Secure voice communication channel for confidential messaging
First Claim
1. A processor-implemented method of operation for a unified messaging system (UMS), comprising:
- scanning a message for certain information, the message comprising a voice channel security level (VCSL) associated with the message and being stored for a user in the UMS;
automatically setting a security attribute to the VCSL of the message based upon detection of the certain information, the certain information including one or more words, phrases, or addresses that satisfy predefined rules;
receiving a request to listen to a message stored in the UMS, the request coming from the user connected to the UMS via a voice communication channel over a corporate network;
negotiating with a telephone device of the user to secure the voice communication channel when the security attribute is set in the VCSL;
playing the message to the user if the voice communication channel of the corporate network is secure;
otherwise,prohibiting playout of the message over the voice communication channel; and
notifying the user that the message cannot be played due to the lack of security in the event that the voice communication channel is unsecured;
determining whether the recipient is within a transmission range limit of the corporate network;
if the recipient is outside the transmission range limit, negotiating with a cellular network to provide a secure channel over which to play the message.
1 Assignment
0 Petitions
Accused Products
Abstract
A unified messaging system includes a unit to store a message operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels. A module associated with the unit operates to secure a voice channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
-
Citations
12 Claims
-
1. A processor-implemented method of operation for a unified messaging system (UMS), comprising:
-
scanning a message for certain information, the message comprising a voice channel security level (VCSL) associated with the message and being stored for a user in the UMS; automatically setting a security attribute to the VCSL of the message based upon detection of the certain information, the certain information including one or more words, phrases, or addresses that satisfy predefined rules; receiving a request to listen to a message stored in the UMS, the request coming from the user connected to the UMS via a voice communication channel over a corporate network; negotiating with a telephone device of the user to secure the voice communication channel when the security attribute is set in the VCSL; playing the message to the user if the voice communication channel of the corporate network is secure;
otherwise,prohibiting playout of the message over the voice communication channel; and notifying the user that the message cannot be played due to the lack of security in the event that the voice communication channel is unsecured; determining whether the recipient is within a transmission range limit of the corporate network; if the recipient is outside the transmission range limit, negotiating with a cellular network to provide a secure channel over which to play the message. - View Dependent Claims (2, 3)
-
-
4. A processor-implemented method of operation for a unified messaging system (UMS), comprising:
-
automatically scanning a message for certain information according to predefined rules; setting a security attribute to a voice channel security level (VCSL) associated with the message when the certain information is present, the certain information including one or more words, phrases, or addresses that satisfy the predefined rules; storing the message in a mailbox of a recipient in the UMS; receiving a request from the recipient to listen to the message over a voice communication channel of a corporate network; encrypting the voice communication channel; playing out the message to the recipient over the encrypted voice communication channel of the corporate network; determining whether the recipient is within a transmission range limit of the corporate network; if the recipient is outside the transmission range limit, negotiating with a cellular network to provide a secure channel over which to play the message. - View Dependent Claims (5)
-
-
6. A unified messaging system (UMS) for an enterprise comprising:
-
a unit operable to store a message sent to a user in the UMS; a module associated with the unit, the module being operable to scan the message and automatically set a security attribute set to a voice channel security level (VCSL) associated with the message when certain information is present in the message that satisfies predefined rules, the module also being operable to secure a voice communication channel used by the user to listen to the message when the security level is set in the VCSL, thereby indicating that the message is to be encrypted, the module being further operable to block playing of the message in the event that the voice communication channel is unable to be secured, the module being further operable to play an audible message notifying the user that the message cannot be played because the voice communication channel is unsecured, and the module is further operable to; play the message to the user if the voice communication channel of a corporate network is secure; determine whether the recipient is within a transmission range limit of the corporate network; and if the recipient is outside the transmission range limit, negotiate with a cellular network to provide a secure channel over which to play the message. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable memory encoded with a computer program, execution of the computer program operable to:
-
store a message in a unified messaging system (UMS) mailbox of a recipient; analyze the message and automatically set a security attribute to a voice channel security level (VCSL) associated with of the message when the message includes content that indicates the presence of confidential information; encrypt a voice communication channel used by the recipient to listen to the message over a network responsive to the security attribute being set in the VCSL; and play an encrypted message to the recipient as audible speech after the voice communication channel of a corporate network has been secured;
otherwise,block playing of the encrypted message to the recipient in the event that the voice communication channel cannot be secured; determine whether the recipient is within a transmission range limit of the corporate network; and if the recipient is outside the transmission range limit, negotiate with a cellular network to provide a secure channel over which to play the message. - View Dependent Claims (12)
-
Specification