1. Field of the Invention
The present invention relates to a telephone, and more particularly, to a method for confirming an identity of a caller.
2. Description of the Related Art
Frauds have committed frequently wherein a person who pretends to be a family member of a receiver calls the receiver and makes the receiver transfer cash to a specified account. In order to prevent such frauds, confirmation of the identity of the caller is necessary. One method for confirming the identity of the caller is utilizing caller ID (identification) service provided by telephone companies. That is, a caller is identified by confirming that the call is made from a telephone having a specific number as a caller ID. As disclosed in Japanese Unexamined Patent Application Publication No. 2003-233595, technologies for confirming a caller on the basis of audio information included in voices uttered by the caller has also been developed.
In a strict sense, confirmation using the caller ID does not guarantee that the identity of the caller is confirmed but guarantees only that the telephone used to make the call is confirmed. Accordingly, for example, when a criminal third party makes a call with a stolen mobile phone to a family member of the owner of the mobile phone, the family member cannot distinguish whether the caller is the owner of the mobile phone or the criminal third party. The accuracy of verification of a caller with audio information has limitations, and in particular, the accuracy of audio verification over telephones is low. Therefore, when the verification criteria are set to be loose, there is a risk that the criminal third party is mistaken for the owner of the mobile phone, while the verification criteria are set to be strict, there is a risk that the owner of the mobile phone cannot be recognized as the owner of the mobile phone.
It is an object of the present invention to provide a method for reliably confirming the identity of the caller.
According to an aspect of the present invention, there is provided a telephone which includes: a voice input unit which inputs an audio signal; a user token input unit which inputs a user token that is data for proving an identity of a user; a user reference storage which stores a user reference that is data used to verify the user token; a user verifier which verifies the user token on the basis of the user reference which is stored in the user reference storage; a caller token storage which stores a caller token that is data for proving an identity of a caller; and a caller token embedder which embeds, upon successful verification of the user token, in the audio signal the caller token which is stored in the caller token storage.
The user reference storage in the telephone may store a plurality of user references. The caller token storage may store caller tokens which correspond to each of the plurality of user references which are stored: in the user reference storage. In such a configuration, the caller token which corresponds to a user reference which is used in the successful verification of the user token is embedded in the audio signal.
According to another aspect of the present invention, there is provided a telephone which includes: a receiver which receives from a caller telephone an audio signal which is embedded with a caller token that is data for proving an identity of a caller; a caller token extractor which extracts the caller token from the audio signal; a caller reference storage which stores a caller reference that is data used to verify the caller token; and a caller verifier which verifies the caller token on the basis of the caller reference which is stored in the caller reference storage.
The caller reference may correspond to a telephone number. In such a configuration, a caller reference which corresponds to a telephone number which coincides with a caller ID which identifies the caller telephone is used for verifying the caller token.
According to another aspect of the present invention, there is provided a method for transmitting a caller token that is data for proving an identity of a caller. The method is executed by a telephone which includes a user reference storage which stores a user reference that is data used to verify a user token that is data for proving an identity of a user. The telephone further includes a caller token storage which stores the caller token. The method includes the steps of: accepting an input of an audio signal; accepting an input of the user token; verifying the user token on the basis of the user reference which is stored in the user reference storage; and embedding, upon successful verification of the user token, in the audio signal the caller token which is stored in the caller token storage.
According to another aspect of the present invention, there is provided a method for verifying a caller token that is data for proving an identity of a caller. The method is executed by a telephone which includes a caller reference storage which stores a caller reference that is data used to verify the caller token. The method includes the steps of receiving from a caller telephone an audio signal which is embedded with the caller token; extracting the caller token from the audio signal; and verifying the caller token on the basis of the caller reference which is stored in the caller reference storage.
