$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Security arrangement and method for controlling access to a protected system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04M-001/66
출원번호 US-0612679 (1996-03-08)
발명자 / 주소
  • Anderson
  • Jr. Victor C.
대리인 / 주소
    Higgs, Fletcher & MackKleinke
인용정보 피인용 횟수 : 77  인용 특허 : 29

초록

The security arrangement includes a computer processor unit coupled to a subscriber information memory to verify whether the user is an authorized user. The subscriber information memory stores subscriber voice information and variable security level information. A prompt memory coupled to the compu

대표청구항

[ What is claimed is:] [1.] A method for controlling access to a protected system by a user utilizing a calling unit to provide call information, comprising:determining if the user is an authorized user associated with the calling unit to reduce substantially the ability of a non-authorized user to

이 특허에 인용된 특허 (29)

  1. Mukherjee Arabinda (South Brunswick NJ), Adaptive fraud monitoring and control.
  2. Johnson Eric A. (Longmont CO) Liss Michael D. (Nederland CO) Jensen Flemming B. (Sandy UT), Apparatus and method for detecting fraudulent telecommunication activity.
  3. Hampton Thomas H. (Lyme NH) Litle ; IV Thomas J. (Nashua NH) Searle Nigel H. (Keene NH), Confirming identity of telephone caller.
  4. Minakami Michael K. (Sunnyvale CA) Hulse Brian (Romsey Hampshire GB2) Cook Jonathan (North End Portsmouth GB2) Pickering John B. (St. Cross Winchester GB2), Distributed system for call processing.
  5. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  6. Naik Jayant M. (Dallas TX) Doddington George R. (Richardson TX), Fixed text speaker verification method and apparatus.
  7. Penzias Arno A. (Highland Park NJ), Fraud protection for card transactions.
  8. Davies Richard E. (2031 Brooks Dr. Forestville MD 20747), Identification verification method and system.
  9. Rudokas Ronald S. (Alamo CA) Storch John A. (Laguna Niguel CA) Daniels David L. (Placentia CA), Mehtod and apparatus for fraud control in cellular telephone systems utilizing RF signature comparison.
  10. Schorman Eric R. (Bedford TX), Method and apparatus for clone detection in a communication system.
  11. Brown Daniel P. (Elmhurst IL) Finkelstein Louis D. (Wheeling IL) Smolinske Jeffrey C. (Hoffman Estates IL), Method and apparatus for efficient real-time authentication and encryption in a communication system.
  12. Owens Leslie D. (Westford MA) Jueneman Robert R. (Acton MA) Worrest Ralph (Hudson MA) Davis Alvah B. (Atlanta GA), Method and apparatus for entity authentication.
  13. Weiss Kenneth P. (7 Park Ave. Newton MA 02150), Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics.
  14. Hodges Steven J. (Bethleham Township ; Hunterdon County NJ) Rubenstein Zev C. (Elizabeth NJ), Method and apparatus for preventing wireless fraud.
  15. Dyke David W. (342 Club View Dr. Great Falls VA 22066), Method and apparatus for the identification of personnel.
  16. D\Alessio Frederick D. (Great Falls VA) Keoppe Alfred C. (Pennington NJ) Wegleitner Mark A. (Arlington VA) McAllister Alexander I. (Wheaton MD), Method and system for home incarceration.
  17. Reed Elaine E. (Vienna VA) Edge Cynthia A. (Cedar Rapids IA), Method for controlling fraudulent telephone calls.
  18. Kung Kenneth C. (Cerritos CA) Bathrick Erwin W. (Brea CA) Huang Cheng-Chi (Irvine CA) Ma Mae-Hwa (Cerritos CA) Matthews Todd E. (Santa Ana CA) Zmuda James E. (Lake Forest CA), Method for providing mutual authentication of a user and a server on a network.
  19. Pilc Randolph J. (Holmdel NJ) Weber Roy P. (Bridgewater NJ), Method for secure access control.
  20. Pierce Jennifer A. (Algonquin IL) Finkelstein Louis D. (Wheeling IL) Brown Daniel P. (Elmhurst IL) Krebs Jay R. (Crystal Lake IL), Method of messaging in a communication system.
  21. Pierce George C. (Sarasota FL) Fletcher Don C. (Lakeland FL), Networked interactive call management subsystems with prevention of simultaneous use of a single account number.
  22. Vaios Christos I. (Schrewsbury NJ) Malinowski Alan E. (Union NJ) Diliani Dimitri N. (Aurora IL), Security system for terminating fraudulent telephone calls.
  23. Hunt Alan K. (Carrollton TX) Schalk Thomas B. (Dallas TX), Simultaneous voice recognition and verification to allow access to telephone network services.
  24. Bahler Lawrence G. (San Diego CA) Higgins Alan L. (San Diego CA), System and method for passive voice verification in a telephone network.
  25. Green John E. (San Bruno CA), System for verifying the identity of a caller in a telecommunications network.
  26. Suzuki Katsuo (Tokyo JPX) Umebayashi Kazuyuki (Tokyo JPX), Telephone apparatus.
  27. Shur Shlomo (Fairfield CT) McPhillips Dennis E. (Brewster NY), Voice processing system.
  28. King Reginald A. (Merrow Down ; Woolstone Faringdon ; Oxon GB3), Voice recognition using segmented time encoded speech.
  29. Naik Jayant M. (Dallas TX) Netsch Lorin P. (Allen TX) Doddington George R. (Richardson TX), Voice verification circuit for validating the identity of telephone calling card customers.

