Methods of using biometric data in a phone system and apparatuses to perform the methods

ABSTRACT

A system includes a processor and a memory accessible to the processor. The memory includes instructions that, when executed by the processor, cause the processor to perform operations including, in response to an activation event, sending information to a biometric input device to activate the biometric input device. The operations further include receiving biometric data corresponding to a particular user from the biometric input device. The operations include determining whether an identification of the particular user matches the biometric data. In response to determining that the identification of the particular user matches the biometric data, a service is provided to a device associated with the particular user.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of and claims priority from U.S. Pat.No. 8,374,324, filed Jun. 2, 2005, and entitled “METHODS OF USINGBIOMETRIC DATA IN A PHONE SYSTEM AND APPARATUSES TO PERFORM THEMETHODS,” which is incorporated herein by reference in its entirety.

BACKGROUND

1. Field of the Disclosure

The present disclosure relates to methods of using phone systems, andmore particularly to methods of configuring phone terminals, methods ofconfirming the identity of parties to a phone call, and apparatuses usedin carrying out the methods.

2. Description of the Related Art

A phone system user has an ability to configure a phone at a business orhome that allows the user to be more efficient and productive when usingthe phone. When the user uses a shared phone (e.g., a public phone) orsomebody else's phone, the user does not have access to information thathe or she may otherwise need. Configuration of such other phone may bedifficult to allow the user to efficiently and productively use theother phone. The user may have to make one or more follow up calls tocomplete a transaction or task that may have been otherwise unnecessaryif the user was at his or her own phone.

Another problem with a phone system is the inability to confirm theidentity of the party being called (herein “the called party”) at aparticular number, address or location. The person placing the call(hereinafter “the calling party”) may need to communicate highlysensitive information. Many times, the voices of young adults soundconfusingly similar to the voice of one of their parents. The callingparty may inadvertently disclose some of the highly sensitiveinformation before the calling party realizes that the person on theother end of the phone call is not the intended called party. Suchinadvertent disclosures can cause problems.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 includes a block diagram of a phone system that can configure aphone terminal for a particular user.

FIG. 2 includes a flow diagram of a method of configuring a phoneterminal or a network coupled to the phone terminal using the phonesystem of FIG. 1.

FIG. 3 includes a block diagram illustrating a phone system that can beused to confirm the identity of a calling party, a called party, orboth.

FIG. 4 includes a flow diagram of a method of confirming the identity ofa calling party and a called party using the phone system of FIG. 3.

Skilled artisans will appreciate that elements in the figures areillustrated for simplicity and clarity and have not necessarily beendrawn to scale.

DETAILED DESCRIPTION

A phone system can include a phone terminal that includes a biometricdata input device. Methods of using the phone terminal can includereceiving biometric data of a user at the phone terminal to previouslysaved biometric data. Other data (user identification, password, etc.)can also be received. A comparison of the received and saved biometricdata can be performed to locate one or more configuration files for auser, to authenticate or otherwise confirm the identity of a party,perform another activity, or any combination thereof. In one embodiment,the biometric data, other data, or a combination thereof can be used toaccess one or more configuration files that can be used to configure aphone terminal or another part of the phone system. Such configurationcan be useful for a shared phone terminal, such as a public telephone.In another embodiment, the identity of a calling party, a called party,one or more other parties, or any combination thereof can beauthenticated or otherwise confirmed. The authentication or otherconfirmation can be useful to one or more parties on a phone call toensure a greater likelihood that sensitive information is notaccidentally or unintentionally transmitted to one or more persons thatare not to receive the sensitive information.

In one aspect, a method of configuring a phone system including a phoneterminal can include receiving first biometric data at the phoneterminal from a first user at the phone terminal, using the firstbiometric data to locate a first configuration file associated with thefirst user, and configuring the phone terminal or another part of phonesystem consistent with the first configuration file.

In a second aspect, a data processing system is within a phone network.The data processing system can include an input port to receive firstbiometric data associated with a first user of a phone terminal, whereinthe phone terminal does not include the data processing system. The dataprocessing system also includes a configuration retrieval module toretrieve a first configuration file based at least in part on the firstbiometric data associated with the first user, and a configurationmodule to configure the phone terminal or another part of the phonesystem consistent with the first configuration file.

