×

System and method for providing security in a telecommunication network

  • US 7,069,432 B1
  • Filed: 01/04/2000
  • Issued: 06/27/2006
  • Est. Priority Date: 01/04/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device, the method comprising:

  • receiving a call initiation request from an untrusted device external to a trusted network, the call initiation request indicating a desired communication with a trusted IP telephone coupled to the trusted network;

    evaluating the call initiation request;

    establishing a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request, wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted IP telephone;

    monitoring communications transmitted between the untrusted device and the trusted IP telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and

    terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP telephone are not media streaming to maintain the integrity of the trusted network;

    wherein establishing the telecommunication link comprises;

    associating a first logical port of a telephony proxy with the trusted IP telephone;

    associating a second logical port of the telephony proxy with the untrusted device;

    receiving first telecommunication data from the untrusted device at the first logical port;

    modifying a first source address information in the first telecommunication data to specify the second logical port of the telephony proxy;

    communicating the first telecommunication data with the modified first source address information to the trusted IP telephone;

    receiving second telecommunication data from the trusted IP telephone at the second logical port;

    modifying a second source address information in the second telecommunication data to specify the first logical port of the telephony proxy; and

    communicating the second telecommunication data with the modified second source address information to the untrusted device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×