System and method for authenticating internetwork resource requests
First Claim
Patent Images
1. A method comprising:
- receiving a request for use of a resource in a first network from a requester in a second network;
authenticating the request in the second network that the request originated legitimately from the requester; and
connecting the resource in the first network to the requester in the second network responsive to receipt of authentication.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for use in diverse networks that authenticates inter-network resource requests. A router in a first network receives a request for a resource from a second network. The router sends a query to an element in the second network to determine whether the request actually originated there. If the request did originate from the second network, the request is processed according to the procedure for the requested resource. If the request did not originate from the second network, then the first network terminates the request. Thus, no network resources are consumed unnecessarily by accidental or malicious requests.
176 Citations
16 Claims
-
1. A method comprising:
-
receiving a request for use of a resource in a first network from a requester in a second network;
authenticating the request in the second network that the request originated legitimately from the requester; and
connecting the resource in the first network to the requester in the second network responsive to receipt of authentication. - View Dependent Claims (2, 3, 4)
-
-
5. A method for use in sharing a telephone network resource between the telephone network and a data network comprising:
-
routing a request for the telephone network resource from the data network to the telephone network;
authenticating the request for the telephone network resource by authenticating an origination of the request in the data network; and
connecting the telephone network resource to the data network responsive to authenticating the request for the telephone network resource. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for authenticating a telephone network resource request from a data network comprising:
-
processing a request for the resource by a controller in the data network;
sending the request for the resource from the controller to a router in the telephone network;
generating an authentication of the resource request in the data network; and
allocating the resource responsive to the router receiving the authentication. - View Dependent Claims (11)
-
-
12. A method for authenticating a 9-1-1 call from a VoIP network comprising:
-
routing the 9-1-1 call to a selective router in a telephone network by a VoIP controller in the VoIP network;
generating an authentication in the VoIP network that the 9-1-1 call originated from the VoIP network; and
routing the 9-1-1 call to a PSAP responsive to the selective router receiving the authentication. - View Dependent Claims (13, 14, 15, 16)
-
Specification