Secure voice communication channel for confidential messaging
First Claim
1. A processor-implemented method of operation for a unified messaging system (UMS), comprising:
- receiving a request to listen to a message stored in the UMS, the request coming from a user connected to the UMS via a voice communication channel over a network, the message having a security attribute set to a first level;
playing the message to the user only if the voice communication channel is secure;
otherwise, prohibiting playout of the message over the voice communication channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A unified messaging system includes a unit to store a message operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels. A module associated with the unit operates to secure a voice channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
-
Citations
23 Claims
-
1. A processor-implemented method of operation for a unified messaging system (UMS), comprising:
-
receiving a request to listen to a message stored in the UMS, the request coming from a user connected to the UMS via a voice communication channel over a network, the message having a security attribute set to a first level;
playing the message to the user only if the voice communication channel is secure;
otherwise, prohibiting playout of the message over the voice communication channel. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A processor-implemented method of operation for a unified messaging system (UMS), comprising:
-
storing a message in a mailbox of a recipient;
receiving a request from the recipient to listen to the message over a voice communication channel of a network;
encrypting the voice communication channel;
playing out the message to the recipient over the encrypted voice communication channel. - View Dependent Claims (7)
-
-
8. A unified messaging system for an enterprise comprising:
-
means for storing a message composed by a first user for retrieval by a second user, the message having a security attribute set to a first level; and
means for securing a voice communication channel used by the second user to listen to the message, and for playing the message to the second user over the voice communication channel once secured.
-
-
9. A unified messaging system for an enterprise comprising:
-
a unit operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels;
a module associated with the unit, the module being operable to secure a voice communication channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A unified messaging system for an enterprise comprising:
-
a unit operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels;
a module associated with the unit, the module being operable to secure a voice communication channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption, the module further including means for analyzing the message and automatically setting the selectable security level to a high level indicating encryption when the message includes content that indicates the presence of confidential information. - View Dependent Claims (16, 17)
-
-
18. A computer program product comprising a computer useable medium and computer readable code embodied on the computer useable medium, execution of the computer readable code causing the computer program product to:
-
store an encrypted message in a unified messaging system (UMS) mailbox of a recipient;
encrypt a voice communication channel used by the recipient to listen to the encrypted message over a network; and
play the encrypted message to the recipient as audible speech after the voice communication channel has been secured. - View Dependent Claims (19, 20)
-
-
21. A processor-implemented method of operation for a unified messaging system (UMS) of an enterprise, comprising:
-
receiving a call from a wireless device of a mobile recipient to listen to a message stored in the UMS, the mobile recipient having a current geographic location within a transmission range limit of a secure enterprise wireless network link, the message having a security attribute set to a first level;
playing the message to the wireless device of the mobile recipient as audible speech via the secure enterprise wireless network link;
monitoring the current geographic location of the mobile recipient;
negotiating with a cellular network to obtain a secure communications channel link as the mobile recipient nears the transmission range limit;
transferring the call from the secure enterprise wireless network link to the secure communications channel link of the cellular wireless when the mobile recipient moves beyond the transmission range limit.
-
-
22. A processor-implemented method of operation for a unified messaging system (UMS) of an enterprise, comprising:
-
receiving a call from a wireless device of a mobile recipient to listen to a message stored in the UMS, the mobile recipient having a current geographic location within a transmission range limit of a secure enterprise wireless network link, the message having a security attribute set to a first level;
playing the message to the wireless device of the mobile recipient as audible speech via the secure enterprise wireless network link;
monitoring the current geographic location of the mobile recipient;
attempting to negotiate a secure communications channel link with a cellular network as the mobile recipient nears the transmission range limit; and
, in the event that the secure communications channel link is not obtained,disconnecting the call when the mobile recipient moves beyond the transmission range limit. - View Dependent Claims (23)
-
Specification