In a third aspect, a phone terminal can include a biometric data inputdevice, and a configuration module to configure the phone terminal or anetwork coupled to the phone terminal in accordance to a firstconfiguration file associated with a first user, wherein the firstconfiguration file is selected based at least in part on first biometricdata from the biometric data input device.

In a fourth aspect, a method of confirming that a called party receivesa phone call can include receiving a call signal from a calling party tothe called party, receiving first biometric data associated with thecalled party, comparing the first biometric data to second biometricdata associated with the called party to substantially confirm anidentity of the called party, and notifying the calling party that anidentity of the called party has been confirmed.

In a fifth aspect, a data processing system can be used in a phonenetwork. The data processing system can include a first input/outputport to receive a call signal from a calling party to a called party, asecond input/output port to receive first biometric data in response toan input from the called party, a comparison module to compare the firstbiometric data to second biometric data to substantially confirm anidentity of the called party, and a notification module to notify thecalling party that an identity of the called party has beensubstantially confirmed.

Before addressing details of embodiments described below, some terms aredefined or clarified. As used herein, the terms “comprises,”“comprising,” “includes,” “including,” “has,” “having” or any othervariation thereof, are intended to cover a non-exclusive inclusion. Forexample, a process, method, article, or apparatus that comprises a listof elements is not necessarily limited to only those elements but mayinclude other elements not expressly listed or inherent to such process,method, article, or apparatus. Further, unless expressly stated to thecontrary, “or” refers to an inclusive or and not to an exclusive or.

Additionally, for clarity purposes and to give a general sense of thescope of the embodiments described herein, the use of “a” or “an” areemployed to describe one or more articles to which “a” or “an” refers.Therefore, the description should be read to include at least onewhenever “a” or “an” is used, and the singular also includes the pluralunless it is clear that the contrary is meant otherwise.

Unless stated otherwise, any combination of parts of a system may bebi-directionally or uni-directionally coupled to each other, even thougha figure may illustrate only a single-headed arrow or a double-headedarrow. Arrows within the drawing are illustrated, as a matter ofconvenience, to show a principal information, data, or signal flowwithin the system or between the system and one or more componentoutside the system, one or more modules outside the system, anothersystem, or any combination thereof in accordance with an embodiment.Coupling should be construed to include a direct electrical connectionin one embodiment and alternatively, may include any one or more of anintervening switch, resistor, capacitor, inductor, router, firewall,network fabric or the like between any combination of one or morecomponent, one or more devices, or one or more modules.

Unless otherwise defined, technical and scientific terms used hereinhave the same meaning as commonly understood by one of ordinary skill inthe art. In addition, the materials, methods, and examples areillustrative only and not intended to be limiting.

FIG. 1 includes a block diagram of a portion of phone system inaccordance 100 with one embodiment. The phone system includes a phoneterminal 120 that is bi-directionally coupled to a network 140 that isbi-directionally coupled to a data processing system 160. In aparticular embodiment, the phone system 100 can be part of apacket-switched network that uses Internet Protocol, such as Voice overInternet Protocol (“VoIP”).

The phone terminal 120 includes an input/output (“I/O”) port 122 thatreceives a connection for the network 140. The phone terminal 120further includes a central processing unit (“CPU”) 124 that isbi-directionally coupled to the I/O port 122, a phone handset 126, abiometric data input device 128, a storage device 130, a configurationmodule 132, and a display 134 that is an example of an output device.After reading this specification, skilled artisans may appreciate thatthe phone terminal 120 may include more or fewer components than what isillustrated in FIG. 1.

The CPU 124 can be at least a part of a data processing system. Althoughnot illustrated, other connections and memories may reside in or becoupled to the phone terminal 120. Although not illustrated, the phoneterminal 120 can include additional memory, including contentaddressable memory, static random access memory, cache,first-in-first-out (“FIFO”), other memory, or any combination thereof.The memories, including the storage device 130, can include media thatcan be read by the CPU 124 within the phone terminal 120. Each type ofmemory includes a data processing system readable medium suitable fordata processing.

