SYSTEM AND METHOD FOR PROVIDING SECURITY IN A TELECOMMUNICATION NETWORK
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device. The method includes receiving a call initiation request from the untrusted device that indicates a desired communication with the trusted IP telephone. The method evaluates the call initiation request, and establishes a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request.
83 Citations
88 Claims
-
1. canceled
-
2. canceled
-
3. canceled
-
4. canceled
-
5. canceled
-
6. canceled
-
7. canceled
-
8. canceled
-
9. canceled
-
10. canceled
-
11. canceled
-
12. canceled
-
13. canceled
-
14. canceled
-
15. canceled
-
16. canceled
-
17. canceled
-
18. canceled
-
19. canceled
-
20. canceled
-
21. canceled
-
22. canceled
-
23. canceled
-
24. canceled
-
25. canceled
-
26. canceled
-
27. canceled
-
28. canceled
-
29. canceled
-
30. canceled
-
31. canceled
-
32. canceled
-
33. canceled
-
34. canceled
-
35. canceled
-
36. canceled
-
37. canceled
-
38. canceled
-
39. canceled
-
40. canceled
-
41. canceled
-
42. canceled
-
43. canceled
-
44. canceled
-
45. canceled
-
46. A method for establishing communication between a trusted Internet Protocol (IP) device and an untrusted device, the method comprising:
-
receiving an initiation request from an untrusted device external to a trusted network, the initiation request indicating a desired communication with a trusted IP device coupled to the trusted network;
evaluating the initiation request;
establishing a telecommunication link between the untrusted device and the trusted IP device in response to a positive evaluation of the initiation request, wherein evaluating the initiation request comprises determining whether the untrusted device is requesting the establishment of streaming data with the trusted IP device;
monitoring communications transmitted between the untrusted device and the trusted IP device on the telecommunication link to ensure that the communications are streaming data to maintain the integrity of the trusted network; and
terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP device are not streaming data to maintain the integrity of the trusted network;
wherein establishing the telecommunication link comprises;
associating a first logical port of a telephony proxy with the trusted IP device;
associating a second logical port of the telephony proxy with the untrusted device;
receiving first telecommunication data from the untrusted device at the first logical port;
modifying a first source address information in the first telecommunication data to specify the second logical port of the telephony proxy;
communicating the first telecommunication data with the modified first source address information to the trusted IP device;
receiving second telecommunication data from the trusted IP device at the second logical port;
modifying a second source address information in the second telecommunication data to specify the first logical port of the telephony proxy; and
communicating the second telecommunication data with the modified second source address information to the untrusted device.
-
-
47. A method for establishing communication between a trusted Internet Protocol (IP) device and an untrusted device, the method comprising:
-
receiving an initiation request from an untrusted device external to a trusted network, the initiation request indicating a desired communication with a trusted IP device coupled to the trusted network;
evaluating the initiation request;
establishing a telecommunication link between the untrusted device and the trusted IP device in response to a positive evaluation of the initiation request;
monitoring communications transmitted between the untrusted device and the trusted IP device on the telecommunication link to ensure that the communications are streaming data to maintain the integrity of the trusted network; and
terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP device are not streaming data to maintain the integrity of the trusted network;
wherein evaluating the initiation request comprises determining whether the untrusted device is requesting the establishment of streaming data with the trusted IP device. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
-
58. A communication network for establishing communication between a trusted Internet Protocol (IP) device and an untrusted device, the communication network comprising:
-
a first trusted network;
a trusted IP device coupled to the first trusted network;
an authentication controller coupled to the first trusted network and operable to evaluate an initiation request received from an untrusted device external to the first trusted network, the initiation request indicating a desired communication with the trusted IP device, wherein evaluating the initiation request comprises determining whether the untrusted device is requesting the establishment of streaming data with the trusted IP device; and
a manager operable to initiate the creation of a telecommunication link between the trusted IP device and the untrusted device in response to a positive evaluation of the initiation request;
wherein the authentication controller is further operable to;
monitor communications transmitted between the untrusted device and the trusted IP device on the telecommunication link to ensure that the communications are streaming data to maintain the integrity of the trusted network; and
terminate the telecommunication link if the communications transmitted between the untrusted device and the trusted IP device are not streaming data to maintain the integrity of the trusted network. - View Dependent Claims (59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
-
70. Software embodied in a computer-readable medium and operable to perform the following steps:
-
receiving an initiation request from an untrusted device external to a trusted network, the initiation request indicating a desired communication with a trusted Internet Protocol (IP) device coupled to the trusted network;
evaluating the initiation request;
establishing a telecommunication link between the untrusted device and the trusted IP device in response to a positive evaluation of the initiation request;
monitoring communications transmitted between the untrusted device and the trusted IP device on the telecommunication link to ensure that the communications are streaming data to maintain the integrity of the trusted network; and
terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP device are not streaming data to maintain the integrity of the trusted network;
wherein evaluating the initiation request comprises determining whether the untrusted device is requesting the establishment of streaming data with the trusted IP device. - View Dependent Claims (71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
-
81. An apparatus for establishing communication between a trusted Internet Protocol (IP) device and an untrusted device, the apparatus comprising:
-
an authentication controller operable to evaluate an initiation request received from an untrusted device external to a trusted network, the initiation request indicating a desired communication with a trusted IP device coupled to the trusted network, wherein evaluating the initiation request comprises determining whether the untrusted device is requesting the establishment of streaming data with the trusted IP device;
a call manager operable to;
initiate the creation of a telecommunication link between the trusted IP device and the untrusted device in response to a positive evaluation of the initiation request;
monitor communications transmitted between the untrusted device and the trusted IP device on the telecommunication link to ensure that the communications are streaming data to maintain the integrity of the trusted network; and
terminate the telecommunication link if the communications transmitted between the untrusted device and the trusted IP device are not streaming data to maintain the integrity of the trusted network; and
a telephony proxy, the telecommunication link between the trusted IP device and the untrusted device created using the telephony proxy such that all telecommunications between the trusted IP device and the untrusted device are communicated through the telephony proxy. - View Dependent Claims (82, 83, 84, 85, 86, 87, 88)
-
Specification