白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Variable-step authentication for communications in controlled environment

專利號(hào)
US11997081B2
公開(kāi)日期
2024-05-28
申請(qǐng)人
Global Tel*Link Corporation(US VA Reston)
發(fā)明人
Stephen L. Hodge
IPC分類
G06F21/00; G06Q20/38; G06Q20/40; H04L9/40; H04W12/06
技術(shù)領(lǐng)域
trust,inmate,in,server,subsystem,sms,or,be,step,as
地域: VA VA Reston

摘要

A variable-step authentication system and a method for operating for performing variable-step authentication for communications in a controlled environment is disclosed. The variable-step authentication system may include a communication device and a server. The variable-step method includes steps for determining an authentication process that involves a number of authentication steps. The number of authentication steps is variable and dependent on a trust level associated with each participant in the communication.

說(shuō)明書(shū)

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. Nonprovisional patent application Ser. No. 16/892,798, filed on Jun. 4, 2020, which is a continuation of U.S. Nonprovisional patent application Ser. No. 15/788,543, filed on Oct. 19, 2017, now U.S. Pat. No. 10,728,240, issued Jul. 28, 2020.

BACKGROUND Field

This disclosure relates to enforcing security protocols in communications involving persons within a controlled environment through the use of variable-step authentication for each participating involved in the communications.

Background

Communications involving individuals in a controlled environment are generally subject to security protocols to verify that the communications can take place. These security protocols typically will include some form of authentication of each participant in the call including the individual in the controlled environment. Conventionally, this authentication comprises a single step regardless of the participants in the call and such a step is static such that the same authentication step is performed for subsequent calls. Employing a single step as part of the authentication for such communications is risky as the security protocol can be easily circumvented by diabolically enterprising participants.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