The phone handset 126 and the biometric data input device 128 can beused by a calling party or a called party when using the phone terminal120. In one embodiment, after lifting the phone handset 126 or otherwiseactivating the phone terminal 120 (e.g., push a button, swipe a creditcard, smart card, or other card, insert money, etc.), the CPU 124 mayactivate the biometric data input device 128. The biometric data inputdevice 128 can be configured to receive biometric data from a user atthe phone terminal 120. An example of the biometric data can include avoice pattern, a fingerprint, an iris scan, other suitable input, or anycombination thereof that uniquely corresponds to a particularindividual. The design of the biometric data input device 128 candepend, in part, on the type of biometric data being collected. Forexample, the device may include a scanner and detector when collectingdata related to a physical appearance. In another example, the device128 can include a microphone and related logic for processing a voicepattern from the user. In another embodiment, input for a voice patterncan be received by the phone handset 126.

The storage device 130 can include information associated with one ormore particular users. For each particular user, such information caninclude a particular user identifier, biometric data associated withthat particular user, one or more configuration files for the particularuser, other information associated with the particular user, or anycombination thereof. The storage device 130 may include substantiallythe same type of information for other particular users. The storagedevice 130 can also include program code that includes instructions forcarrying out methods as described herein.

The configuration module 132 can be used to process one or moreconfiguration files of a particular user at the phone terminal 120. Theconfiguration performed by the configuration module 132 is highlyflexible depending on the configuration file. The configuration modulemay affect the phone terminal 120 or another part of the phone system100 (e.g., another part of the data processing system 160). Detailsregarding possible configurations are described herein.

In one embodiment, the phone terminal 120 may be incorporated within astandalone device (e.g., a cell phone, a telephone at a kiosk, etc.) Inanother embodiment, the phone terminal 120 is not limited to just onehardware device and can include nearly any combination of elements(hardware, firmware, software) that acts as a phone terminal. Forexample, a phone terminal can be integrated into a home entertainmentsystem, wherein signals from the network 140 may be received by aset-top box in the home entertainment system. Audio output signals andvideo output signals may be routed to speakers and a television or otherdisplay of the home entertainment system. Speech of the user may bereceived by a microphone, and images at the user's location may bereceived by a camera. The microphone and camera may route the associatedaudio and video input signals to the set-top box. The combination of theset-top box and any one or more of the speakers, television or otherdisplay, or microphone can be the phone terminal. In one embodiment,only the audio portion or video portions may be used for a call. Afterreading this specification, skilled artisans will appreciate that otherembodiments can be used.

The data processing system 160 includes an I/O port 162 that receives aconnection to the network 140. In one embodiment, the data processingsystem 160 is not part of the phone terminal 120, and in a particularembodiment, the data processing system 160 lies at a location remote tothe phone terminal 120 (e.g., in different rooms within a building, indifferent buildings, in different cities, states or provinces, countriesetc.). The data processing system 160 includes a CPU 164 that isbi-directionally coupled to the I/O port 162, an access module 166, arendering module 174, and a configuration module 176.

Although not illustrated, other connections and memories may reside inor be coupled to the data processing system 160. Although notillustrated, the data processing system 160 can include additionalmemory including content addressable memory, static random accessmemory, cache, first-in-first-out (“FIFO”), other memory, or anycombination thereof. The memories, including the storage device 170, caninclude media that can be read by the CPU 164 within the data processingsystem 160. Each type of memory includes a data processing systemreadable medium suitable for data processing. The CPU 164 may be thesame or different from the CPU 124.

The access module 166 includes a storage module 168 and a configurationretrieval module 172. The access module 166 is bi-directionally coupledto the storage device 170. The access module 166 includes logic forstoring and retrieving information from the storage device 170. Suchinformation may be substantially the same type of information asdescribed with respect to the information within the storage device 130.In one embodiment, the functions of the configuration module 132 andstorage device 130, as described with respect to the phone terminal 120,are handled by a combination of the access module 166, the storagedevice 170, and rendering module 174 in the data processing system 160.