According to another aspect of the present invention, there is provided a program storage medium which is readable by a computer and stores a program of instructions for the computer to execute a method for transmitting a caller token that is data for proving an identity of a caller, wherein the computer includes a user reference storage which stores a user reference that is data used to verify a user token that is data for proving an identity of a user, and the computer further includes a caller token storage which stores the caller token. The method includes the steps of: accepting an input of an audio signal; accepting an input of the user token; verifying the user token on the basis of the user reference which is stored in the user reference storage; and embedding, upon successful verification of the user token, in the audio signal the caller token which is stored in the caller token storage.
According to another aspect of the present invention, there is provided a program storage medium which is readable by a computer and stores a program of instructions for the computer for executing a method to verify a caller token that is data for proving an identity of a caller, wherein the computer includes a caller reference storage which stores a caller reference that is data used to verify the caller token. The method includes the steps of receiving from a caller telephone an audio signal which is embedded with the caller token; extracting the caller token from the audio signal; and verifying the caller token on the basis of the caller reference which is stored in the caller reference storage.
According to the present invention, user verification is performed in a caller telephone and a caller token proving the identity of the caller is transmitted to a receiver telephone only when the user verification is successful, while, in the receiver telephone, caller verification is performed with the caller token received from the caller telephone. Accordingly, the present invention may provide a method for transmitting a caller token with which the identity of the caller may be reliably confirmed by a receiver.
The Embodiments will be described with reference to the accompanying drawings.
A receiver telephone 2 according to the present embodiment includes a number input unit 42 for specifying a telephone number of a receiver, a voice input unit 44 for inputting an audio signal, an encoder 52 for encoding the audio signal, a transmitter 54 for transmitting the telephone number and the encoded audio signal, a receiver 56 for receiving an encoded audio signal, a decoder 58 for decoding the received audio signal, a voice output unit 60 for outputting the decoded audio signal, a caller token extractor 50 for extracting a caller token embedded in the decoded audio signal, a caller verifier 48 for verifying whether the user of the caller telephone is a valid caller on the basis of the extracted caller token, verification output unit 46 for outputting the verification result, and a caller reference storage 62 configured to store a caller reference that is data used to verify the caller token.
A process performed in the caller telephone 1 will be described. Only a process related to transmission of a caller token is described, while the description of a process related to a typical telephone call operation is omitted since the process is well known.
In step S102, the user token input unit 16 accepts an input of a user token from a user. In this embodiment, a four-digit password, for example, is used as the user token. However, the user token is not limited thereto and any information proving the user may be used. For example, biometric information such as a fingerprint or a vein pattern of a specific portion of a human body may be used as the user token.
In step S104, the user verifier 18 reads the user reference from the user reference storage 34. The user reference may be different for each receiver. In this case, the user reference is stored in the user reference storage 34 in correspondence with a telephone number of a respective receiver and the user verifier 18 reads the user reference corresponding to the telephone number of the receiver from the user reference storage 34. In the case where the user reference is different for each receiver, the user inputs a user token different for each user reference. When passwords are used as the user token, the passwords may be different for each receiver. When biometric information is used as the user token, the user token may be obtained from portions that are different for each receiver, for example, different fingers.
In step S106, the user verifier 18 verifies the user token on the basis of the user reference. In the description of the present embodiment, when the user token coincides with the user reference, the result of the verification is regarded as a success. However, the method of the verification is not limited to the above-described method and the result of the verification may be regarded as a success when the user token meets any criteria based on the user reference.
In step S108, when the verification of the user token is successful (Yes in step S106), the caller token embedder 20 reads the caller token from the caller token storage 32. A ten-digit decimal number is used as the caller token in this embodiment. However, the caller token is not limited thereto and any information proving the caller may be used. The caller token may be different for each receiver. In this case, the caller token is stored in the caller token storage 32 in correspondence with a telephone number of a respective receiver. The caller token embedder 20 reads the caller token corresponding to a telephone number of a receiver from the caller token storage 32. In this embodiment, it is assumed that the user token is different from the caller token. However, the user token may be used as the caller token.
