ACCESS CONTROL TO SECURED APPLICATION FEATURES USING CLIENT TRUST LEVELS
First Claim
1. A computer-implemented communications security system, comprising:
- a sign-in component of a near endpoint for sending sign-in credentials for registration to a communications infrastructure and receiving registration trust level information based on the sign-in credentials; and
a communications component of the near endpoint for sending the registration trust level information to a far endpoint, the far endpoint managing communicative interaction with the near endpoint based on the registration trust level information.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
41 Citations
20 Claims
-
1. A computer-implemented communications security system, comprising:
-
a sign-in component of a near endpoint for sending sign-in credentials for registration to a communications infrastructure and receiving registration trust level information based on the sign-in credentials; and a communications component of the near endpoint for sending the registration trust level information to a far endpoint, the far endpoint managing communicative interaction with the near endpoint based on the registration trust level information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented communications security system, comprising:
-
a sign-in component of a caller client for sending caller sign-in credentials for registration to a call communications infrastructure and receiving registration trust level information based on the caller sign-in credentials; a caller client trust component for computing caller trust level information; and a communications component of the caller client for sending the registration trust level information and the caller trust level information to a callee client, the callee client manages interaction with the caller client based on the registration trust level information and the caller trust level information. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-implemented communications security method, comprising:
-
sending sign-in credentials from a caller client to a call communications infrastructure for registration; receiving registration trust level information at the caller client based on the registration; transmitting the registration trust level information to a callee client; and controlling interaction from the callee client to the caller client based on the registration trust level information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification