×

Dual-tier security architecture for inter-domain environments

  • US 6,996,716 B1
  • Filed: 12/14/1999
  • Issued: 02/07/2006
  • Est. Priority Date: 04/15/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for establishing a secure communication between users employing endpoints in a system including one or more security zones, each security zone including one or more of said endpoints and a Zone Keeper, wherein at least one of said users is a caller utilizing a first endpoint in one of said one or more security zones and at least another one of said users is a callee utilizing a second endpoint in one of said one or more security zones, the method including the steps of:

  • said caller sending a communication request message including a communication request for establishing a secure multimedia communication including security information identifying said caller, via said first endpoint to a first one of said Zone Keepers associated with a security zone including said first endpoint;

    said first Zone Keeper authenticating the identity of said caller, and if said caller identity is authenticated, authorizing said caller'"'"'s communication request;

    said first Zone keeper determining whether said requested secure communication is an intra-zone or an inter-zone communication;

    if said requested communication is an intra-zone communication both said first and second endpoints are in the same security zone, said first Zone Keeper in conjunction with said first and second endpoints in said first security zone establishing said secure communication between said caller and said callee;

    if said requested communication is an inter-zone communication said first and second endpoints are in first and second security zones, respectively, said first Zone Keeper sending said request message to said second Zone Keeper associated with said second security zone; and

    establishing said secure inter-zone communication utilizing said first Zone Keeper, said first endpoint in said first security zone, said second Zone Keeper and said second endpoint in said second security zone.

View all claims
  • 19 Assignments
Timeline View
Assignment View
    ×
    ×