When initially setting up the phone system 100 for a particular user,the particular user can submit biometric data from the phone terminal120 or another device (e.g., a phone terminal with a headset, acomputer, television remote control etc.) (not illustrated). Suchinformation may be sent over the network 140, and received at the dataprocessing system 160. Alternatively, biometric information can becollected by other means for some applications that require the highestlevel of confidentiality. Within the data processing system 160, suchinformation is received at the I/O port 162 and forwarded to the CPU164. The CPU 164 can send such information to be stored to the storagedevice 170 via the storage module 168 of the access module 166. Otherdata for the particular user, including a user identification, anoptional password, one or more configuration files, other userinformation, or any combination thereof, can be stored in the storagedevice 170 using a similar process. In one particular embodiment, suchinformation (or references or pointers to at least portions of suchinformation) may reside in one or more database tables, wherein eachtuple in the table(s) is associated with a particular user.

At a later time, the phone handset 126 can use the biometric data inputdevice 128 to collect biometric data from a particular user at the phoneterminal 120. Such biometric data, and potentially other informationfrom the particular user at the phone terminal 120 can be sent to thedata processing system 160 via the network 140. At the data processingsystem, the biometric data and potentially other information is receivedby the CPU 164 via the I/O port 162. The CPU can access the particularuser's previously stored information in the storage device 170 via theconfiguration retrieval module 172 to confirm the identification of theparticular user. If the identification matches, one or moreconfiguration files from the storage device 170 can be forwarded to theconfiguration module 176 via the CPU 164. The configuration module 176may configure the phone terminal 120 or another part of the phone system100, which may or may not include another part of the data processingsystem 160 (i.e., outside the configuration module 176), for theparticular user. The configuration may affect hardware, software,firmware, or any combination thereof.

The rendering module 174 is optional and may be used to render orotherwise process information that is to be displayed or otherwisepresented to the particular user at the phone terminal 120. Therendering or other processing of data may be performed in a mannerconsistent with the user's configuration file.

Functions performed by any one or more of the modules described abovemay be combined with one or more other modules. For example, the phonehandset 126 module can perform the functions of the biometric data inputdevice 128 if the biometric data includes a voice pattern, the functionsof the configuration module 132 may be combined into the CPU 124, or thefunctions of the rendering module 174 may be combined into the CPU 164.In another embodiment, only one of the configuration module 132 or therendering module 174 may be used. Additionally, any one or more of themodules may be embodied in another portion (not illustrated) of thephone system 100 of FIG. 1. In still another embodiment, any singlemodule may be embedded within a plurality of integrated circuits, chipsets, circuit boards, or the like. Additionally, a software program orits software components with such code may be embodied in more than onedata processing system readable medium in more than one computer orother item having a CPU.

Portions of the methods described herein may be implemented in softwarecode for carrying out the Methods described. In one embodiment, thecomputer-executable instructions may be lines of assembly code orcompiled C⁺⁺, Java®, or other language code. In another embodiment, thecode may be contained on a data storage device, such as a hard disk,magnetic tape, floppy diskette, optical storage device, networkedstorage device(s), or other appropriate data processing system readablemedium or storage device.

FIG. 2 includes a flow diagram of an exemplary, non-limiting embodimentfor using the phone system 100. The method can include saving theconfiguration file and biometric data associated with the user, at block222. The configuration file and biometric data may be stored within thestorage device 130, storage device 170, another storage device, or anycombination thereof. Additionally, user information can be saved at thisor another time. Such information can be used at a later time to confirmthe identity of a particular user, locate one or more configurationfiles associated with that particular user, or any combination thereof.

The method can also include receiving biometric data at the phoneterminal 120 from a first user, at block 242. In one embodiment, thebiometric data can be received at the biometric data input device 128 ofthe phone terminal 120. The actual data and action required for thebiometric data input will depend on the type of biometric data used bythe phone system, as described herein.