이 특허를 인용한 특허 (77)

  1. Gorodetski, Alex; Shapira, Ido; Wein, Ron; Sidi, Oana, Acoustic signature building for a speaker from multiple sessions.
  2. Flaks, Jason; Ismail, Ziad, Analyzing voice characteristics to detect fraudulent call activity and take corrective action without using recording, transcription or caller ID.
  3. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  4. Wong, Joseph D., Apparatus and method for proving authenticity with personal characteristics.
  5. Morganstein,Sanford J.; Zaks,Sergey, Authenticating a caller before providing the caller with access to one or more secured resources.
  6. Morganstein,Sanford J.; Zaks,Sergey, Authenticating a caller before providing the caller with access to one or more secured resources.
  7. Morganstein, Sanford J.; Zaks, Sergey, Authenticating an individual using an utterance representation and ambiguity resolution information.
  8. Fischer, Igor, Authorization method with hints to the authorization code.
  9. Mozer,Todd F., Biometric client-server security system and method.
  10. Yoma, Néstor Jorge Becerra, Biometric control method on the telephone network with speaker verification technology by using an intra speaker variability and additive noise unsupervised compensation.
  11. Sidi, Oana; Wein, Ron, Blind diarization of recorded calls with arbitrary number of speakers.
  12. Sidi, Oana; Wein, Ron, Blind diarization of recorded calls with arbitrary number of speakers.
  13. Sidi, Oana; Wein, Ron, Blind diarization of recorded calls with arbitrary number of speakers.
  14. Rajakumar, Anthony; Gutierrez, Richard; Guerra, Lisa M., Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist.
  15. Sanford J. Morganstein ; Sergey Zaks, Computer-based system and method for identifying an unidentified caller.
  16. Awad, Nadim; Keljo, Jonathan White; Dolbakian, Levon; Froment, Arnaud Marie; Kiraly, Kenneth Paul; Dumont, Michael David; Sridharan, Srinivasan, Controlling access based on recognition of a user.
  17. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  18. Buffum, Chuck; Levy, Jared; Calvin, Nathaniel; Gould, Craig; King, Jeff; Lipin, David, Dialog-based voiceprint security for business transactions.
  19. Ziv, Omer; Achituv, Ran; Shapira, Ido; Dreyfuss, Jeremie, Diarization using acoustic labeling.
  20. Ziv, Omer; Achituv, Ran; Shapira, Ido; Dreyfuss, Jeremie, Diarization using linguistic labeling.
  21. Friedman, Lee G., Electronic device control based on gestures.
  22. Zeppenfeld, Torsten; Gutierrez, Richard; Guerra, Lisa; Efron, Andrew S.; Rajakumar, Anthony, Enhanced diarization systems, media and methods of use.
  23. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  24. Gainsboro, Jay; Sinclair, Ken; Weinstein, Lee, Identical conversation detection method and apparatus.
  25. Gainsboro, Jay; Weinstein, Lee, Identical conversation detection method and apparatus.
  26. Morganstein, Sanford J.; Zaks, Sergey, Identifying an unidentified person using an ambiguity-resolution criterion.
  27. Weber,Frederick D.; Gulick,Dale E., Locking mechanism override and disable for personal computer ROM access protection.
  28. Yun, Sungrack; Kim, Taesu; Cho, Jun-Cheol; Park, Min-Kyu; Hwang, Kyu Woong, Method and apparatus for controlling access to applications having different security levels.
  29. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  30. Gutierrez, Richard; Rajakumar, Anthony; Guerra, Lisa Marie; Hartig, David, Method and system for enrolling a voiceprint in a fraudster database.
  31. Hartig, David; Rajakumar, Anthony; Guerra, Lisa Marie; Gutierrez, Richard, Method and system for generating a fraud risk score using telephony channel based audio and non-audio data.
  32. Rajakumar, Anthony, Method and system for screening using voice data and metadata.
  33. Menk, Klaus-Dieter; Mayer, Axel, Method for authorizing a telephone transaction and local node.
  34. Powell Michael B., Method for preventing cellular telephone fraud.
  35. Sharma, Alok; Cai, Yigang, Method for selectively exposing subscriber data.
  36. Susen, Axel; Brock, Stefan, Method for verifying access authorization for voice telephony in a fixed network line or mobile telephone line as well as a communications network.
