METHOD AND SYSTEM FOR ENHANCED CONFERENCE CALL SECURITY
13 Assignments
0 Petitions
Accused Products
Abstract
A method for controlling access by of communication devices to a conference call, the method comprising associating proximity settings with a conference call, the proximity settings indicating a acceptable proximity of other communication devices relative to a selected communication device; sensing by the selected communication device proximity of the other devices within its proximity of the communication device to obtain proximity information; and determining, by a processor, from the obtained proximity information and the proximity settings an action to be performed with reference to the conference call.
-
Citations
38 Claims
-
1-14. -14. (canceled)
-
15. A method for controlling access to a conference call, the method comprising:
-
receiving a request from a communication device for access to the conference call; obtaining one or more contextual attributes associated with the communication device, the contextual attributes indicating at least one of;
a location of the communication device, an identification of the type of the communication device, or one or more peripheral devices communicatively coupled to the communication devices;determining whether the contextual attributes of the communication device satisfy a predefined policy; and if the contextual attributes of the communication device fail to satisfy the predefined policy, determining an action restricting the communication device'"'"'s access to the conference call. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A server device for controlling access of a communication device to a conference call, the device comprising:
-
a processor configured to; receive a request from a communication device for access to the conference call; obtain one or more contextual attributes associated with the communication device, the contextual attributes indicating at least one of;
a location of the communication device, an identification of the type of the communication device, or one or more peripheral devices communicatively coupled to the communication devices;determine whether the contextual attributes of the communication device satisfy a predefined policy; and if the contextual attributes of the communication device fail to satisfy the predefined policy, determine an action restricting the communication device'"'"'s access to the conference call. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory computer readable storage medium storing instructions that are executable by one or more processors of a server device to cause the server device to perform a method for controlling access of a communication device to a conference call, the method comprising:
-
receiving a request from a communication device for access to the conference call; obtaining one or more contextual attributes associated with the communication device, the contextual attributes indicating at least one of;
a location of the communication device, an identification of the type of the communication device, or one or more peripheral devices communicatively coupled to the communication devices;determining whether the contextual attributes of the communication device satisfy a predefined policy; and if the contextual attributes of the communication device fail to satisfy the predefined policy, determining an action restricting the communication device'"'"'s access to the conference call. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38)
-
Specification