronic apparatus
JP2822624B2 (en) * 1990-07-03 1998-11-11 三菱電機株式会社 Non-contact IC card
US5027401A (en) * 1990-07-03 1991-06-25 Soltesz John A System for the secure storage and transmission of data
JPH04235630A (en) 1990-07-30 1992-08-24 Ronald L Colier Method and device for conducting programming of computer by audible command
CA2022750A1 (en) * 1990-08-07 1992-02-08 Michel Ponton Dialing pulse signature recognizing method and device
JP2549192B2 (en) * 1990-09-19 1996-10-30 三菱電機株式会社 Non-contact IC card and method of using the same
US5223699A (en) * 1990-11-05 1993-06-29 At&T Bell Laboratories Recording and billing system
US5131038A (en) * 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system
US5257309A (en) 1990-12-11 1993-10-26 Octel Communications Corporation Dual tone multifrequency signal detection and identification methods and apparatus
US5241590A (en) 1990-12-18 1993-08-31 Dialing Devices Inc. Telephone dialing apparatus
US5168519A (en) * 1991-01-02 1992-12-01 Syntellect Inc. System and method for securing DTMF transmission
FR2671889A1 (en) 1991-01-22 1992-07-24 Pailles Jean Claude METHOD OF EXCHANGING RIGHTS BETWEEN MICROPROCESSOR CARDS.
US5369685A (en) 1991-03-07 1994-11-29 Sprint Communications Company L.P. Voice-activated telephone directory and call placement system
US5181744A (en) * 1991-03-15 1993-01-26 Betheil Stephen M Promotional auto dialer card
WO1992017975A1 (en) * 1991-03-26 1992-10-15 Litle & Co. Confirming identity of telephone caller
US5239583A (en) 1991-04-10 1993-08-24 Parrillo Larry A Method and apparatus for improved security using access codes
US5377263A (en) 1991-05-01 1994-12-27 Dial One Fastcard Telephone dialer card
JPH04336749A (en) 1991-05-13 1992-11-24 Canon Inc Facsimile equipment
US5177785A (en) * 1991-05-24 1993-01-05 Intervoice, Inc. Method and system for secure telecommunications
US5193114A (en) * 1991-08-08 1993-03-09 Moseley Donald R Consumer oriented smart card system and authentication techniques
WO1993004425A1 (en) 1991-08-13 1993-03-04 Universal Photonix, Inc. System for remotely validating the identity of indivuals and determining their locations
US5208446A (en) * 1991-09-19 1993-05-04 Martinez Jerry R Method and apparatus for validating credit information during home delivery of order
CA2078246C (en) 1991-09-23 1998-02-03 Randolph J. Pilc Improved method for secure access control
JP3043497B2 (en) 1991-11-14 2000-05-22 キヤノン株式会社 Telephone equipment
AU667871B2 (en) * 1991-12-31 1996-04-18 Digital Sound Corporation Voice controlled messaging system and processing method
US5392447A (en) 1992-01-10 1995-02-21 Eastman Kodak Compay Image-based electronic pocket organizer with integral scanning unit
TW200624B (en) 1992-04-06 1993-02-21 American Telephone & Telegraph A universal authentication device for use over telephone lines
US5315649A (en) * 1992-04-15 1994-05-24 Vcs Industries, Inc. Toll call telephone service center
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5329578A (en) 1992-05-26 1994-07-12 Northern Telecom Limited Personal communication service with mobility manager
US5251259A (en) 1992-08-20 1993-10-05 Mosley Ernest D Personal identification system
US5425084A (en) 1992-11-23 1995-06-13 Brinskele; Edward A. Computer-controlled telecommunications system
US5353342A (en) 1992-12-08 1994-10-04 Bell Communications Research, Inc. Adaptive multitone signaling method
US5428678A (en) 1992-12-30 1995-06-27 International Business Machines Corporation Telephone calling method and apparatus
WO1994022132A1 (en) * 1993-03-25 1994-09-29 British Telecommunications Public Limited Company A method and apparatus for speaker recognition
US5357566A (en) 1993-04-12 1994-10-18 Fone-It Inc. Object-oriented programmable dedicated dialer device and method of programming and calibrating the device
US5430827A (en) 1993-04-23 1995-07-04 At&T Corp. Password verification system
US5422945A (en) 1993-07-16 1995-06-06 American Express Trs Fast last digit detection of a dialed telephone number
US5343519A (en) 1993-09-07 1994-08-30 Peter Feldman Autodialer with pin feature
US5392342A (en) 1993-10-27 1995-02-21 At&T Corp. Technique for use in sequentially routing personal telephone calls
US5469499A (en) 1993-11-29 1995-11-21 Lanning; Leif System for securing access to equipment connectable to a telephone communication channel
US5363443A (en) 1993-12-08 1994-11-08 At&T Bell Laboratories Differing frequency sine wave generation from a look-up table
US5608784A (en) 1994-01-24 1997-03-04 Miller; Joel F. Method of personnel verification using voice recognition
US5623539A (en) 1994-01-27 1997-04-22 Lucent Technologies Inc. Using voice signal analysis to identify authorized users of a telephone system
US5420914A (en) 1994-02-28 1995-05-30 U S West Technologies, Inc. System and method for real time carrier selection
US5425085C1 (en) 1994-03-18 2001-10-09 Rates Technology Inc Least control routing device for separate connection into phone line
DE4411780C2 (en) * 1994-04-06 1998-12-17 Wolfgang A Dr Rer Nat Redmann Tap-proof access control device
US5440627A (en) 1994-04-21 1995-08-08 Puri; Rajendra P. Computer phone dialing system
US5406621A (en) 1994-04-22 1995-04-11 Binal; Mehmet E. Telephone tone analysis system
US5550575A (en) 1994-05-04 1996-08-27 West; Brett Viewer discretion television program control system
JP3550737B2 (en) 1994-07-08 2004-08-04 富士ゼロックス株式会社 Communication device
US5583933A (en) * 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data
US5414755A (en) 1994-08-10 1995-05-09 Itt Corporation System and method for passive voice verification in a telephone network
US5506885A (en) 1994-08-11 1996-04-09 Hamilton; Chris Method of adapting processing parameters in a call processing system
IL111157A (en) * 1994-10-04 1999-05-09 Labaton Isaac J Method for encoding and decoding data transmitted over the phone
US5619564A (en) 1995-05-31 1997-04-08 Lucent Technologies Inc. Tone detector with improved performance in the presence of speech
FR2739235B1 (en) * 1995-09-25 1998-06-19 Goreta Lucas ACOUSTIC SIGNAL PROCESSING SYSTEM ON TELEPHONE LINE ASSOCIATED WITH AN ACOUSTIC SIGNAL TRANSMISSION SYSTEM
US5588053A (en) 1995-11-29 1996-12-24 Advanced Micro Devices DTMF detector system and method which performs static and dynamic thresholding