權(quán)利要求

1
What is claimed is:1. A method for variable-step authentication at a server, comprising:receiving, from a first communication device associated with a first participant, a request for a communication session involving the first communication device in a controlled environment and a second communication device located outside of the controlled environment, wherein the second communication device is associated with a second participant;determining a first trust level of the first participant, wherein the first trust level indicates a first number of authentication steps to be successfully verified in order for the first participant to participate in the communication session;determining a second trust level of the second participant, wherein the second trust level indicates a second number of authentication steps to be successfully verified in order for the second participant to participate in the communication session;transmitting, by the server to the first communication device, a first authentication procedure, wherein the first authentication procedure is generated based on the first trust level, and wherein a first authentication step of the first number of authentication steps comprises a first type of authentication step and a second authentication step of the first number of authentication steps comprises a second type of authentication step;transmitting, by the server to the second communication device, a second authentication procedure, wherein the second authentication procedure is generated based on the second trust level; andpermitting communications over the communication session between the first communication device and the second communication device upon successful verification of responses to the first authentication procedure and the second authentication procedure.2. The method of claim 1, wherein the first authentication procedure includes the first number of authentication steps indicated by the first trust level and the second authentication procedure includes the second number of authentication steps indicated by the second trust level.3. The method of claim 1, further comprising:receiving, from the first communication device, responses to the first authentication procedure; andverifying the responses prior to establishing the communication session.4. The method of claim 3, wherein the first authentication procedure comprises the first authentication step and the second authentication step, and wherein receiving the responses to the first authentication procedure includes:receiving a first response to the first authentication step; andreceiving a second response to the second authentication step.5. The method of claim 1, wherein the first number of authentication steps is different from the second number of authentication steps.6. The method of claim 1, wherein the communication session includes a real-time communication.7. The method of claim 6, further comprising:establishing, by the server, the communication session between the first communication device and the second communication device, wherein the first authentication procedure and the second authentication procedure are transmitted over the communication; andpreventing, by the server, other communications from being transmitted over the communication session until the server successfully verifies the responses to the first authentication procedure and the second authentication procedure.8. The method of claim 6, wherein the real-time communication is one of a telephone call, a video conference call, or a conference call.9. A server for performing variable-step authentication, comprising:a memory; anda processor coupled to the memory, the processor configured to:receive, from a first communication device associated with a first participant, a request for a communication session involving the second communication device in a controlled environment and a first communication device located outside of the controlled environment, wherein the second communication device is associated with a second participant;determine a first trust level of the first participant, wherein the first trust level indicates a first number of authentication steps to be successfully verified in order for the first participant to participate in the communication session;determine a second trust level of the second participant, wherein the second trust level indicates a second number of authentication steps to be successfully verified in order for the second participant to participate in the communication session;transmit, by the server to the first communication device, a first authentication procedure, wherein the first authentication procedure is generated based on the first trust level, and wherein a first authentication step of the first number of authentication steps comprises a first type of authentication step and a second authentication step of the first number of authentication steps comprises a second type of authentication step;transmit, by the server to the second communication device, a second authentication procedure, wherein the second authentication procedure is generated based on the second trust level; andpermit communications over the communication session between the first communication device and the second communication device upon successful verification of responses to the first authentication procedure and the second authentication procedure.10. The server of claim 9, wherein the first authentication procedure includes the first number of authentication steps indicated by the first trust level and the second authentication procedure includes the second number of authentication steps indicated by the second trust level.11. The server of claim 9, wherein the processor is further configured to:receive, from the first communication device, responses to the first authentication procedure; andverify the responses prior to establishing the communication session.12. The server of claim 11, wherein the first authentication procedure comprises the first authentication step and the second authentication step, and in receiving the responses to the first authentication procedure, the processor is further configured to:receive a first response to the first authentication step; andreceive a second response to the second authentication step.13. The server of claim 9, wherein the first number of authentication steps is different from the second number of authentication steps.14. The server of claim 9, wherein the communications are real-time communications.15. The server of claim 14, wherein the processor is further configured to:establish, by the server, the communication session between the first communication device and the second communication device, wherein the first authentication procedure and the second authentication procedure are transmitted over the communication session; andprevent, by the server, other communications from being transmitted over the communication session until the server successfully verifies the responses to the first authentication procedure and the second authentication procedure.16. A non-transitory computer-readable medium having instructions stored therein, which when executed by a processor in a monitoring center of a controlled environment cause the processor to perform operations, the operations comprising:receiving, at a server from a first communication device associated with a first participant, a request for a communication session involving the first communication device in the controlled environment and a second communication device located outside of the controlled environment, wherein the second communication device is associated with a second participant;determining a first trust level of the first participant, wherein the first trust level indicates a first number of authentication steps to be successfully verified in order for the first participant to participate in the communication session;determining a second trust level of the second participant, wherein the second trust level indicates a second number of authentication steps to be successfully verified in order for the second participant to participate in the communication session;transmitting, by the server to the first communication device, a first authentication procedure, wherein the first authentication procedure is generated based on the first trust level, wherein a first authentication step of the first number of authentication steps comprises a first type of authentication step and a second authentication step of the first number of authentication steps comprises a second type of authentication step;transmitting, by the server to the second communication device, a second authentication procedure, wherein the second authentication procedure is generated based on the second trust level; andpermitting communications over the communication session between the first communication device and the second communication device upon successful verification of responses to the first authentication procedure and the second authentication procedure.17. The non-transitory computer-readable medium of claim 16, wherein the first authentication procedure includes the first number of authentication steps indicated by the first trust level and the second authentication procedure includes the second number of authentication steps indicated by the second trust level.18. The non-transitory computer-readable medium of claim 16, the operations further comprising:receiving, from the first communication device, responses to the first authentication procedure; andverifying the responses prior to establishing the communication session.19. The method of claim 1, wherein the first type of authentication step and the second type of authentication step are different from each other and wherein the first type of authentication step and the second type of authentication step comprise one of a username/password challenge, an SMS response challenge, a challenge question, an email response challenge, and a biometric challenge.20. The method of claim 1, wherein steps of the first number of authentication steps are randomly selected to be included in the first authentication procedure.
微信群二維碼
意見(jiàn)反饋