US20130254830A1 - Apparatus and method for assuring communications of corporate users - Google Patents
Apparatus and method for assuring communications of corporate users Download PDFInfo
- Publication number
- US20130254830A1 US20130254830A1 US13/427,668 US201213427668A US2013254830A1 US 20130254830 A1 US20130254830 A1 US 20130254830A1 US 201213427668 A US201213427668 A US 201213427668A US 2013254830 A1 US2013254830 A1 US 2013254830A1
- Authority
- US
- United States
- Prior art keywords
- communication
- corporate
- user
- security
- requested
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 title claims abstract description 593
- 238000000034 method Methods 0.000 title claims description 19
- 230000007246 mechanism Effects 0.000 claims abstract description 89
- 230000000977 initiatory effect Effects 0.000 claims description 16
- 230000008520 organization Effects 0.000 claims description 7
- 230000001902 propagating effect Effects 0.000 claims description 4
- 230000006855 networking Effects 0.000 claims 2
- 230000005641 tunneling Effects 0.000 claims 2
- 230000006870 function Effects 0.000 description 9
- 230000003993 interaction Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000013518 transcription Methods 0.000 description 4
- 230000035897 transcription Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 241000027036 Hippa Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000009429 distress Effects 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000005802 health problem Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012913 prioritisation Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- This case relates generally to communications and, more specifically but not exclusively, to secure communications.
- an apparatus in one embodiment, includes a processor and a memory communicatively coupled to the processor.
- the processor is configured to receive, from a user device of a corporate user, communication request information associated with a communication request initiated via the user device, the communication request information specifying a context of the requested communication.
- the processor is configured to select a communication context-based security profile for the requested communication based on the communication request information.
- the processor is configured to propagate an indication of the selected communication context-based security profile toward at least one of the user device and a network device for use in applying at least one security mechanism to the requested communication.
- a method uses at least one processor to perform steps of receiving, from a user device of a corporate user, communication request information associated with a communication request initiated via the user device where the communication request information specifies a context of the requested communication, selecting a communication context-based security profile for the requested communication based on the communication request information, and propagating an indication of the selected communication context-based security profile toward at least one of the user device and a network device for use in applying at least one security mechanism to the requested communication.
- an apparatus in one embodiment, includes a processor and a memory communicatively coupled to the processor.
- the processor is configured to detect initiation of a communication request at a user device.
- the processor is configured to determine communication request information associated with the communication request.
- the processor is configured to propagate the communication request information toward a communication assurance agent.
- the processor is configured to receive, from the communication assurance agent, an indication of a communication context-based security profile selected by the communication assurance agent for use by the user device in applying at least one security mechanism to the requested communication.
- a method uses at least one processor to perform steps of detecting initiation of a communication request at a user device, determining communication request information associated with the communication request, propagating the communication request information toward a communication assurance agent, and receiving, from the communication assurance agent, an indication of a communication context-based security profile selected by the communication assurance agent for use by the user device in applying at least one security mechanism to the requested communication.
- FIG. 1 depicts a high-level block diagram of an exemplary system illustrating use of communication context-based security profiles to provide secure communications for a corporate user;
- FIG. 2 depicts an exemplary user profile including a set of communication context-based security profiles for the corporate user of FIG. 1 ;
- FIG. 3 depicts an exemplary set of security grades defined using communication context-based security profiles
- FIG. 4 depicts use of the exemplary security grades of FIG. 3 to provide security for communications of the corporate user of FIG. 1 ;
- FIG. 5 depicts one embodiment of a method for using communication context-based security profiles of the corporate user to improve the security of communications by the corporate user
- FIG. 6 depicts a high-level block diagram of a computer suitable for use in performing functions described herein.
- a secure communication capability uses communication context-based security profiles associated with a corporate user to assure communications by or otherwise associated with the corporate user.
- the communications by or otherwise associated with the corporate user may be assured regardless of various elements used to support communication by or otherwise associated with the corporate user.
- communications by or otherwise associated with the corporate user may be assured regardless of one or more of the user device used by the corporate user for the communication (e.g., whether it be a corporate user device behind a corporate firewall and on a corporate network, a corporate user device used by the user outside of the corporate network, a personal user device of the corporate user, and the like), a communication channel used for the communication, a communication medium used for the communication, a communication mode used for the communication, and the like).
- a secure blanket is imposed over all communication mechanisms used to support communications by or otherwise associated with the corporate user regarding corporate matters, where the security blanket may be imposed irrespective of various elements used to support communication by or otherwise associated with the corporate user (e.g., as noted above, irrespective of one or more of the user device used by the corporate user for the communication, a communication channel used for the communication, a communication medium used for the communication, a communication mode used for the communication, and the like).
- the security blanket also may be extended to personal communications by the corporate user from any suitable user device (e.g., a corporate user device(s) and/or a personal user device(s)).
- FIG. 1 depicts a high-level block diagram of an exemplary system illustrating use of communication context-based security profiles to provide secure communications for a corporate user.
- system 100 includes a plurality of user devices 102 1 - 102 3 (collectively, user devices 102 ) of a corporate user, a corporate network 110 , a plurality of access networks 120 1 - 120 N (collectively, access networks 120 ), a communication network 130 , and a communication assurance network 140 .
- the communication assurance network 140 includes a communication assurance agent 141 , a profiles database 142 , and a security assurance grading engine 145 .
- the user devices 102 of the corporate user include a corporate user device 102 1 located within the corporate network 110 (e.g., associated with a corporate Intranet and/or behind a corporate firewall), a corporate user device 102 2 located outside of the corporate network 110 and receiving network access from one of the access networks 120 (illustratively, access network 1200 , and a personal user device 102 2 located outside of the corporate network 110 and receiving network access from one of the access networks 120 (illustratively, access network 120 N ).
- the user devices 102 may include any suitable types of user devices (e.g., desktop computers, laptop computers, tablet computers, smart phones, cloud-based information stores, and the like). It is noted that the cloud-based information stores also may be considered as user devices (or user elements) as users may interact with such virtual entities to retrieve their information.
- the user devices 102 are used by the corporate user to communicate regarding corporate matters, where communications regarding corporate matters also may be referred to herein as corporate communications or corporate-related communications.
- the corporate user may use corporate user device 102 1 for communications regarding corporate matters while in the office (e.g., where corporate user device 102 1 is a computer located in the office of the corporate user) may use corporate user device 102 2 for communications regarding corporate matters while traveling outside of the office (e.g., where corporate user device 102 2 is a smart phone supplied to the corporate user by the corporation), and may use personal user device 102 3 for communications regarding corporate matters while located at home (e.g., where corporate user device 102 3 is a personal computer located in the home of the corporate user).
- FIG. 1 This exemplary movement of the corporate user is depicted in FIG. 1 .
- the corporate user may use corporate user device 102 2 while located in the office, the corporate user may use personal user device 102 3 while located in the office or traveling, and the like, as well as various combinations thereof).
- the user devices 102 may be used for any suitable types of corporate communications.
- corporate communications by or otherwise associated with the corporate user may include voice calls (e.g., to other employees of the corporate user, suppliers, customers, partners, and the like), voicemails (e.g., to other employees of the corporate user, suppliers, customers, partners, and the like), e-mails (e.g., to other employees of the corporate user, suppliers, customers, partners, and the like), Simple Messaging Service (SMS) messaging, Instant Messaging (IM), web browsing (e.g., searching for information using a search engine and the like), video calls, social media related communications (e.g., corporate social media, public social media, and the like), commerce-related communications (e.g., eCommerce, Business-to-Business (B2B) Commerce, and the like), web-based conferencing services (e.g., LiveMeeting, NetMeeting, and the like), communications related to cloud interactions (e.g., public cloud interactions, private cloud interactions, and the like), and the like, as well as various combinations thereof.
- voice calls e.g.
- corporate communications by or otherwise associated with the corporate user may include network-centric communications which may be part of communications initiated by the corporate user and/or may be complementary to the communications initiated by the corporate user (e.g., where the communications may be spawned in response to one or more conditions associated with communications initiated by the corporate user).
- network-centric communications which may be part of communications initiated by the corporate user and/or may be complementary to the communications initiated by the corporate user may include call forwarding, email forwarding, voice mail, voice mail forwarding, voice mail transcription, content uploading, content tagging, multi-mode communication (e.g., where a session transforms from one type of session to another type of session, where a session transforms from one device to another device, and the like), multi-device interaction within a service, and the like, as well as various combinations thereof.
- call forwarding email forwarding, voice mail, voice mail forwarding, voice mail transcription, content uploading, content tagging
- multi-mode communication e.g., where a session transforms from one type of session to another type of session, where a session transforms from one device to another device, and the like
- multi-device interaction within a service e.g., where a session transforms from one type of session to another type of session, where a session transforms from one device to another device, and the like
- communications capabilities e.g., equipment, services, and the like
- voice calls may be supported using one or more of a Public Switched Telephone Network (PSTN), Voice Over IP (VoIP), Private Branch Exchanges (PBXs), IP-PBXs, wireline networks, wireless networks, cloud-based PBX capabilities, over-the-top (OTT) voice applications, and the like, as well as various combinations thereof.
- PSTN Public Switched Telephone Network
- VoIP Voice Over IP
- PBXs Private Branch Exchanges
- IP-PBXs IP-PBXs
- wireline networks wireless networks
- wireless networks wireless networks
- cloud-based PBX capabilities over-the-top (OTT) voice applications, and the like
- OTT over-the-top
- e-mails may be supported using one or more of data communication networks, email services, and the like.
- the types of underlying communications capabilities used to support the other listed communication types will be understood.
- the user devices 102 each are configured to detect communication requests initiated by the corporate user via the user devices 102 . For example, when the corporate user initiates a request to communicate via one of the user devices 102 , the user device 102 detects an indication of the request to communicate and propagates the indication of the request to communicate such that it is automatically detected by the communication assurance agent 141 . The user device 102 also may determine information associated with the request to communicate (denoted herein as requested communication information) and propagate the information associated with the communication request such that it is automatically detected by the communication assurance agent. The manner in which the requested communication is initiated is expected to vary for the different communication types.
- the corporate user may dial a number and press a submit button to initiate a call, open a voice call application and select the name of a person to call, and the like.
- the corporate user may open an email application, log in to an email service, open an e-mail message to be sent and begin to enter information (e.g., the name(s) of the intended recipient(s), subject information, and the like), and the like.
- the corporate user may open an SMS application, log in to an SMS service, open an SMS message to be sent and begin to enter information (e.g., the name(s) of the intended recipient(s), subject information, and the like), and the like.
- IM communication the corporate user may open an IM application, log into an IM service, open an IM message to be sent and begin to enter information, and the like.
- web browsing the corporate user may open a web browser, begin to enter search criteria into a search interface of a web browser, and the like.
- a request by the corporate user to communicate may be considered to include an action(s) via which an indication of a request to communicate may be automatically detected by the communication assurance agent 141 and, optionally, any associated information suitable for use by communication assurance agent 141 to determine the type of security to be applied to the requested communication of the corporate user.
- the corporate network 110 is a corporate intranet.
- the corporate network 110 may be owned/maintained by the corporation which employs the corporate user directly or indirectly and/or by one or more Managed Services entities.
- the corporate network 110 may include various elements and services as will be understood by one skilled in the art.
- the corporate network 110 may include IT systems, IT networks, private clouds, hosted application centers, private data centers, public data centers, wireline and/or wireless networks, private communication networks, user devices, peripherals associated with user devices, and the like, as well as various combinations thereof. It is noted that, in general, corporations use security mechanisms to secure their corporate networks and communications by their employees via their corporate networks.
- security mechanisms typically used in corporate networks include firewalls, encryption/decryption of communications, virtual private networks (VPNs), and the like, as well as various combinations thereof.
- VPNs virtual private networks
- security mechanisms typically used in corporate networks do not always guarantee end-to-end communication assurance or information assurance for communications by employees via the corporate networks, and certainly do not guarantee end-to-end communication assurance or information assurance for communications by employees via external networks.
- the current security environment of the corporation cannot adequately monitor the complex interactions that are made by corporate users of the corporation and the open communications environment of the corporation.
- the access networks 120 may include any suitable access networks via which the corporate user may communicate regarding corporate matters.
- the access networks 120 may include wireline access networks (e.g., cable networks, DSL networks, and the like) and/or wireless access networks (e.g., cellular networks, Wireless Fidelity (Wi-Fi) networks, satellite networks, and the like).
- wireline access networks e.g., cable networks, DSL networks, and the like
- wireless access networks e.g., cellular networks, Wireless Fidelity (Wi-Fi) networks, satellite networks, and the like.
- the communication network 130 represents any wide area communication network(s) adapted to transport communications of the corporate user.
- the communication network 130 may include backhaul networks, the Internet, and the like as well as various combinations thereof.
- the communication assurance network 140 includes communication assurance agent 141 , profiles database 142 , and security assurance grading engine 145 .
- the communication assurance agent 141 is configured to provide security mechanisms to improve security of communications by the corporate user regarding corporate matters.
- the communication assurance agent 141 also may be configured to provide security mechanisms to improve security of communications by the corporate user regarding personal matters.
- the communication assurance agent 141 is configured to provide such security mechanisms using information from profiles database 142 and/or using security assurance grading engine 145 (and/or information from security assurance grading engine 145 ).
- the profiles database 142 includes a user profile 143 for the corporate user.
- the user profile 143 of the corporate user includes user information associated with the corporate user (e.g., name, address, network identification information, and the like, as well as various combinations thereof).
- the user profile 143 of the corporate user further includes communication context-based security profiles 144 (and/or otherwise points to communication context-based security profiles 144 ) associated with the corporate user.
- the communication context-based security profiles 144 for the corporate user include one or more profiles to be used in conjunction with communications of the corporate user.
- a communication context-based security profile 144 for the corporate user specifies a security policy that is defined based on the context of the communication of corporate user, where the security policy specifies one or more security mechanisms to be applied for the communication of corporate user (e.g., a requested communication of the corporate user having associated therewith requested communication information matching the communication context defined by the security policy has the associated security mechanism(s) of the security policy applied thereto).
- the communication context-based security profiles 144 for the corporate user are defined and retrieved based on communication context.
- communication context for a communication of the corporate user may be based on one or more of the type of communication to be used for the communication of the corporate user (e.g., voice, email, SMS, video, web browsing, and the like), an identity of the corporate user, a role of the corporate user (e.g., within the corporation, with a particular group within the corporation, for a particular project of the corporation, and the like), relationship-based information associated with the corporate user (an indication of a group within the corporation to which the corporate user belong, an indication of a project of the corporation on which the corporate user works, an indication of a relationship between the corporate user and an intended recipient(s) of the communication, and the like), a device type of the user device 102 used by the corporate user (e.g., fixed versus mobile, wireline versus wireless, computer versus smartphone, and the like), a network type of a network(s) to be used to support the communication,
- the communication context-based security profiles 144 for the corporate user may be defined based on one or more of the above-described types of context information.
- requested communication information associated with the request to communicate and indicative of the context of the request to communicate may be used to retrieve an appropriate communication context-based security profile 144 for use in providing security for the requested communication of the corporate user (e.g., in the form of one or more security mechanisms specified by the appropriate communication context-based security profile 144 retrieved for the requested communication of the corporate user).
- the communication context-based security profiles 144 for the corporate user may be defined based on information associated with multiple corporate users (e.g., where communication context-based security profiles are defined for multiple corporate users based on information associated with the multiple corporate users and then the communication context-based security profiles are associated with each of the multiple corporate users for use in providing communication context-based security for the multiple corporate users).
- the communication context-based security profiles 144 for the corporate user also may be defined by deriving the context-based security profiles 144 for the corporate user from past communications by the corporate user (e.g., based on historical information associated with communication services/events as determined from various resources within one or more communication environments), and the like, as well as various combinations thereof.
- the communication context-based security profiles 144 for the corporate user may be retrieved, in response to requests by the corporate user to communicate, based on requested communication information determined from the requests to communicate (where the requested communication information may include any of the types of information which may be used to define the communication context-based security profiles 144 ).
- the communication context-based security profiles 144 are adapted to provide communication assurance for communication services used by the corporate user, as well as to provide information assurance for information transported via communication services used by the corporate user.
- the communication context-based security profiles 144 are adapted to provide information assurance even in cases where information of a communication by the corporate user has multiple states and/or multiple delivery mechanisms (e.g., where a caller leaves a voicemail for the corporate user that is later retrieved by the corporate user, where the corporate user leaves a voicemail for a fellow employee and the voicemail is sent to the employee as an attachment in an email, where a caller leaves a voicemail for the corporate user and the voicemail is converted into text and sent to the corporate user in a text message, and the like).
- the security assurance grading engine 145 maintains a plurality of security grades 146 1 - 146 N and a custom security grade 146 CUSTOM (collectively, security grades 146 , which also are denoted as GRADE 1 -GRADE N and GRADE CUSTOM ).
- security grades 146 which also are denoted as GRADE 1 -GRADE N and GRADE CUSTOM .
- the custom security grade 146 CUSTOM may be defined using two or more of security grades 146 1 - 146 N .
- the security grades 146 may be generated via processing of the communication context-based security profiles 144 of the corporate user. It is noted that fewer or more security grades 146 may be defined/generated. It is noted that fewer or more than one custom grade 146 CUSTOM may be defined/generated. It is noted that the security grades 146 also may be referred to herein as security blankets.
- the security grades 146 are adapted for use by communication assurance agent 140 (and, optionally, by the security assurance grading engine 145 ) to provide security mechanisms to provide security assurance for communications of the corporate user.
- each security grade 146 has one or more security mechanisms associated therewith, where the security mechanism(s) associated with a security grade 146 include the security mechanism(s) to be applied for communications of the corporate user that are deemed to fall within that security grade 146 .
- each communication associated with the communication type/service receives the same grade of service based on the security mechanism(s) of that security grade 146 , where such security may be applied independent of time, network type, communication medium, storage medium, and the like.
- the definition/generation and use of the security grades 146 may be better understood by way of reference to FIG. 3 and FIG. 4 .
- the communication assurance agent 141 , the profiles database 142 , and the security grades database 145 may be deployed in any suitable manner (e.g., one or more of these elements may reside within a service provider network, one or more of these elements may reside within corporate network 110 , one or more of these elements may reside within a Federated System, and the like, as well as various combinations thereof).
- system 100 may be configured to improve security for any number of corporate users of any number of corporations.
- system 100 may be configured to improve security for any suitable type(s) of users (e.g., users employed by corporations but only looking to improve security of their personal communications, users not employed by corporations but looking to improve security of their personal communications, and the like, as well as various combinations thereof).
- users e.g., users employed by corporations but only looking to improve security of their personal communications, users not employed by corporations but looking to improve security of their personal communications, and the like, as well as various combinations thereof).
- FIG. 2 depicts an exemplary user profile including a set of communication context-based security profiles for the corporate user of FIG. 1 .
- the user profile 143 of the corporate user includes user information associated with the corporate user.
- the user profile 143 of the corporate user further also includes and/or has associated therewith communication context-based security profiles 144 .
- the communication context-based security profiles 144 for the corporate user include a plurality of corporate security profiles 144 C1 - 144 CN (collectively, corporate security profiles 144 C ).
- the corporate security profiles 144 C may be better understood by considering an exemplary scenario in which the corporate user is a member of an organization within the corporation, is a member of an organization (ORG1) within the corporation, is a member of a group (GROUP 4) within the organization, and is assigned to work on two projects (PROJECT A within GROUP 4 and PROJECT F which is a multi-group project).
- the corporate security profile 144 C1 is a profile defined for the corporation (e.g., to be used for any type of communication by the corporate user with any other member of the corporation).
- the corporate security profile 144 C2 is a profile defined for ORG1 of which the corporate user is a member (e.g., to be used for any type of communication by the corporate user with any other member of ORG1).
- the corporate security profile 144 C3 is a profile defined for GROUP 4 of which the corporate user is a member (e.g., to be used for any type of communication by the corporate user with any other member of GROUP 4).
- the corporate security profile 144 C3 includes two sub-profiles to be used for communications by the corporate user using two different user devices of the corporate user (e.g., a CORPORATE DEVICE profile to be used for communications by the corporate user with any other person of GROUP 4 where the corporate user is using a corporate user device (e.g., corporate user device 102 1 or corporate user device 102 2 ) and a PERSONAL DEVICE profile to be used for communications by the corporate user with any other person of GROUP 4 where the corporate user is using a personal user device (e.g., personal user device 102 3 )).
- a CORPORATE DEVICE profile to be used for communications by the corporate user with any other person of GROUP 4 where the corporate user is using a corporate user device (e.
- the corporate security profile 144 C4 is a profile defined for PROJECT A to which the corporate user is assigned and includes two sub-profiles to be used for different types of communications by the corporate user related to PROJECT A (e.g., a VOICE profile to be used for voice communications by the corporate user with any other person associated with project A and an EMAIL profile to be used for email communications by the corporate user with any other person associated with project A).
- a VOICE profile to be used for voice communications by the corporate user with any other person associated with project A
- EMAIL profile to be used for email communications by the corporate user with any other person associated with project A
- the corporate security profile 144 C5 is a profile defined for PROJECT F to which the corporate user is assigned and includes two sub-profiles to be used for communications by the corporate user with different groups working on PROJECT F (e.g., a GROUP 4 profile to be used for communications by the corporate user with any other person of GROUP 4 who is assigned to work on PROJECT F and an OTHER profile to be used for communications by the corporate user with any other person associated with PROJECT 4 but not in GROUP 4).
- a GROUP 4 profile to be used for communications by the corporate user with any other person of GROUP 4 who is assigned to work on PROJECT F
- an OTHER profile to be used for communications by the corporate user with any other person associated with PROJECT 4 but not in GROUP 4
- the corporate security profile 144 C6 is a profile defined for customers of the corporation (e.g., to be used for any type of communication by the corporate user with any of the customers of the corporation).
- the corporate security profile 144 C7 is a profile defined for any voice-based communication by the corporate user.
- the corporate security profile 144 C7 includes three sub-profiles to be used for communications by the corporate user using three different user devices of the corporate user (e.g., a CORPORATE DESKTOP DEVICE profile to be used for communications by the corporate user using corporate user device 102 1 , a CORPORATE MOBILE DEVICE profile to be used for communications by the corporate user using corporate user device 102 2 , and a PERSONAL DEVICE profile to be used for communications by the corporate user using corporate user device 102 3 ).
- a CORPORATE DESKTOP DEVICE profile to be used for communications by the corporate user using corporate user device 102 1
- a CORPORATE MOBILE DEVICE profile to be used for communications by the corporate user using corporate user device 102 2
- a PERSONAL DEVICE profile to be used for communications by the corporate user using corporate user device 102 3
- the corporate security profile 144 C8 is a profile defined for any web browsing to be performed by the corporate user.
- the corporate security profile 144 CN is intended to represent the fact that any suitable number of corporate security profiles 144 C may be defined for the corporate user.
- corporate security profiles 144 C are merely exemplary and, thus, that any suitable numbers, types, and arrangements of corporate security profiles 144 C may be maintained for the corporate user.
- the corporate security profiles 144 C may be defined by the corporation on behalf of the corporate user (and, optionally, modified by the corporate user as needed), defined by the corporate user, and the like, as well as various combinations thereof.
- the corporate security profiles 144 C may be defined for any suitable set of corporate users of the corporation and the user profile of the corporate user may then simply point to the corporate security profiles 144 C to thereby associate those corporate security profiles 144 C with the corporate user for use in improving security of corporation-related communications of the corporate user.
- the communication context-based security profiles 144 for the corporate user also may include a plurality of personal security profiles 144 P1 - 144 PN (collectively, personal security profiles 144 P ).
- the personal security profile 144 P1 is a profile defined for any personal voice communication to be performed by the corporate user.
- the personal security profile 144 P2 is a profile defined for any personal e-mail communication to be performed by the corporate user and includes three sub-profiles to be used for e-mail communications with different groups of people (e.g., a first sub-profile for e-mails to family and friends of the corporate user, a second sub-profile for e-mails to acquaintances of the corporate user, and a third sub-profile for e-mails to doctors of the corporate user).
- the personal security profile 144 P3 is a profile defined for any type of communication to be performed by the corporate user with one or more of the financial institutions of the corporate user.
- the personal security profile 144 P2 is a profile defined for any web-related communications to be performed by the corporate user and includes two sub-profiles to be used for different types of web browsing (e.g., a first sub-profile for web browsing and a second sub-profile for web-based purchases made by the corporate user).
- the personal security profile 144 PN is intended to represent the fact that any suitable number of personal security profiles 144 P may be defined for the corporate user.
- personal security profiles 144 P are merely exemplary and, thus, that any suitable numbers, types, and arrangements of personal security profiles 144 P may be maintained for the corporate user.
- the personal security profiles 144 P may be defined by the defined by the corporate user, defined by one or more other entities on behalf of the corporate user (and, optionally, modified by the corporate user as needed), and the like, as well as various combinations thereof.
- the personal security profiles 144 P may be defined for any suitable set of users and the user profile of the corporate user may then simply point to the personal security profiles 144 P to thereby associate those personal security profiles 144 P with the corporate user for use in improving security of personal communications of the corporate user.
- the communication context-based security profiles 144 of the user profile 143 of the corporate user each may specify one or more security mechanisms to be used to secure the associated communications of the corporate user.
- security mechanisms may include use of encryption and decryption, and the like, as well as various combinations thereof.
- types of security mechanisms associated with a given communication context-based security profile 144 may depend on factors such as the type of communication which may be used, the necessary or desired level of security for the communication, and the like, as well as various combinations thereof.
- communication context-based security profiles 144 may be stored in other locations.
- corporation-related communication context-based security profiles of the corporate user may be stored within the corporate network 110 .
- personal communication context-based security profiles of the corporate user may be stored within the corporate network 110 and/or a home network of the user.
- personal communication context-based security profiles of the corporate user may be stored within the communications environments of entities with which the corporate user may communicate (e.g., Health Insurance Portability and Accounting Act (HIPPA)-related security profiles maintained within communications environments of doctors, Securities and Exchange Commission (SEC)-related security requirements maintained within communications environments of financial institutions, and the like).
- the profiles database 142 may store indexes to communication context-based security profiles 144 stored in the other location(s), such that the communication assurance agent 141 may use the indexes in order to retrieve the communication context-based security profiles 144 when needed.
- communication context-based security profiles 144 may be considered to be maintained in any suitable storage location(s) such that they are accessible for use by communication assurance agent 141 in providing security mechanisms for the corporate user.
- FIG. 3 depicts an exemplary set of security grades defined using communication context-based security profiles.
- security assurance grading engine 145 maintains service grades 146 which may be applied by communication assurance agent 140 (and, optionally, by the security assurance grading engine 145 ) to provide security mechanisms to provide security assurance for communications of the corporate user.
- each security grade 146 1 - 146 N and 146 CUSTOM has a set of security mechanisms 320 1 - 320 N and 320 CUSTOM (collectively, security mechanisms 320 ) associated therewith, respectively.
- a set of security mechanisms 320 associated with a service grade 146 may include one or more security mechanisms to be applied for that security grade (e.g., encryption/decryption, use of a VPN, and the like).
- security mechanisms 320 1 for security grade 146 1 may specify use of encryption/decryption for communications by the corporate user that are deemed to fall within security grade 146 1 .
- security mechanisms 320 2 for security grade 146 2 may specify use of a VPN for communications by the corporate user that are deemed to fall within security grade 146 2 .
- security mechanisms 320 N for security grade 146 N may specify use of encryption/decryption and a VPN for communications by the corporate user that are deemed to fall within security grade 146 N . It is noted that any other suitable types of security mechanisms may be applied as part of the sets of security mechanisms 320 .
- FIG. 4 depicts use of the exemplary security grades of FIG. 3 to provide security for communications of the corporate user of FIG. 1 .
- the corporate user of FIG. 1 has a plurality of user devices including user devices 102 1 - 102 3 depicted and described with respect to FIG. 1 as well as one or more additional user devices 102 (collectively, user devices 102 ) available for use by the corporate user to communicate.
- the association of the security grades 146 1 - 146 N with the user devices 102 1 - 102 N illustrates exemplary cases in which, for a given one of the user devices 102 , the corporate user selects the user device 102 and then initiates a communication with the selected user device 102 and the context of the initiated communication results in use of the associated security grade 146 for the initiated communication.
- communication assurance network 140 of FIG. 1 is available to provide communication assurance for communications of the corporate user.
- the communication assurance network 140 is depicted and described in detail with respect to FIG. 1-FIG . 3 .
- security grades 146 of the corporate user in order to secure the communications by the corporate user may be better understood by way of the following examples.
- the user selects user device 102 1 (e.g., a corporate smart phone of the corporate user) and initiates a voice call to his or her doctor.
- the context of the initiated communication of the corporate user e.g., a voice call from the corporate user to the doctor via the corporate smart phone
- results in selection of a particular security grade for use in securing the initiated communication (illustratively, the security grade 146 1 which also is denoted as G1).
- the end-to-end communication from the user device 102 1 of the corporate user to the user device of the doctor is secured by the security mechanisms specified for security grade 146 1 .
- the message also is secured by the security mechanisms specified for security grade 146 1 (as illustrated by use of the security mechanisms specified for security grade 416 1 to store the voicemail as an asset within in the network 410 1 ). In this manner, the communication of the corporate user and its associated information is assured end-to-end as long as the asset is available.
- the user selects user device 102 2 (e.g., a personal smart phone of the corporate user) and initiates a voice call to his or her colleague at the corporation.
- the context of the initiated communication of the corporate user e.g., a voice call from the corporate user to another corporate user via the personal smart phone
- results in selection of a particular security grade for use in securing the initiated communication (illustratively, the security grade 146 2 which also is denoted as G2).
- the end-to-end communication from the user device 102 2 of the corporate user to the user device of the colleague is secured by the security mechanisms specified for security grade 146 2 .
- the message also is secured by the security mechanisms specified for security grade 146 2 (as illustrated by use of the security mechanisms specified for security grade 146 2 to store the voicemail as an asset within in the network 410 2 ). In this manner, the communication of the corporate user and its associated information is assured end-to-end as long as the asset is available.
- FIG. 5 depicts one embodiment of a method for using communication context-based security profiles of the corporate user to improve the security of communications by the corporate user.
- step 505 method 500 begins.
- the user device of the corporate user detects a communication request.
- detection of the communication request may vary across different communication types. For example, for voice communications the user device may detect entry of a telephone number and pressing of a submit button to initiate a call, opening of a voice call application and selecting of the name of a person to call, and the like.
- voice communications the user device may detect entry of a telephone number and pressing of a submit button to initiate a call, opening of a voice call application and selecting of the name of a person to call, and the like.
- e-mail communication the user device may detect opening of an email application, logging in to an email service, opening of an e-mail message to be sent and entry of information, and the like.
- SMS communication the user device may detect opening of an SMS application, logging in to an SMS service, opening of an SMS message to be sent and entry of information, and the like.
- the user device may detect opening of a web browser, entry of search criteria into a search interface of a web browser, and the like. More generally, a request by the corporate user to communicate may be considered to include an action via which an indication of a request to communicate may be detected by the user device 110 .
- the user device of the corporate user determines communication request information associated with the communication request.
- the communication request information may include an identity of the corporate user of the user device, an identifier identifying the user device of the corporate user, an indication of a type of user device of the corporate user (e.g., corporate versus personal, fixed versus mobile, and the like), an identity of at least one entity and/or device intended as a destination of the requested communication, a communication type of the requested communication (e.g., voice call, e-mail, SMS message, web browsing, and the like), a subject of the requested communication, one or more details of the requested communication, and the like, as well as various combinations thereof. It is noted that, in at least some cases, a portion of the communication request information may be determined as part of step 510 .
- the user device of the corporate user propagates the communication request information toward the communication assurance agent.
- the communication assurance agent receives the communication request information from the user device of the corporate user.
- the communication assurance agent selects a communication context-based security profile based on the communication request information.
- the communication assurance agent identifies the communication context-based security profiles associated with the corporate user (e.g., from information included within the communication request information received at the communication assurance agent from the user device). The communication assurance agent then selects one of the communication context-based security profiles associated with the corporate user, as the communication context-based security profile to be used for the requested communication of the corporate user, based on the communication request information received at the communication assurance agent from the user device.
- the selection of the communication context-based security profile may be performed based on keyword matching between information included in the communication request information and information included in the communication context-based security profiles associated with the corporate user, by considering the communication context-based security profiles associated with the corporate user in priority order until identifying one of the communication context-based security profiles as being a match satisfying a matching threshold, by considering portions of the communication request information in priority order until identifying one of the communication context-based security profiles as being a match satisfying a matching threshold, and the like, as well as various combinations thereof.
- any potential conflict between the multiple communication context-based security profiles may be resolved in any suitable manner (e.g., based on priority levels assigned to the communication context-based security profiles, using a lowest common denominator approach via comparison of security features of the communication context-based security profiles, using a greatest common denominator approach, via comparison of security features of the communication context-based security profiles, and the like, as well as various combinations thereof).
- the communication assurance agent propagates an indication of the selected communication context-based security profile toward the user device.
- the user device receives the indication of the selected communication context-based security profile from the communication assurance agent.
- the user device initiates the requested communication based on the selected communication context-based security profile.
- the communication context-based security profile indicates one or more security mechanisms to be used for the requested communication of the corporate user. It will be appreciated that the initiation of the requested communication based on the selected communication context-based security profile depends, at least in part, on the type of communication. Thus, the initiation of the requested communication based on the selected communication context-based security profile may be better understood by considering examples related to different types of communication which may be initiated by the corporate user.
- initiation of the requested communication based on the selected communication context-based security profile may include initiating signaling for establishing the voice session such that the voice session is based on one or more security parameters (e.g., using a particular type of encryption/decryption).
- initiation of the requested communication based on the selected communication context-based security profile may include sending the email from the user device using one or more security mechanisms (e.g., using a particular type of encryption/decryption, and the like).
- initiation of the requested communication based on the selected communication context-based security profile may include sending the SMS message from the user device using one or more security mechanisms (e.g., using a particular type of encryption/decryption, and the like).
- initiation of the requested communication based on the selected communication context-based security profile may include sending the search request from the user device using one or more security mechanisms related to web browsing.
- initiation of the requested communication based on the selected communication context-based security profile may include sending the search request from the user device using one or more security mechanisms (e.g., using a particular type of encryption/decryption, and the like).
- security mechanisms may be applied in any suitable manner, which may depend on the type(s) of security mechanism(s) to be applied.
- one or more of the security mechanisms may be delivered as security application programming interfaces (APIs).
- APIs security application programming interfaces
- the method 500 ends.
- the communication assurance agent propagates an indication of the selected communication context-based security profile toward the user device
- the communication assurance agent alternatively or additionally may propagate an indication of the selected communication context-based security profile toward at least one network device which may be configured to apply one or more security mechanisms for the requested communication of the user device.
- the communication assurance agent alternatively or additionally may propagate an indication of the selected communication context-based security profile toward a boundary device of the corporate network with which the user device is associated, toward one or more devices of an access network with which the user device is associated, toward one or more devices of a core network supporting the requested communication of the corporate user, toward one or more servers providing services related to the requested communication, toward one or more application servers related to the requested communication, and the like, as well as various combinations thereof.
- the communication assurance agent selects one communication context-based security profile for the requested communication of the corporate user
- the communication assurance agent may be configured to select multiple communication context-based security profile for the requested communication of the corporate user.
- the communication assurance agent may select one of the multiple communication context-based security profiles on behalf of the user device (e.g., selecting the profiles based on a prioritization of the profiles, selecting the profile having the most stringent security requirements, and or using any other suitable selection criteria) and propagate an indication of the selected one of the communication context-based security profiles toward the user device for use by the user device for the requested communication of the corporate user.
- the communication assurance agent may select two or more of the communication context-based security profiles on behalf of the user device (e.g., based on any suitable selection criteria, such as those discussed above for selection of one of the communication context-based security profiles by the communication assurance agent on behalf of the user device) and propagate indications of the selected communication context-based security profiles toward the user device.
- the communication assurance agent may propagate indications of each of the selected communication context-based security profiles toward the user device.
- the user device may select one of the multiple communication context-based security profiles to use for the requested communication, and then to use the selected one of the communication context-based security profiles for the requested communication.
- the user device may use some or all of the multiple communication context-based security profiles (to the extent that such communication context-based security policies are consistent with each other) for the requested communication (e.g., applying all security mechanisms specified in the communication context-based security profiles, applying the most stringent of each of the security mechanisms specified in the communication context-based security profiles, and the like).
- a communication context-based security profile also may be determined for the destination side of a requested communication.
- the process performed for the destination side of the requested communication is similar to the process performed for the source side of the requested communication as depicted and described with respect to FIGS. 1-5 .
- the source and destination user devices communicate with the same communication assurance agent for determining the respective communication context-based security profiles to be used by the source and destination user devices.
- the source and destination user devices communicate with different communication assurance agents for determining the respective communication context-based security profiles to be used by the source and destination user devices.
- the communication assurance agents may be configured to communicate with each other for purposes of determining a set of security mechanisms to be used for communication between the source and destination user devices. In one embodiment, in which the source and destination user devices use different communication assurance agents, the communication assurance agents may be configured to communicate with one or more other elements (e.g., a higher level communication assurance agent in a hierarchy of communication assurance agents) for purposes of determining a set of security mechanisms to be used for communication between the source and destination user devices.
- the communication assurance agents may be configured to communicate with one or more other elements (e.g., a higher level communication assurance agent in a hierarchy of communication assurance agents) for purposes of determining a set of security mechanisms to be used for communication between the source and destination user devices.
- the security mechanism(s)/service grade to be applied to the requested communication of the corporate user may be applied to any communication/service derived from the requested communication of the corporate user irrespective of whether or not the corporate user or the user device of the corporate user is involved (directly or indirectly) in communication/service derived from the requested communication of the corporate user. This may be used, for example, where one or more communications/services are spawned by some action or actions taken by or otherwise associated with the corporate user.
- one or more settings for the intended recipient may result in initiation by a network device of a voicemail transcription service which enables a text transcription of the voicemail to be delivered to the intended recipient via email or text message and the delivery of the text transcription of the voicemail may then be secured using an appropriate security mechanism(s)/security grade (which may be the same as or different than the security mechanism(s)/security grade used to deliver the voicemail to the voice mailbox of the intended recipient) in accordance with embodiments depicted and described herein.
- a voice connection is established between the corporate user and the doctor using an appropriate security mechanism(s)/security grade based on the context of the requested communication.
- a service hosted within the network and monitoring the content of the voice call may detect distress on the part of the corporate user and, in response, may automatically initiate conversion of the voice call to a video call between the corporate user and the doctor such that the doctor can perform a visual inspection of the corporate user almost immediately.
- the video call that is spawned automatically as a result of monitoring performed within the network may then be secured using an appropriate security mechanism(s)/security grade (which may be the same as or different than the security mechanism(s)/security grade used for the voice call between the corporate user and the doctor) in accordance with embodiments depicted and described herein.