The method can further include determining that the received biometricdata is sufficiently close to the saved biometric data, at block 262. Inone embodiment, the determination may be performed by the CPU 124 or theCPU 164. Using conventional statistical methods, processing can beperformed to allow some deviation between the stored biometric data andthe received biometric data. However, such statistical methods may havea sufficiently high confidence level such that each particular user atthe phone terminal 120 can be uniquely identified.

The method can further include using the retrieved or saved biometricdata to locate a configuration file associated with the user, at block282. The CPU 124, storage device 130, the CPU 164, the access module 166(and more particularly, the configuration retrieval module 172), thestorage device 170, or any combination thereof may include sufficientlogic for locating a user's configuration file. Such information may bestored in one or more tables within a database in storage device 130 or170. After the configuration file is retrieved, the configuration filecan be used by the CPU 124, the CPU 164, the rendering module 174, orany combination thereof in order to process information consistent withthe user's configuration file. If the data processing system 160processes the data, such data can then be forwarded to the phoneterminal 120 via the network 140. In another embodiment, more than oneconfiguration file may be used.

The method can also include configuring the phone terminal 120 oranother part of the phone system 100, such as the data processingsystem, 160, consistent with the configuration file, at block 284. Theactual configuration can be highly flexible based on the user'sconfiguration file. In one embodiment, the configuration may affect thephone terminal 120, the data processing system 160, or a combinationthereof.

In a particular embodiment, the configuration may activate a service ormake the service available to the user of the phone terminal 120. Forexample, such services may include calling features and dialing plansranging from ring tones, caller-identification information, callforwarding number, number of rings before call is forwarded, ability tomake calls to certain numbers (e.g. international dialing, 900 numbers),speed dial lists, preference for long distance provider, quality ofservice, other suitable service, or any combination thereof.

In another particular embodiment, configuration can include displayingor making information available to the user at the phone terminal 120.Such display or other information can include presence information orspecial icons associated with specific contacts on a contact list,customized names for caller identification delivery, etc. If the userhas a visual impairment, the display can be configured to meet the fontsize, color, contrast, etc. customized for the user. In anotherembodiment, the display may be configured for use a screen saver desiredby the user. In addition, configuration could include access to personalphone books stored over the network, thus enabling the customer to makea call from a new location even if he or she does not remember thenumber.

In more particular embodiment, the rendering module 174 in the dataprocessing system 160 renders information in a manner consistent withthe configuration file and forwards the rendered information to the CPU164. The CPU 164 sends the rendered information to the I/O port 162 thattransmits the rendered information to the phone terminal 120 via thenetwork 140. In another embodiment, the configuration module 132 can beused by the CPU 124 in configuring the display 134 in a mannerconsistent with the configuration module. The information that isgenerated by the CPU 124 or received by the CPU 124 (from the dataprocessing system 160) is transmitted to the display 134 of the phoneterminal 120.

The configuration file allows the user to significantly change theservice or information (content) at or available to a phone terminal 120to improve the customer experience when using the phone terminal 120.The services activated or made available, how such information isdisplayed (presentation), or a combination thereof at the phone terminal120, can be different as compared to a prior user at the same phoneterminal 120. The phone terminal 120 may be shared by many people, yet,it can be configured to act in a manner similar to a particular user'sphone at the user's home or office. Effectively, the method can be usedto personalize the phone terminal 120 for different users.

Note that this configuration customized for a particular user issignificantly more than merely changing a name displayed of a userwithin a fixed template.

The use of biometric data is not limited to phone terminalconfigurations. Some phone calls may require the transmission ofsensitive information. In these instances, the calling party needs ordesires that the identification of the called party be confirmed beforethe transmission of the sensitive information. FIG. 3 includes a blockdiagram of a phone system that can be used to confirm the identificationof the calling party, the called party, or any other partiesparticipating in a phone call. The phone system includes a phoneterminal 300 that is bi-directionally coupled to a network 320 that isbi-directionally coupled to a data processing system 340. The dataprocessing system 340 is bi-directionally coupled to a network 360 thatis bi-directionally coupled to a phone terminal 380. Note that thenetworks 320 and 360 may be the same or different. In a particularembodiment, the phone system can be part of one or more packet-switchednetworks that use Voice over Internet Protocol (“VoIP”).

