Computer telephony system to access secure resources
First Claim
1. An apparatus for interacting with a secure resource accessible through a telephone system of the type that provides telephone access through a plurality of extensions, comprising:
- a security server having an interface for sending messages to said telephone system, said messages being adapted to provide control signals to said secure resource;
a biometric data store that stores biometric data associated with at least one user;
a biometric data input system coupled to said security server and operable to obtain user biometric data from said user;
said biometric verification/identification system being configured to access said data store and to evaluate said user biometric data vis-à
-vis said stored biometric data and to provide instructions to said security server and thereby provide control signals for interacting with said secure resource.
1 Assignment
0 Petitions
Accused Products
Abstract
User interaction with a secure resource is controlled or mediated by the security server that includes a telephony interface by which the server is either coupled to the telephone system or provides messages to the telephone system directly or through an intermediate component. A biometric data store stores biometric data, such as speech data or visual recognition data. If desired the biometric data may also be stored in association with the extension identifiers of the telephone system. A biometric verification/.identification system accesses this data store and evaluates provided user biometric data vis-à-vis the stored biometric data to determine if the user may control or interact with the secure resource. If interaction is permitted, the security server sends control signals to the secure resource. The telephone system provides an interface through which the user trains the system to store the biometric verification/.identification data of that user.
55 Citations
29 Claims
-
1. An apparatus for interacting with a secure resource accessible through a telephone system of the type that provides telephone access through a plurality of extensions, comprising:
-
a security server having an interface for sending messages to said telephone system, said messages being adapted to provide control signals to said secure resource;
a biometric data store that stores biometric data associated with at least one user;
a biometric data input system coupled to said security server and operable to obtain user biometric data from said user;
said biometric verification/identification system being configured to access said data store and to evaluate said user biometric data vis-à
-vis said stored biometric data and to provide instructions to said security server and thereby provide control signals for interacting with said secure resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of interacting with a secure resource accessible through a telephone system of the type that provides telephone access through a plurality of extensions comprising the steps of:
-
receiving user biometric data from a user operating one of said extensions;
obtaining user extension information that identifies which one of said extensions the user is operating;
using said user extension information and said user biometric data to access a data store containing stored biometric data associated with stored extension information;
evaluating said user biometric data vis-à
-vis said stored biometric data and providing instructions to interact with said secure resource based on the results of said evaluating step. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A method of interacting with a secure resource accessible through a telephone system of the type that provides telephone access through a plurality of extensions comprising the steps of:
-
receiving user biometric data from a user;
using said user biometric data to access a data store containing stored biometric data associated with said user;
evaluating said user biometric data vis-à
-vis said stored biometric data and providing instructions to interact with said secure resource based on the results of said evaluating step. - View Dependent Claims (29)
-
Specification