The process in the steps described above may be performed at an arbitrary timing before the call is finished.
In step S110, the caller token embedder 20 embeds the caller token in an audio signal. The process in step S110 is performed after the call has started and is repeated until the call is finished (Yes in step S112). The audio signal may be an analog signal or a digital signal. In this embodiment, it is assumed that the audio signal is transmitted after being encoded. However, the audio signal is not necessarily processed only in the above-described manner and does not have to be encoded. When the audio signal is encoded, the process in step S110 is performed on the audio signal before encoded.
In step S202, the caller token extractor 50 extracts a caller token from a received audio signal. The process in step S202 is performed during a call. When the audio signal has been transmitted after being encoded, the process in step S202 is performed on the received audio signal after decoded.
In step S204, the caller verifier 48 reads the caller reference from the caller reference storage 62. The caller reference storage 62 may store caller references for a plurality of callers. In this embodiment, the caller reference is stored in the caller reference storage 62 in correspondence with a respective caller ID. The caller reference may also be stored in correspondence with information identifying a caller such as a name. The caller verifier 48 reads from the caller reference storage 62 the caller reference corresponding to a caller ID of the incoming call. Alternatively, the caller verifier 48 may read the caller reference corresponding to a caller specified by the receiver. A plurality of caller references may also be read without specifying a caller.
In step S206, the caller verifier 48 verifies the caller token on the basis of the caller reference. In the description of the present embodiment, when the caller token coincides with the caller reference, the result of the verification is regarded as a success. However, the method of the verification is not limited to the above-described method and the result of the verification may be regarded as a success when the caller token meets any criteria based on the caller reference. In the case where a plurality of caller references are read, the caller token is verified on the basis of each of the plurality of caller references.
In step S208, the verification output unit 46 outputs the result of the verification. Although any content may be used as the output, it is preferable to output information identifying the caller such as a caller ID or a name corresponding to the caller reference used in the verification when the verification is successful.
With the above-described configuration, user verification is performed in the caller telephone 1 and the caller token for proving the identity of the caller is transmitted to the receiver telephone 2 only when the user verification is successful, while, in the receiver telephone 2, caller verification is performed with the caller token received from the caller telephone 1.
Examples of a method of embedding a caller token in an audio signal performed in the caller telephone 1 and a method of extracting the caller token from the audio signal performed in the receiver telephone 2 will be described.
In the present embodiment, a caller token is embedded as a sine wave in an audio signal. Referring to
The audio signal 144 is smoothed and then compared with a predetermined threshold to obtain a rectangular wave 146. When the caller token extractor 50 detects a pulse having a pulse width of more than 100 ms (20 ms×5 bits) in the rectangular wave 146, the caller token extractor 50 recognizes that the caller token 112 begins at the end of the pulse and converts the following rectangular wave 146 to binary numbers. The caller token extractor 50 further converts the binary numbers, in units of four bits, to decimal numbers to restore the ten-digit decimal number.
As described above, in the present embodiment, user verification is performed in a caller telephone and a caller token proving the identity of the caller is transmitted to a receiver telephone only when the user verification is successful, while, in the receiver telephone, caller verification is performed with the caller token received from the caller telephone. Accordingly, the embodiments may provide a method for transmitting a caller token with which the identity of the caller may be reliably confirmed by a receiver. Since the caller token is embedded in the audio signal, there is no need to modify the protocol of telephone call.
Furthermore, the above-described functions in a telephone according to the present embodiment may be implemented not only as hardware but also as software in a computer built in a telephone. For example, when a program allowing a computer to perform the functions of the number input unit 12, the voice input unit 14, the user token input unit 16, the user verifier 18, the caller token embedder 20, the encoder 22, the transmitter 24, the receiver 26, the decoder 28, and the voice output unit 30 shown in
Number | Date | Country | Kind |
---|---|---|---|
2007-040307 | Feb 2007 | JP | national |