System and method for authenticating transmission and receipt of electronic information

ABSTRACT

A communication system (10 and 100) is provided with a verification mechanism (16) to identify both the sender and recipient of electronic information (20). Input devices (12) in cooperation with verification mechanism (16) may be used to confirm the identity and authority of a sender to place electronic information (20) on communications network (14). Output devices (18) in cooperation with verification mechanism (16) may be used to confirm the identity and authority of a recipient of electronic information (20). Verification mechanism (16) and communication network (14) may also provide the sender and the recipient with an automatic date time stamp for delivery of electronic information (20).

TECHNICAL FIELD OF THE INVENTION

This invention relates in general to the field of electronic information exchange and more particularly to an improved system and method for confirming transmission and receipt of information by authorized parties.

BACKGROUND OF THE INVENTION

Users of electronic information transfer are frequently unable to control access to their transmission systems, to verify the data they send is received, when it was received, and whether it was received by an authorized person. Likewise, a recipient of electronic information is frequently unable to verify that the data they receive was sent by an authorized person or control access to the data sent to them. An electronic data interchange is one example of electronic information transfer and includes, but is not limited to facsimile transmissions, money transfers, modem transfers, security exchanges, electronic mail (E-mail), and government "secured" systems.

Systems heretofore known have allowed for transmission and receipt of electronic information, but provide no means of verifying time of receipt or the identity of the person sending or receiving the electronic information or controlling access to the systems. For example, with current facsimile technology the sender receives verification that a number of pages were transmitted to a given telephone number. The sender does not know who is physically receiving the facsimile at the other end. Likewise, the recipient of a facsimile does not know who the sender is, other than a sending telephone number and perhaps a "name" associated with the sending facsimile machine. Additionally, organizations utilizing facsimile systems for communication would like to control and limit access to their systems. The current extensive use of facsimile transmissions during contract negotiations or for sales orders, sometimes involving millions of dollars, gives rise for a need for a better system for controlling access to facsimile machines, for verifying who sent the facsimile, who received the facsimile, and providing a time-stamp for transmission and receipt of the facsimile.

Therefore, a longfelt need has arisen for a system and method which provides controlled access and confirmation of transmission and receipt of electronic information by authorized parties.

SUMMARY OF THE INVENTION

In accordance with the present invention, a system is provided which substantially eliminates or reduces disadvantages and problems associated with prior electronic information transfer systems.

According to one aspect of the invention, there is provided a system for controlling access and authenticating the transmission of electronic information. The system includes a verification mechanism and a secure storage medium with templates. Once the identity of the sender is verified by the verification mechanism, the electronic information is transmitted. More specifically, the present invention's secure storage medium is a data base which includes spoken voice and/or written signature templates for verification. More specifically, the present invention provides the sender with an automatic time stamp of receipt by the recipient of electronic information. More specifically, the present invention allows controlled access at the receiving end of the electronic information transfer by requiring identity verification of the recipient prior to receiving the electronic information.

The technical advantages of the invention include a system which (1) ensures only authorized users send and receive electronic information transmissions; (2) validates receipt of the electronic information to the sender with a time stamp; and (3) authenticates to the receiver that the sender was authorized to make the electronic information transmission.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings in which the reference numbers indicate like features and wherein:

FIG. 1 illustrates one embodiment of the present invention where identification and verification on sender's side only is provided during transmission of electronic information; and

FIG. 2 illustrates another embodiment of the present invention using identification and verification of both the sender and receiver along with storage and retrieval capabilities during transmission of electronic information.

DETAILED DESCRIPTION OF THE INVENTION

The preferred embodiments of the present invention are illustrated in FIGS. 1 and 2 of the drawings, like numerals being used to refer to like and corresponding parts of the various drawings.

This invention provides system 10 shown in FIG. 1 and System 100 shown in FIG. 2 for controlling access to and for authenticating the transmission of electronic information. Verification of the identity of senders and recipients of electronic information on a communication network are accomplished by spoken voice and/or written signature. Controlled access is provided for both sending and receiving electronic information.

One embodiment of the present invention as shown in FIG. 1, includes a plurality of input devices 12. Input devices 12 are connected to a communication network 14 and to a verification mechanism 16. The verification mechanism 16 is also connected directly to the communication network 14 by a verification signal 24. The verification mechanism 16 is also connected to a secure storage 17. Communication network 14 is connected to a plurality of output devices 18.