The telephone terminals 300 and 380 may be of the same type or differenttypes. In one embodiment, the phone terminals 300 and 380 each includesubstantially the same components. The phone terminals 300 and 380 eachinclude a CPU 304 that is bi-directionally coupled to an I/O port 302, aphone handset 306, and a biometric data input device 308. The I/O port302 of the phone terminal 300 is configured to receive a networkconnection from the network 320, and the I/O port 302 of phone terminal380 is configured to receive a network connection from the network 360.Each of the I/O port 302, CPU 304, phone handset 306, and biometric datainput device 308 can be any of the types as described herein withrespect to the I/O port 122, CPU 124, phone handset 126, and biometricdata input device 128, respectively, in FIG. 1.

The data processing system 340 includes an I/O port 342 that isconfigured to receive a network connection from the network 320 andanother I/O port 352 configured to receive a network connection from thenetwork 360. In another embodiment, the same I/O port may be connectedto a network that is coupled to the phone terminals 300 and 380. Thedata processing system 340 further includes a CPU 344 that isbi-directionally coupled to the I/O port 342, the I/O port 352, anaccess module 346, and a comparison module 348. The access module 346 isbi-directionally coupled to a storage device 350.

The I/O ports 342 and 352 can be any of the types as described hereinwith respect to the I/O port 162 in FIG. 1. The CPU 344, the accessmodule 346, and the storage device 350 can be any of the types describedherein with respect to the CPU 164, access module 166, and storagedevice 170, respectively, in FIG. 1.

The comparison module 348 can be used in comparing biometric datapreviously stored within storage device 350 with biometric data receivedfrom a user at the phone terminal 300, phone terminal 380, or one ormore other phone terminals coupled to the data processing system 340.The comparison module 348 may also compare a password input by a user toa password stored within the storage device 350. Additional userinformation that can be used for authenticating the identification of auser may be received by the data processing system 340 and comparedwithin the comparison module 348 with information previously receivedthat is stored in storage device 350. The comparison module 348 canproduce an output that is transmitted to the CPU 344 to notify the CPU344 whether the identification of the user at the phone terminal 300,phone terminal 380, one or more other phone terminals, or anycombination thereof has been substantially confirmed. The CPU 344 hasappropriate logic for disposition of a phone call based on whether theidentification has been substantially confirmed or is not substantiallyconfirmed.

FIG. 4 includes a flow diagram for a method of using the phone systemillustrated in FIG. 3. The method can include receiving biometric datafrom the calling party at the phone terminal 300, at block 402. In oneembodiment, a user can pick up the phone handset 306 or otherwiseactivate the phone terminal 300 (e.g., push a button, swipe a creditcard, smart card, or other card, insert money, etc.) that sends a signalto CPU 304 to activate the biometric data input device 308. The callingparty can then input biometric data into the biometric data input device308 at the phone terminal 300.

The method can also include comparing the biometric data received fromthe calling party (at the phone terminal 300) to other biometric dataassociated with the calling party to substantially confirm the identityof the calling party, at block 404. In one embodiment, data input by theuser at the phone terminal 300 can be compared to data previously storedwithin the storage device 354 for that same user. Alternatively, astorage device (not illustrated) within phone terminal 300 may includeinformation that can be used to confirm the identity of the callingparty. The comparison may be performed within the phone terminal 300, ormay occur within the data processing system 340, or within otherequipment. In one embodiment where the comparison is performed by thedata processing system 340, the biometric data or other user informationreceived from the user at the phone terminal 300 can be received at theCPU 344, via the I/O port 342, and can be forwarded to the comparisonmodule 348. Based on the user identification, the CPU 344 can retrieveuser information from the storage device 350, via access module 346, toretrieve appropriate information for the user. Such information can beforwarded from the CPU 344 to the comparison module 348. The comparisonmodule 348 can perform a comparison similar to the comparison describedwith respect to FIG. 1 to confirm whether the calling party has beenauthenticated or otherwise had his or her identity confirmed. Aconventional statistical method can be used when comparing the saved andreceived biometric data from the user at the phone terminal 300.