  37. Clements, Bradley Alan; Adcock, Sherrie; Schwartz, Gerald S., Method of comparing utterances for security control.
  38. Headley, Paul, Methods for identifying the guarantor of an application.
  39. Headley, Paul, Methods for the secure use of one-time passwords.
  40. Ma, Karen, Methods of authenticating users to a site.
  41. Headley, Paul, Multi-channel multi-factor authentication.
  42. Headley, Paul, Multi-channel multi-factor authentication.
  43. Gainsboro, Jay; Barrasso, Charles; Klein, Jonathan; Roberts, George, Multi-party conversation analyzer and logger.
  44. Oosako, Satoru, Plant control system.
  45. Irvin David R., Radiotelephone adapted to the identity of its user.
  46. Datta, Sham M.; Kumar, Mohan J.; Brickell, Ernie; Schoinas, Ioannis T.; Sutton, James A., Reconfiguring a secure system.
  47. Qiu, Xin; Sprunk, Eric J.; Moroney, Paul, Secure control of security mode.
  48. Gulick,Dale E.; Strongin,Geoffrey S., Secure execution box.
  49. Vesa Ulvinen FI; Jari Paloniemi FI, Secure wireless communication user identification by voice recognition.
  50. Headley, Paul; Collins, Kevin, Single-channel multi-factor authentication.
  51. Headley, Paul; Collins, Kevin, Single-channel multi-factor authentication.
  52. Steven J. Harrington, Single-use passwords for smart paper interfaces.
  53. Ziv, Omer; Wein, Ron; Shapira, Ido; Achituv, Ran, Speaker separation in diarization.
  54. Weideman William Edward, Speech recognition and verification system enabling authorized data transmission over networked computer systems.
  55. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  56. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  57. Sanford J. Morganstein ; Sergey Zaks ; Peter B. Boswell ; Georgi Akkuratov RU, System and method for identifying an unidentified caller.
  58. Morganstein, Sanford J.; Zaks, Sergey, System and method for identifying an unidentified customer at the point of sale.
  59. Morganstein Sanford J. ; Zaks Sergey, System and method for identifying an unidentified person using an ambiguity-resolution criterion.
  60. Polcyn, Michael J., System and method for operating a highly distributed interactive voice response system.
  61. Polcyn,Michael J., System and method for operating a highly distributed interactive voice response system.
  62. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  63. Clark, David; Arsenault, Jonathan; Fortier, Stephane, System and method for unlocking a device.
  64. Headley, Paul, Systems and methods for controlling access to encrypted data stored on a mobile device.
  65. Guerra, Lisa; Gutierrez, Richard; Hartig, David; Rajakumar, Anthony; Vyas, Vipul, Systems, methods, and media for determining fraud patterns and creating fraud behavioral models.
  66. Guerra, Lisa; Gutierrez, Richard; Hartig, David; Rajakumar, Anthony; Vyas, Vipul, Systems, methods, and media for determining fraud patterns and creating fraud behavioral models.
  67. Rajakumar, Anthony; Guerra, Lisa; Zeppenfeld, Torsten; Vyas, Vipul, Systems, methods, and media for disambiguating call data to determine fraud.
  68. Zeppenfeld, Torsten; Mirghafori, N. Nikki; Guerra, Lisa; Gutierrez, Richard; Rajakumar, Anthony, Systems, methods, and media for generating hierarchical fused risk scores.
  69. Doora PrabhuSwamy, Kiran Prabhu, Techniques for securing data access.
  70. Headley, Paul, User authentication for social networks.
  71. Su, Huan-yu; Assaleh, Khaled, User configurable levels of security for a speaker verification system.
  72. Wein, Ron, Voice activity detection using a soft decision mechanism.
  73. Heck, Larry P., Voice authentication system having cognitive recall mechanism for password verification.
  74. Moh'd Abdel-Hamid Hasan, Voice enabled system for remote access of information.
  75. Katsuyuki Onozawa JP; Fujio Inagami JP; Hiroshi Fujita JP; Osamu Kawano JP, Voice recording method for mobile communication apparatus.
  76. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
  77. Gorodetski, Alex; Sidi, Oana; Wein, Ron; Shapira, Ido, Word-level blind diarization of recorded calls with arbitrary number of speakers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로