Also Published As

Publication number Publication date
US5949874A (en) 1999-09-07
WO1997031472A2 (en) 1997-08-28
AU2055997A (en) 1997-09-10
JP2000505617A (en) 2000-05-09
WO1997031472A3 (en) 1998-09-03
EP0882350A2 (en) 1998-12-09
US5907597A (en) 1999-05-25
US6014441A (en) 2000-01-11

Similar Documents

Publication Publication Date Title
CA2247170A1 (en) Method and system for the secure communication of data
JP3609436B2 (en) General-purpose authentication device used via telephone line
US5732133A (en) System and method for selecting and generating telephone access numbers for limiting access to a telephone service
US5787154A (en) Universal authentication device for use over telephone lines
US6393305B1 (en) Secure wireless communication user identification by voice recognition
WO1996004741A9 (en) Method and apparatus for securing data communication
US6351639B1 (en) Telephone whose setting details can be changed, and telephone capable of changing settings of called telephone
KR100386044B1 (en) System and method for securing speech transactions
US6327345B1 (en) Method and system therefor of establishing an acceptance threshold for controlling fraudulent telephone calls
EP1911259B1 (en) Authentication apparatus
US7263347B2 (en) Biometric authentication of a wireless device user
US6519699B2 (en) Method and system for voice guided secure entry of private data in a public setting
US20020073321A1 (en) Fraud prevention for remote transactions
JPH08289005A (en) Password collation system
KR20000044029A (en) Telephone generating voice of caller phone number
CA2508490C (en) Enhanced security for voicemail passwords
JP3796730B2 (en) Customer information wiretapping prevention communication system
CA2309096A1 (en) Method and apparatus for securing data communication
US20050069110A1 (en) Phone access to stored list of authorization codes and gateway functions
KR20010048798A (en) A method for citating an subscriber in a speech information processing unit
JPH05122326A (en) Signal identification device for communication equipment

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued