Systems and methods for a secure recording environment
First Claim
Patent Images
1. A method for providing secure, captured data in a customer center, comprising the steps of:
- capturing unencrypted data with a recording system at a customer center through a VoIP network, wherein the unencrypted data comprises a communication between a user and an agent of the customer center;
receiving a request at a key management system to retrieve electronic keys for encrypting the data;
responsive to receiving the request, transmitting the electronic keys and key identifications to the recording system;
encrypting the unencrypted data at the recording system using the electronic keys;
associating the electronic keys with the encrypted data and metadata of the stored encrypted data with the key identifications at the recording system;
transmitting unique identifiers associated with the stored encrypted data to the key management system, the unique identifiers being generated from the unencrypted data by recording system;
storing the encrypted data in the recording system; and
maintaining a database of metadata and key identifications to facilitate retrieval of the electronic keys for decrypting the stored encrypted data.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting the data; responsive to receiving the request, transmitting the electronic keys to the recording system; encrypting the data using the electronic keys; associating the electronic keys with the encrypted data; and storing the encrypted data in the recording system.
225 Citations
10 Claims
-
1. A method for providing secure, captured data in a customer center, comprising the steps of:
-
capturing unencrypted data with a recording system at a customer center through a VoIP network, wherein the unencrypted data comprises a communication between a user and an agent of the customer center; receiving a request at a key management system to retrieve electronic keys for encrypting the data; responsive to receiving the request, transmitting the electronic keys and key identifications to the recording system; encrypting the unencrypted data at the recording system using the electronic keys; associating the electronic keys with the encrypted data and metadata of the stored encrypted data with the key identifications at the recording system; transmitting unique identifiers associated with the stored encrypted data to the key management system, the unique identifiers being generated from the unencrypted data by recording system; storing the encrypted data in the recording system; and maintaining a database of metadata and key identifications to facilitate retrieval of the electronic keys for decrypting the stored encrypted data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A recording system for providing secure, unencrypted captured data in a customer center comprising:
-
a key management system at a customer center operative to; receive a request to retrieve electronic keys for encrypting the unencrypted captured data, and responsive to receiving the request, transmit electronic keys and key identifications via a network; and a recording subsystem at the customer center electrically coupled to the key management system, the recording subsystem being operative to; capture unencrypted data within the customer center through a VoIP network, wherein the unencrypted data comprises a communication between a user and an agent of the customer center, transmit the request to retrieve electronic keys for encrypting the captured unencrypted data, responsive to receiving the electronic keys, and encrypt the data using the electronic keys, associate the electronic keys with the encrypted captured data and metadata of the stored captured data with the key identifications; store the encrypted captured data in the recording system; and maintain a database of metadata and key identifications to facilitate retrieval of the electronic keys for decrypting the stored encrypted captured data, wherein the recording subsystem is further operative to transmit unique identifiers generated from the unencrypted data and that are associated with the stored encrypted captured data to the key management system. - View Dependent Claims (8, 9, 10)
-
Specification