×

System and method for providing security in a telecommunication network

  • US 7,890,749 B2
  • Filed: 05/26/2006
  • Issued: 02/15/2011
  • Est. Priority Date: 01/04/2000
  • Status: Active Grant
First Claim
Patent Images

1. A method for establishing communication between a trusted Internet Protocol (IP) device and an untrusted device, the method comprising:

  • receiving an initiation request from an untrusted device external to a trusted network, the initiation request indicating a desired communication with a trusted IP device coupled to the trusted network;

    using at least one computer to evaluate the initiation request;

    using at least one computer to establish a telecommunication link between the untrusted device and the trusted IP device in response to a positive evaluation of the initiation request, wherein evaluating the initiation request comprises determining whether the untrusted device is requesting the establishment of streaming data with the trusted IP device;

    using at least one computer to monitor communications transmitted between the untrusted device and the trusted IP device on the telecommunication link to ensure that the communications are streaming data to maintain the integrity of the trusted network; and

    using at least one computer to terminate the telecommunication link if the communications transmitted between the untrusted device and the trusted IP device are not streaming data to maintain the integrity of the trusted network;

    wherein establishing the telecommunication link comprises;

    associating a first logical port of a telephony proxy with the trusted IP device;

    associating a second logical port of the telephony proxy with the untrusted device;

    receiving first telecommunication data from the untrusted device at the first logical port;

    modifying a first source address information in the first telecommunication data to specify the second logical port of the telephony proxy;

    communicating the first telecommunication data with the modified first source address information to the trusted IP device;

    receiving second telecommunication data from the trusted IP device at the second logical port;

    modifying a second source address information in the second telecommunication data to specify the first logical port of the telephony proxy; and

    communicating the second telecommunication data with the modified second source address information to the untrusted device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×