The method can further include receiving a call signal from a callingparty to the called party, at block 422. In one embodiment, the callsignal can be transmitted from the phone terminal 300 to the dataprocessing system 340 via the network 320. The data processing system340 can then transmit the call signal to the phone terminal 380 via thenetwork 360.

The method can still further include receiving biometric data associatedwith the called party, at block 442. In one embodiment, a user at thephone terminal 380 can pick up the handset 306 or otherwise activate thephone terminal 380. The user at the phone terminal 380 can then inputhis or her biometric data into the biometric input device 308 of thephone terminal 380. Such biometric data can then be sent from the phoneterminal 380 to the data processing system 340 via network 360.

The method can include comparing the biometric data received from thecalled party to other biometric data associated with the called party tosubstantially confirm the identity of the called party, at block 444. Inone embodiment, data input by the user at the phone terminal 300 can becompared to data previously stored within the storage device 354 forthat same user. Alternatively, a storage device (not illustrated) withinphone terminal 300 may include information that can be used to confirmthe identity of the calling party. The comparison may be performedwithin the phone terminal 300, within data processing system 340, orwithin other equipment. In one embodiment where the comparison isperformed by the data processing system 340, the biometric data or otheruser information received from the user at the phone terminal 380 can bereceived at the CPU 344, via the I/O port 352, and can be forwarded tothe comparison module 348. Based on the user identification, the CPU 344can retrieve user information from the storage device 350, via theaccess module 346. Such information can be forwarded from the CPU 344 tothe comparison module 348. The comparison module 348 can perform acomparison similar to the comparison described with respect to FIG. 1 toconfirm whether the called party has been authenticated or otherwise hadhis or her identity confirmed. A conventional statistical method can beused when comparing the saved and received biometric data from the userat the phone terminal 300.

If the identification of the called party has been authenticated orotherwise confirmed, the method can include notifying the calling partythat the identity of the called party has been confirmed, at block 462.In one embodiment, the notification can include merely completing theconnection of the telephone call by allowing the calling party at thephone terminal 300 to communicate with the called party at the phoneterminal 380. In another embodiment, a recorded message can be playedthat would be heard by the calling party (at the phone terminal 300)that the identity of the called party (at the phone terminal 380) hasbeen authenticated or otherwise confirmed. In still another embodiment,the called party (at the phone terminal 380) could receive notificationthat the identification of the calling party (at the phone terminal 300)has been authenticated or otherwise confirmed. In yet a furtherembodiment, after the identity of the called party (at the phoneterminal 380) has been authenticated or otherwise confirmed, the calledparty (at the phone terminal 380) can request that the identity of thecalling party (at the phone terminal 300) be authenticated or otherwiseconfirmed, if this has not already been done.

If the identification of the called party is not authenticated orotherwise confirmed, the calling party (at the phone terminal 300), thecalled party (at the phone terminal 380), or both may be notified thatthe identification of the called party could not be authenticated orotherwise confirmed. Such notification can occur by not completing thetelephone connection, or by sending a recorded message to the callingparty, the called party, or both that such identification was notauthenticated or otherwise confirmed.

The phone system and methods for confirming the identification of acalling party, a called party, one or more additional parties, or anycombination thereof can allow parties on a phone call to verify that theperson that they are talking to is the person to which they intend tospeak. In this manner, sensitive information can be transmitted with areduced likelihood of unintentionally or accidentally transmitting suchsensitive information to recipients that should not receive suchsensitive information.

Note that not all of the activities described above in the generaldescription or the examples are required, that a portion of a specificactivity may not be required, and that one or more further activitiesmay be performed in addition to those described. Still further, theorder in which activities are listed are not necessarily the order inwhich they are performed. After reading this specification, skilledartisans will be capable of determining what activities can be used fortheir specific needs or desires.

