US 12,309,282 B2
Validating and securing caller identification to prevent identity spoofing
Lulia Ann Barakat, McKinney, TX (US); Jeffrey Haltom, Fishers, IN (US); Duncan Archer, Durham (GB); Michael Stovenour, McKinney, TX (US); and Tolga Asveren, Bordentown, NJ (US)
Assigned to Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed by Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed on Sep. 15, 2021, as Appl. No. 17/447,727.
Application 17/447,727 is a continuation of application No. 16/387,024, filed on Apr. 17, 2019, granted, now 11,133,938.
Prior Publication US 2021/0409228 A1, Dec. 30, 2021
Int. Cl. H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 65/1016 (2022.01); H04L 65/1076 (2022.01); H04L 65/1104 (2022.01); H04L 67/14 (2022.01); H04L 67/143 (2022.01); H04W 12/06 (2021.01)
CPC H04L 9/3247 (2013.01) [H04L 65/1016 (2013.01); H04L 65/1079 (2013.01); H04L 65/1104 (2022.05); H04L 63/126 (2013.01); H04L 63/1458 (2013.01); H04L 63/1466 (2013.01); H04L 63/166 (2013.01); H04L 67/14 (2013.01); H04L 67/143 (2013.01); H04W 12/06 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
determining, by a device, whether a caller identification is verified,
wherein the caller identification is included in call information associated with a call from a first user device to a second user device,
wherein the first user device is associated with a first network,
wherein the second user device is associated with a second network that is separate from the first network, and
wherein determining whether the caller identification is verified comprises:
decrypting a first cryptographic signature using a public key to verify the call information has been unaltered in transit;
adding, by the device, authentication information to the call information when the caller identification is determined to be verified,
wherein the authentication information includes an attestation indicator that indicates whether a service provider associated with the first network is responsible for origination of the call;
receiving, by the device and from a terminating network device of the first network, a request including the call information and the authentication information;
removing, by the device, the authentication information from the call information;
adding, by the device, a second cryptographic signature to the call information; and
causing, by the device, the call information and the second cryptographic signature to be provided to the second network.