Securing uniform resource identifier information for multimedia calls
First Claim
1. A method comprising:
- receiving, at a first network component of a packet-based network, a session request from a first subscriber, the session request comprising a request to establish a communications session between the first subscriber and a second subscriber via the packet-based network;
determining, by utilizing a processor that executes instructions stored in memory, whether the session request originated in a trusted network; and
in response to determining that the session request did not originate in the trusted network, selectively permitting access to unique resource identifier information associated with the second subscriber for use in establishing the communications session based on a security configuration in a profile associated with the second subscriber, wherein a scope of a query used in accessing the unique resource identifier information is limited based on the security configuration in the profile and is limited based on a type of the unique resource identifier information, and wherein the selectively permitting access to the unique resource identifier information is based on a security configuration identified time span during which communications sessions with the second subscriber are permitted and in response to a correspondence between the time span and a time of origination of the session request.
1 Assignment
0 Petitions
Accused Products
Abstract
A session request from a first subscriber is received at a first network component of a packet-based network. The session request comprises a request to establish a communications session between the first subscriber and a second subscriber. In the event the session request originated in a trusted network, the first network component permits access to unique resource identifier (URI) information associated with the second subscriber for use in establishing the communications session via the packet-based network. In the event the session request did not originate in a trusted network and in response to determining a security configuration associated with the second subscriber allows the first subscriber to access the URI information under the circumstances, the first network component permits access to the URI information for use in establishing the communications session via the packet-based network. In response to determining the security configuration prohibits access to the URI information by the first subscriber under the circumstances, the first network component forwards the session request to a second network component so as to establish the communications session via a public switched telephone network.
27 Citations
17 Claims
-
1. A method comprising:
-
receiving, at a first network component of a packet-based network, a session request from a first subscriber, the session request comprising a request to establish a communications session between the first subscriber and a second subscriber via the packet-based network; determining, by utilizing a processor that executes instructions stored in memory, whether the session request originated in a trusted network; and in response to determining that the session request did not originate in the trusted network, selectively permitting access to unique resource identifier information associated with the second subscriber for use in establishing the communications session based on a security configuration in a profile associated with the second subscriber, wherein a scope of a query used in accessing the unique resource identifier information is limited based on the security configuration in the profile and is limited based on a type of the unique resource identifier information, and wherein the selectively permitting access to the unique resource identifier information is based on a security configuration identified time span during which communications sessions with the second subscriber are permitted and in response to a correspondence between the time span and a time of origination of the session request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A network component for implementation in a packet-based network, the network component comprising:
-
a memory that stores instructions; a processor that executes the instructions to perform operations comprising; receiving a session request from a first subscriber, the session request comprising a request to establish a communications session between the first subscriber and a second subscriber via the packet-based network; determining whether the session request originated in a trusted network; and in response to determining the session request did not originate in the trusted network, selectively permitting access to unique resource identifier information associated with the second subscriber for use in establishing the communications session based on a security configuration in a profile associated with the second subscriber, wherein a scope of a query used in accessing the unique resource identifier information is limited based on the security configuration in the profile and is limited based on a type of the unique resource identifier information, wherein the security configuration identifies a time span during which communications sessions with the second subscriber are permitted, and the network component selectively permits access to the unique resource identifier information responsive to a correspondence between time span and a time of origination of the session request. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving, at a first network component of a packet-based network, a first session request from a first subscriber, the first session request comprising a request to establish a first communications session between the first subscriber and a second subscriber; receiving, at the first network component, a second session request from a third subscriber, the second session request comprising a request to establish a second communications session between the third subscriber and the second subscriber; permitting, by utilizing a processor that executes instructions stored in memory, access to unique resource identifier information associated with the second subscriber for use in establishing the first communications session in response to determining that the first subscriber is located in the same network as the second subscriber; and responsive to determining that the third subscriber is not located in the same network as the second subscriber; accessing a security configuration from a profile associated with the second subscriber from a second network component of the packet-based network; and selectively permitting access to the unique resource identifier information associated with the second subscriber for use in establishing the second communications session based on the security configuration, wherein a scope of a query used in accessing the unique resource identifier information is limited based on the security configuration from the profile and is limited based on a type of the unique resource identifier information, and wherein the selectively permitting access to the unique resource identifier information is based on a security configuration identified time span during which communications sessions with the second subscriber are permitted and in response to a correspondence between the time span and a time of origination of the session request. - View Dependent Claims (17)
-
Specification