System and method for ensuring call privacy in a shared telephone environment
First Claim
1. A private branch exchange (PBX) system for an enterprise comprising:
- a first interface to receive an incoming voice over Internet protocol (VoIP) call from a caller to a called party of the enterprise, the incoming VoIP call being received from an Internet protocol (IP) network, the first interface being further operable to receive an identifier from the caller identifying the called party;
a second interface to connect with a telephone device that is shared among multiple users in the enterprise based on the received identifier, wherein each of the multiple users is associated with a unique identifier and the shared telephone device is associated with each of the identifiers of the multiple users, the multiple users including the called party;
one or more processors that control a connection between the incoming VoIP call and the telephone device;
a memory coupled to the one or more processors that stores authentication information associated with the called party;
code executable on the one or more processors, execution of the code causing the one or more processors to obtain information from a person answering the incoming VoIP call at the telephone device, the connection for the incoming VoIP call being established only when the information provided by the person matches the authentication information associated with the called party.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for an enterprise includes a telephone device operable to receive an incoming call directed from a caller to a called party, the telephone device being shared among a plurality of persons within the enterprise. A software or hardware (firmware) module with code that runs on a PBX system of the enterprise authenticates a person answering the incoming call as the called party before connecting the incoming call to the telephone device. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
67 Citations
17 Claims
-
1. A private branch exchange (PBX) system for an enterprise comprising:
-
a first interface to receive an incoming voice over Internet protocol (VoIP) call from a caller to a called party of the enterprise, the incoming VoIP call being received from an Internet protocol (IP) network, the first interface being further operable to receive an identifier from the caller identifying the called party; a second interface to connect with a telephone device that is shared among multiple users in the enterprise based on the received identifier, wherein each of the multiple users is associated with a unique identifier and the shared telephone device is associated with each of the identifiers of the multiple users, the multiple users including the called party; one or more processors that control a connection between the incoming VoIP call and the telephone device; a memory coupled to the one or more processors that stores authentication information associated with the called party; code executable on the one or more processors, execution of the code causing the one or more processors to obtain information from a person answering the incoming VoIP call at the telephone device, the connection for the incoming VoIP call being established only when the information provided by the person matches the authentication information associated with the called party. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A private branch exchange (PBX) system for an enterprise comprising:
-
a first interface to receive an incoming voice over Internet protocol (VoIP) call from a caller to a called party of the enterprise, the incoming VoIP call being received from an Internet protocol (IP) network, the first interface being further operable to receive an identifier from the caller identifying the called party; a second interface to connect with a telephone device that is shared among multiple users in the enterprise based on the received identifier, wherein each of the multiple users is associated with a unique identifier and the shared telephone device is associated with each of the identifiers of the multiple users, the multiple users including the called party; one or more processors that control a connection between the incoming VoIP call and the telephone device; a memory coupled to the one or more processors that stores authentication information associated with the called party; code executable on the one or more processors, execution of the code being activated by a programmable setting, execution of the code causing the one or more processors to obtain information from a person answering the incoming VoIP call at the telephone device, the connection for the incoming VoIP call being established only when the information provided by the person matches the authentication information associated with the called party, wherein the programmable setting is enabled by a voice signature.
-
-
7. A telephone device for sharing among a plurality of persons comprising:
-
a port that connects to an Internet protocol public branch exchange (IP-PBX) system to receive an incoming call directed to a called party based on a received identifier identifying the called party;
wherein the telephone device is shared among a plurality of persons, each of the plurality of persons being associated with a unique identifier and the shared telephone device is associated with each of the identifiers of the plurality of persons, the plurality of persons including the called party;a processor that executes code implementing a connection protocol between the IP-PBX system and the telephone device for the incoming call, wherein a media path between the IP-PBX system and the telephone device for the incoming call is established when information provided by a person answering the telephone device matches authentication information associated with the called party. - View Dependent Claims (8, 9, 10)
-
-
11. A processor-implemented method of handling an incoming voice over Internet protocol (VoIP) call from a caller to a certain worker at an enterprise comprising:
-
receiving an incoming voice over Internet protocol (VoIP) call from a caller to a certain worker; receiving an identifier from the caller identifying the certain worker; obtaining information from a worker answering the incoming VoIP call at a telephone device;
the telephone device being shared among a plurality of workers at the enterprise, wherein each of the plurality of workers is associated with a unique identifier and the shared telephone device is associated with each of the identifiers of the plurality of workers;comparing the information obtained against authorization information stored in a database, the authorization information comprises a list of one or more of the workers authorized to receive the incoming call, the one or more of the workers including the certain worker, and, if the comparison produces a match, establishing a media path between the caller and the worker answering the incoming call at the telephone device. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification