System and method for providing security in a telecommunication network
First Claim
Patent Images
1. A method for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device, the method comprising:
- receiving a call initiation request from an untrusted device external to a trusted network, the call initiation request indicating a desired communication with a trusted IP telephone coupled to the trusted network;
evaluating the call initiation request;
establishing a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request, wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted IP telephone;
monitoring communications transmitted between the untrusted device and the trusted IP telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and
terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP telephone are not media streaming to maintain the integrity of the trusted network;
wherein establishing the telecommunication link comprises;
associating a first logical port of a telephony proxy with the trusted IP telephone;
associating a second logical port of the telephony proxy with the untrusted device;
receiving first telecommunication data from the untrusted device at the first logical port;
modifying a first source address information in the first telecommunication data to specify the second logical port of the telephony proxy;
communicating the first telecommunication data with the modified first source address information to the trusted IP telephone;
receiving second telecommunication data from the trusted IP telephone at the second logical port;
modifying a second source address information in the second telecommunication data to specify the first logical port of the telephony proxy; and
communicating the second telecommunication data with the modified second source address information to the untrusted device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device. The method includes receiving a call initiation request from the untrusted device that indicates a desired communication with the trusted IP telephone. The method evaluates the call initiation request, and establishes a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request.
103 Citations
43 Claims
-
1. A method for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device, the method comprising:
-
receiving a call initiation request from an untrusted device external to a trusted network, the call initiation request indicating a desired communication with a trusted IP telephone coupled to the trusted network; evaluating the call initiation request; establishing a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request, wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted IP telephone; monitoring communications transmitted between the untrusted device and the trusted IP telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP telephone are not media streaming to maintain the integrity of the trusted network; wherein establishing the telecommunication link comprises; associating a first logical port of a telephony proxy with the trusted IP telephone; associating a second logical port of the telephony proxy with the untrusted device; receiving first telecommunication data from the untrusted device at the first logical port; modifying a first source address information in the first telecommunication data to specify the second logical port of the telephony proxy; communicating the first telecommunication data with the modified first source address information to the trusted IP telephone; receiving second telecommunication data from the trusted IP telephone at the second logical port; modifying a second source address information in the second telecommunication data to specify the first logical port of the telephony proxy; and communicating the second telecommunication data with the modified second source address information to the untrusted device.
-
-
2. A method for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device, the method comprising:
-
receiving a call initiation request from an untrusted device external to a trusted network, the call initiation request indicating a desired communication with a trusted IP telephone coupled to the trusted network; evaluating the call initiation request; establishing a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request; monitoring communications transmitted between the untrusted device and the trusted IP telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP telephone are not media streaming to maintain the integrity of the trusted network; wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted IP telephone. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A communication network for establishing a telephone call between a trusted telephone and an untrusted device, the communication network comprising:
-
a first trusted network; a trusted telephone coupled to the first trusted network; an authentication controller coupled to the first trusted network and operable to evaluate a call initiation request received from an untrusted device external to the first trusted network, the call initiation request indicating a desired communication with the trusted telephone, wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted telephone; and a call manager operable to initiate the creation of a telecommunication link between the trusted telephone and the untrusted device in response to a positive evaluation of the call initiation request; wherein the authentication controller is further operable to; monitor communications transmitted between the untrusted device and the trusted telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and terminate the telecommunication link if the communications transmitted between the untrusted device and the trusted telephone are not media streaming to maintain the integrity of the trusted network. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. Software embodied in a computer-readable medium and operable to perform the following steps:
-
receiving a call initiation request from an untrusted device external to a trusted network, the call initiation request indicating a desired communication with a trusted Internet Protocol (IP) telephone coupled to the trusted network; evaluating the call initiation request; establishing a telecommunication link between the untrusted device and the trusted IP telephone in response to a positive evaluation of the call initiation request; monitoring communications transmitted between the untrusted device and the trusted IP telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and terminating the telecommunication link if the communications transmitted between the untrusted device and the trusted IP telephone are not media streaming to maintain the integrity of the trusted network; wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted IP telephone. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. An apparatus for establishing a telephone call between a trusted Internet Protocol (IP) telephone and an untrusted device, the apparatus comprising:
-
an authentication controller operable to evaluate a call initiation request received from an untrusted device external to a trusted network, the call initiation request indicating a desired communication with a trusted IP telephone coupled to the trusted network, wherein evaluating the call initiation request comprises determining whether the untrusted device is requesting the establishment of media streaming with the trusted IP telephone; a call manager operable to; initiate the creation of a telecommunication link between the trusted IP telephone and the untrusted device in response to a positive evaluation of the call initiation request; monitor communications transmitted between the untrusted device and the trusted IP telephone on the telecommunication link to ensure that the communications are media streaming to maintain the integrity of the trusted network; and terminate the telecommunication link if the communications transmitted between the untrusted device and the trusted IP telephone are not media streaming to maintain the integrity of the trusted network; and a telephony proxy, the telecommunication link between the trusted IP telephone and the untrusted device created using the telephony proxy such that all telecommunications between the trusted IP telephone and the untrusted device are communicated through the telephony proxy. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43)
-
Specification