Communication network 14 may include all or part of the following communication systems and networks--telephone lines and telephone cables, fiber optic cables, microwave communication systems, satellite communication systems, wireless PBX systems within buildings, cellular telephones, and other commercial radio transmission systems. Input devices 12 and output devices 18 may include telephones, facsimile machines, modems, radio transmitters and radio receivers, teletype machines, and other transmitters and receivers of electromagnetic radiation.

The input devices 12 have an interface for accepting electronic information 20. This interface may be provided by a telephone, personal computer, modem, computer terminal, facsimile machine or any other equipment for inputting electronic information with communication network 14. Input devices 12 also include an interface for accepting identification information 22. The identification information 22 may be in the form of a spoken voice or a written signature. Spoken voice information may be inputted by a microphone and digital signal processor (not shown). Written signature information would be placed into input device 12 with a document scanner (not shown).

Once the electronic information 20 and identification information 22 are inputted into input device 12, electronic information 20 is held by communication network 14 while identification information 22 is sent to verification mechanism 16. The electronic information 20 now in communication network 14 cannot be sent until the identity of the sender at the respective input device 12 has been verified by verification mechanism 16.

Verification mechanism 16 has the capability to verify the identity of the user at the respective input device 12 by the user's spoken voice or written signature. By previously storing the user's spoken voice or written signature in the form of a template in secured storage 17, verification mechanism 16 can compare the user's contemporaneous spoken voice or written signature identification information 22 with that which has previously been placed in secured storage 17.

Equipment satisfactory for use as verification mechanism 16 is available from Texas Instruments Incorporated located in Dallas, Tex. Such equipment is referred to as the Multiserve™ Media Server which includes Texas Instruments Incorporated's digital signal processor TMS320Z300, electrical and software interfaces for processing both voice and facsimile messaging, and mass storage capabilities appropriate for use with the present invention. The Multiserve™ platform contains a Media Server which has speech recognition and speaker verification capabilities. Therefore, by using the Multiserve™ Media Server or similar equipment as the verification mechanism 16, voice verification of the sender occurs and verification signal 24 will be sent to the communication network 14 allowing the electronic information 20 to be transferred to the appropriate output device 18.

For signature verification, the verification mechanism 16 will preferably include a general purpose computer and associated memory unit with sample signatures. The general purpose computer will have written signature recognition and verification capabilities. Therefore, by using facsimile euipment as an input to verification mechanism 16, signature verification of the sender occurs and a verification signal 24 will be sent to the communication network 14 allowing the electronic information 20 to be transferred to the appropriate output device 18.

The verification mechanism 16 may also be programmed to respond to both spoken voice and written signature verification. In this operation, both the Multiserve™ Media Server and a general purpose computer would be used in combination to form the verification mechanism 16. The sender would be required to provide both spoken voice and written signature as identification information 22 at input device 12. Once both the voice and signature of the sender are verified, verification signal 24 will be sent to communication network 14 allowing electronic information 20 to be transferred to the appropriate output device 18.

Communication network 14 could be any common medium of transmission for electronic data which could include, but is not limited to, telephone systems, fiber optic networks, computer networks, cellular telephone networks, radio transmission networks, microwave transmission networks, satellite systems or as yet to be defined communication networks.

The secure storage 17 would be an electronic database, tape storage, CD ROM, or other means of storing voice and signature templates. Output devices 18 may be equivalent to input devices 12 in system 10 shown in FIG. 1. Output devices 18 have the ability to produce electronic information 20. System 10 will support a plurality of output devices 18.

During operation of system 10, access to input devices 12 within an organization or company may be controlled by the verification mechanism 16. In order to send electronic information 20, the sender at the input device 12 would be required to provide identification information 22 by speaking into input device 12 or providing a written signature into input device 12 or both. As a prerequisite for using system 10, each sender will have to have previously placed their unique, individual identification information 22, voice and/or signature samples, in verification mechanism 16, so that the appropriate template may be stored in secured storage 17. Electronic information 20 will be held within communication network 14 until the identification of the sender had been verified by verification mechanism 16. Once the identification of the sender has been established, authorization for the transmission of the electronic information 20 will be sent by verification signal 24 to communication network 14.