Any one or more benefits, one or more other advantages, one or moresolutions to one or more problems, or any combination thereof have beendescribed above with regard to one or more particular embodiments.However, the benefit(s), advantage(s), solution(s) to problem(s), or anyelement(s) that may cause any benefit, advantage, or solution to occuror become more pronounced is not to be construed as a critical,required, or essential feature or element of any or all of the claims.

The above-disclosed subject matter is to be considered illustrative, andnot restrictive, and the appended claims are intended to cover all suchmodifications, enhancements, and other embodiments, which fall withinthe scope of the present invention. Thus, to the maximum extent allowedby law, the scope of the present invention is to be determined by thebroadest permissible interpretation of the following claims and theirequivalents, and shall not be restricted or limited by the foregoingdetailed description.

What is claimed is:
 1. A set-top box device comprising: a processor; anda memory accessible to the processor, the memory including instructionsthat, when executed by the processor, cause the processor to performoperations comprising: in response to an activation event, sendinginformation to a biometric input device to activate the biometric inputdevice wherein the activation event includes activation of a phoneterminal communicatively coupled to the processor; receiving biometricdata corresponding to a particular user from the biometric input device;determining whether an identification of the particular user matches thebiometric data; and in response to determining that the identificationof the particular user matches the biometric data, providing a serviceto a device associated with the particular user.
 2. The set-top boxdevice of claim 1, wherein the phone terminal is activated by lifting ahandset of the phone terminal.
 3. The set-top box device of claim 1,wherein the phone terminal is activated by inserting a card into thephone terminal.
 4. The set-top box device of claim 1, wherein thebiometric data includes voice input data, a fingerprint, an iris scan,or a combination thereof.
 5. The set-top box device of claim 1, whereindetermining whether the identification of the particular user matchesthe biometric data is based on a comparison of the biometric data tosecond biometric data previously provided by the particular user.
 6. Theset-top box device of claim 1, wherein the service includes connecting acall, call forwarding, or a combination thereof.
 7. The set-top boxdevice of claim 1, wherein the service includes providing calleridentification information, providing speed dial information,customizing ring tones, or a combination thereof.
 8. The set-top boxdevice of claim 1, wherein providing the service includes enabling acommunication connection with a second device.
 9. The set-top box deviceof claim 1, wherein the operations further comprise, in response todetermining that the identification of the particular user matches thebiometric data, locating a configuration file associated with theparticular user.
 10. The set-top box device of claim 9, wherein thememory further includes a plurality of configuration files including theconfiguration file, and wherein each of the plurality of configurationfiles is associated with one of a plurality of users.
 11. The set-topbox device of claim 9, wherein the configuration file includes apersonal phone book of the particular user.
 12. The set-top box deviceof claim 9, wherein the configuration file includes information toprovide the service to the device.
 13. A method comprising: receiving,at a set-top box device, biometric data of a particular user from abiometric input device that has been activated, wherein the biometricinput device is activated by the set-top box device in response to anactivation event wherein the activation event includes activation of aphone terminal communicatively coupled to the set-top box device;determining whether an identification of the particular user matches thebiometric data; and in response to determining that the identificationof the particular user matches the biometric data, providing a serviceto a communication device associated with the particular user.
 14. Themethod of claim 13, wherein the set-top box device is coupled to adisplay device and is configured to cause the display device to presentinformation associated with the particular user based on a configurationfile.
 15. The method of claim 13, wherein the communication device is amobile phone.
 16. A computer-readable storage device comprisinginstructions that, when executed by a processor, cause the processor toperform operations comprising: receiving, at a sat-top box device,biometric data of a particular user from a biometric input device,wherein the biometric input device is activated by the set-top boxdevice in response to an activation event wherein the activation eventincludes activation of a phone terminal communicatively coupled to theset-top box device; determining whether an identification of theparticular user matches the biometric data; and in response todetermining that the identification matches the biometric data,providing a communication service.
 17. The computer-readable storagedevice of claim 16, wherein the communication service is provided to amobile phone associated with the particular user.
 18. Thecomputer-readable storage device of claim 16, wherein providing thecommunication service includes enabling a connection with a secondcommunication device.
 19. The computer-readable storage device of claim16, wherein providing the communication service includes connecting acall with a second communication device.