- an appropriate security mechanism(s)/security grade which may be the same as or different than the security mechanism(s)/security grade used for the voice call between the corporate user and the doctor
- the communication assurance agent 141 is configured to detect initiation of a derived instance of the requested communication.
- the derived instance of the requested communication may include one or both of a service and a communication.
- the communication assurance agent 141 may be configured to initiate application of the at least one security mechanism to the derived instance of the requested communication.
- the communication assurance agent 141 where the communication context-based security profile selected for the requested communication of the corporate user is a first communication context-based security profile, may be configured to select a second communication context-based security profile for the derived instance of the requested communication, and propagate an indication of the selected second communication context-based security profile toward at least one of the user device and a network device for use in applying at least one security mechanism to the derived instance of the requested communication.
- the communication assurance agent 141 may be hosted at any other suitable location.
- the communication assurance agent 141 may be hosted within the corporate network 110 for use by multiple corporate users (including the corporate user depicted and described with respect to FIG. 1 ).
- the communication assurance agent 141 may be hosted on each of the user devices 102 of the corporate user (in which case method 500 of FIG. 5 includes communication between elements of the user device 102 from which the communication request is initiated).
- the functions of the communication assurance agent 141 for the corporate user may be arranged using a combination of such embodiments (e.g., where at least some communication assurance agent functions are hosted within the network while at least some communication assurance agent functions are hosted on the user devices 102 of the corporate user).
- FIG. 6 depicts a high-level block diagram of a computer suitable for use in performing functions described herein.
- computer 600 includes a processor element 602 (e.g., a central processing unit (CPU) and/or other suitable processor(s)) and a memory 604 (e.g., random access memory (RAM), read only memory (ROM), and the like).
- processor element 602 e.g., a central processing unit (CPU) and/or other suitable processor(s)
- memory 604 e.g., random access memory (RAM), read only memory (ROM), and the like.
- the computer 600 also may include a cooperating module/process 605 and/or various input/output devices 606 (e.g., a user input device (such as a keyboard, a keypad, a mouse, and the like), a user output device (such as a display, a speaker, and the like), an input port, an output port, a receiver, a transmitter, and storage devices (e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, and the like)).
- a user input device such as a keyboard, a keypad, a mouse, and the like
- a user output device such as a display, a speaker, and the like
- storage devices e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, and the like
- computer 600 depicted in FIG. 6 provides a general architecture and functionality suitable for implementing functional elements described herein and/or portions of functional elements described herein.
- the computer 600 provides a general architecture and functionality suitable for implementing one or more of corporate user device 102 1 , corporate user device 102 2 , personal user device 102 3 , communication assurance agent 141 , and profiles database 142 .
- computer 600 may be implemented using any suitable forms and factors, both stationary and mobile, which may be used for a user device (e.g., desktops, laptops, tablets, smartphones, handsets, palmtops, and the like).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/614,345 entitled “NEW SECURE COMMUNICATION MECHANISMS AND CAPABILITIES,” filed Mar. 22, 2012, which is hereby incorporated herein by reference in its entirety.
- This case relates generally to communications and, more specifically but not exclusively, to secure communications.
- While most corporations employ various security mechanisms within their corporate networks, such mechanisms do not always adequately secure communications of the corporate users of the corporate networks.
- Various deficiencies in the prior art are addressed by embodiments for supporting secure communications.
- In one embodiment, an apparatus includes a processor and a memory communicatively coupled to the processor. The processor is configured to receive, from a user device of a corporate user, communication request information associated with a communication request initiated via the user device, the communication request information specifying a context of the requested communication. The processor is configured to select a communication context-based security profile for the requested communication based on the communication request information. The processor is configured to propagate an indication of the selected communication context-based security profile toward at least one of the user device and a network device for use in applying at least one security mechanism to the requested communication.
- In one embodiment, a method uses at least one processor to perform steps of receiving, from a user device of a corporate user, communication request information associated with a communication request initiated via the user device where the communication request information specifies a context of the requested communication, selecting a communication context-based security profile for the requested communication based on the communication request information, and propagating an indication of the selected communication context-based security profile toward at least one of the user device and a network device for use in applying at least one security mechanism to the requested communication.
- In one embodiment, an apparatus includes a processor and a memory communicatively coupled to the processor. The processor is configured to detect initiation of a communication request at a user device. The processor is configured to determine communication request information associated with the communication request. The processor is configured to propagate the communication request information toward a communication assurance agent. The processor is configured to receive, from the communication assurance agent, an indication of a communication context-based security profile selected by the communication assurance agent for use by the user device in applying at least one security mechanism to the requested communication.
- In one embodiment, a method uses at least one processor to perform steps of detecting initiation of a communication request at a user device, determining communication request information associated with the communication request, propagating the communication request information toward a communication assurance agent, and receiving, from the communication assurance agent, an indication of a communication context-based security profile selected by the communication assurance agent for use by the user device in applying at least one security mechanism to the requested communication.
- The teachings herein can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
-
FIG. 1 depicts a high-level block diagram of an exemplary system illustrating use of communication context-based security profiles to provide secure communications for a corporate user; -
FIG. 2 depicts an exemplary user profile including a set of communication context-based security profiles for the corporate user ofFIG. 1 ; -
FIG. 3 depicts an exemplary set of security grades defined using communication context-based security profiles; -
FIG. 4 depicts use of the exemplary security grades ofFIG. 3 to provide security for communications of the corporate user ofFIG. 1 ; -
FIG. 5 depicts one embodiment of a method for using communication context-based security profiles of the corporate user to improve the security of communications by the corporate user; and -
FIG. 6 depicts a high-level block diagram of a computer suitable for use in performing functions described herein. - To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
- In general, secure communication capabilities are depicted and described herein, although various other capabilities also may be presented herein.
- In one embodiment, a secure communication capability uses communication context-based security profiles associated with a corporate user to assure communications by or otherwise associated with the corporate user. The communications by or otherwise associated with the corporate user may be assured regardless of various elements used to support communication by or otherwise associated with the corporate user. For example, communications by or otherwise associated with the corporate user may be assured regardless of one or more of the user device used by the corporate user for the communication (e.g., whether it be a corporate user device behind a corporate firewall and on a corporate network, a corporate user device used by the user outside of the corporate network, a personal user device of the corporate user, and the like), a communication channel used for the communication, a communication medium used for the communication, a communication mode used for the communication, and the like). In this manner, a secure blanket is imposed over all communication mechanisms used to support communications by or otherwise associated with the corporate user regarding corporate matters, where the security blanket may be imposed irrespective of various elements used to support communication by or otherwise associated with the corporate user (e.g., as noted above, irrespective of one or more of the user device used by the corporate user for the communication, a communication channel used for the communication, a communication medium used for the communication, a communication mode used for the communication, and the like). In one embodiment, the security blanket also may be extended to personal communications by the corporate user from any suitable user device (e.g., a corporate user device(s) and/or a personal user device(s)).