In another embodiment of the present invention shown as system 100 in FIG. 2, a plurality of input devices 12 and output devices 18 are provided in the same manner as system 10 of FIG. 1. In system 100, output devices 18 also provide controlled access to electronic information 20 that has been placed on communication network 14. In system 100, before a recipient can receive electronic information 20 from output device 18, the recipient must also provide verification information to verification mechanism 16. This verification information may be either spoken voice, written signature or both in the same manner as described for system 10 of FIG. 1. The identification information 22 will be processed by the verification mechanism 16. Once verification mechanism 16 has verified the identity of the recipient of electronic information 20, a verification or authorization to receive signal 26 will be sent to the communication network 14 where electronic information 20 has been held, and electronic information 20 will then be made available at the respective output device 18.

In both embodiments of the present invention, the communication network 14 has the ability to store in secured storage 17 a time stamp of the transmission of the electronic information 20 from the sender to the recipient. Secured storage 17 also contains information on the identity of all input devices 10 and output devices 18 within communication network 14.

The advantage of the invention is a communication system which insures only authorized persons send and receive transmissions of electronic information, validates the sender with a time stamp, and authenticates to the sender and recipient that each party is authorized to make and receive an electronic information transmission.

Although the present invention has been described in detail, it should be understood that various changes, substitutions and alterations can be made hereto without departing from the spirit and scope of the invention so defined by the appended claims. 

What is claimed is:
 1. A system for authenticating the transmission of electronic information, comprising:a plurality of input devices for accepting electronic information and sender's identification information; a verification mechanism for verifying the sender and a recipient; a secure storage with templates, said secure storage having a time-stamp of transmission of electronic information transfer; a communication network for transmitting the electronic information; a transmission verification signal to said communication network; a receipt verification signal to said communication network; and a plurality of output devices for receiving the electronic information and accepting recipient identification information.
 2. The system of claim 1, wherein said input and output devices accept spoken voice identification information.
 3. The system of claim 2, wherein said verification mechanism comprises a voice recognition system.
 4. The system of claim 2, wherein said secure medium of storage comprises spoken voice templates.
 5. The system of claim 1, wherein said input and output devices accept written signature identification information.
 6. The system of claim 5, wherein said verification mechanism comprises a signature recognition system.
 7. The system of claim 5, wherein said secure medium of storage comprises written signature templates.
 8. The system of claim 1, wherein said input and output devices accept spoken voice and written signature identification information.
 9. The system of claim 8, wherein said verification mechanism comprises a voice and signature recognition system.
 10. The system of claim 8, wherein said secure medium of storage comprises spoken voice and written signature templates.
 11. The system of claim 1, wherein said communication network automatically sends the time-stamp of the transmission of the electronic information to the recipient.
 12. A method for authenticating the transmission of electronic information, comprising the steps of;inputting electronic information and the sender's identification information; verifying the sender of the electronic information; storing identification information; transmitting the electronic information on a communication network; providing a transmission verification signal to said communication network; inputting the recipient's identification information; providing a receipt verification signal to said communication network; outputting the electronic information; and providing automatically a time-stamp of the transmission of the electronic information transfer to the sender.
 13. The method of claim 12, further comprising the step of inputting the sender's and recipient's spoken voice identification information.
 14. The method of claim 13, further comprising the step of verifying the spoken voices of the sender and recipient.
 15. The method of claim 13, further comprising the step of storing spoken voice identification templates.
 16. The method of claim 12, further comprising the step of inputting the sender's and recipient's written signature identification information.
 17. The method of claim 16, further comprising the step of verifying the written signature of the sender and recipient.
 18. The method of claim 16, further comprising the step of storing the written signature identification templates.
 19. The method of claim 12, further comprising the step of inputting the sender's and recipient's spoken voice and written signature identification information.
 20. The method of claim 19, further comprising the step of verifying the spoken voice and written signature of the sender and recipient.
 21. The method of claim 19, further comprising the step of storing the spoken voice and written signature identification templates.
 22. The method of claim 12, further comprising the step of storing the time-stamp of the transmission of the electronic information transfer.
 23. The method of claim 22, further comprising the step of transmitting the time-stamp of the electronic information transfer to the sender automatically. 