Browse Prior Art Database

Method and apparatus for continuous verified secured communication

IP.com Disclosure Number: IPCOM000240832D
Publication Date: 2015-Mar-05
Document File: 2 page(s) / 22K

Publishing Venue

The IP.com Prior Art Database

Abstract

During a secured communication using a mobile device the user may want to ensure that the communication is continuously secured by verification that the other person(s) in the communication are actually on the other end and continuously confirmed. If someone walks away the user does not want the communication continued. This publication describes a Method and apparatus for continuous verified secured communication

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

Method and apparatus for continuous verified secured communication

During a secured communication using a mobile device the user may want to ensure that the communication is continuously secured by verification that the other person (s) in the communication are actually on the other end and continuously confirmed . If someone walks away the user don't want the communication continued.

The core idea of this article is to enable over a communication protocol a request to the service provider to require a continuous authentication verification by the user via biometric (fingerprint) verification sent over the protocol and acknowledged by both parties as verified, including an intermittent check during the conversation for continuous verification.

Primary embodiment:


When initiating a phone call or VOIP call in addition to the number being dialed a request for continuous authentication is requested . The service provider sends a message for the user to continuously authenticate using the fingerprint reader on their device to connect and maintain the connection , a verification via tone or pulse is sent by the provider which the caller acknowledges and begins the secured communication .

The advantage of using continuous biometric validation is that it is the actual person and not a passcode based verification , and focused at the provider level.

Another key potential licensing is in the intelligence community or corporate community where the user want to ensure the other person is the other person , even if they state they have a cold, muffled voice or using voice recorder or curt statements that 's not easily distinguished by voice alone. Or if it is a sec...