-
FIG. 1 depicts a high-level block diagram of an exemplary system illustrating use of communication context-based security profiles to provide secure communications for a corporate user. - As depicted in
FIG. 1 ,system 100 includes a plurality of user devices 102 1-102 3 (collectively, user devices 102) of a corporate user, acorporate network 110, a plurality of access networks 120 1-120 N (collectively, access networks 120), acommunication network 130, and acommunication assurance network 140. Thecommunication assurance network 140 includes acommunication assurance agent 141, aprofiles database 142, and a securityassurance grading engine 145. - The
user devices 102 of the corporate user include acorporate user device 102 1 located within the corporate network 110 (e.g., associated with a corporate Intranet and/or behind a corporate firewall), acorporate user device 102 2 located outside of thecorporate network 110 and receiving network access from one of the access networks 120 (illustratively, access network 1200, and apersonal user device 102 2 located outside of thecorporate network 110 and receiving network access from one of the access networks 120 (illustratively, access network 120 N). Theuser devices 102 may include any suitable types of user devices (e.g., desktop computers, laptop computers, tablet computers, smart phones, cloud-based information stores, and the like). It is noted that the cloud-based information stores also may be considered as user devices (or user elements) as users may interact with such virtual entities to retrieve their information. - The
user devices 102 are used by the corporate user to communicate regarding corporate matters, where communications regarding corporate matters also may be referred to herein as corporate communications or corporate-related communications. For example, the corporate user may usecorporate user device 102 1 for communications regarding corporate matters while in the office (e.g., wherecorporate user device 102 1 is a computer located in the office of the corporate user) may usecorporate user device 102 2 for communications regarding corporate matters while traveling outside of the office (e.g., wherecorporate user device 102 2 is a smart phone supplied to the corporate user by the corporation), and may usepersonal user device 102 3 for communications regarding corporate matters while located at home (e.g., wherecorporate user device 102 3 is a personal computer located in the home of the corporate user). This exemplary movement of the corporate user is depicted inFIG. 1 . It will be appreciated that other uses of theuser devices 102 by the corporate user are possible (e.g., the corporate user may usecorporate user device 102 2 while located in the office, the corporate user may usepersonal user device 102 3 while located in the office or traveling, and the like, as well as various combinations thereof). - The
user devices 102 may be used for any suitable types of corporate communications. - In one embodiment, for example, corporate communications by or otherwise associated with the corporate user may include voice calls (e.g., to other employees of the corporate user, suppliers, customers, partners, and the like), voicemails (e.g., to other employees of the corporate user, suppliers, customers, partners, and the like), e-mails (e.g., to other employees of the corporate user, suppliers, customers, partners, and the like), Simple Messaging Service (SMS) messaging, Instant Messaging (IM), web browsing (e.g., searching for information using a search engine and the like), video calls, social media related communications (e.g., corporate social media, public social media, and the like), commerce-related communications (e.g., eCommerce, Business-to-Business (B2B) Commerce, and the like), web-based conferencing services (e.g., LiveMeeting, NetMeeting, and the like), communications related to cloud interactions (e.g., public cloud interactions, private cloud interactions, and the like), and the like, as well as various combinations thereof.
- In one embodiment, for example, corporate communications by or otherwise associated with the corporate user may include network-centric communications which may be part of communications initiated by the corporate user and/or may be complementary to the communications initiated by the corporate user (e.g., where the communications may be spawned in response to one or more conditions associated with communications initiated by the corporate user). For example, network-centric communications which may be part of communications initiated by the corporate user and/or may be complementary to the communications initiated by the corporate user may include call forwarding, email forwarding, voice mail, voice mail forwarding, voice mail transcription, content uploading, content tagging, multi-mode communication (e.g., where a session transforms from one type of session to another type of session, where a session transforms from one device to another device, and the like), multi-device interaction within a service, and the like, as well as various combinations thereof.
- It is noted that the underlying communications capabilities (e.g., equipment, services, and the like) which may support the above-described corporate communication types will be understood by one skilled in the art. For example, voice calls may be supported using one or more of a Public Switched Telephone Network (PSTN), Voice Over IP (VoIP), Private Branch Exchanges (PBXs), IP-PBXs, wireline networks, wireless networks, cloud-based PBX capabilities, over-the-top (OTT) voice applications, and the like, as well as various combinations thereof. For example, e-mails may be supported using one or more of data communication networks, email services, and the like. The types of underlying communications capabilities used to support the other listed communication types will be understood.
- It is noted that various combinations of such communication types of a corporation (and, optionally, the underlying communications capabilities supporting such communication types) may be referred to collectively herein as an open communications environment of the corporation (e.g., supporting user-to-user interactions, user-to-machine interactions, machine-to-user interactions, and machine-to-machine interactions).
- The
user devices 102 each are configured to detect communication requests initiated by the corporate user via theuser devices 102. For example, when the corporate user initiates a request to communicate via one of theuser devices 102, theuser device 102 detects an indication of the request to communicate and propagates the indication of the request to communicate such that it is automatically detected by thecommunication assurance agent 141. Theuser device 102 also may determine information associated with the request to communicate (denoted herein as requested communication information) and propagate the information associated with the communication request such that it is automatically detected by the communication assurance agent. The manner in which the requested communication is initiated is expected to vary for the different communication types. For example, for voice communication the corporate user may dial a number and press a submit button to initiate a call, open a voice call application and select the name of a person to call, and the like. For example, for e-mail communication the corporate user may open an email application, log in to an email service, open an e-mail message to be sent and begin to enter information (e.g., the name(s) of the intended recipient(s), subject information, and the like), and the like. For example, for SMS communication the corporate user may open an SMS application, log in to an SMS service, open an SMS message to be sent and begin to enter information (e.g., the name(s) of the intended recipient(s), subject information, and the like), and the like. For example, for IM communication the corporate user may open an IM application, log into an IM service, open an IM message to be sent and begin to enter information, and the like. For example, for web browsing the corporate user may open a web browser, begin to enter search criteria into a search interface of a web browser, and the like. More generally, a request by the corporate user to communicate may be considered to include an action(s) via which an indication of a request to communicate may be automatically detected by thecommunication assurance agent 141 and, optionally, any associated information suitable for use bycommunication assurance agent 141 to determine the type of security to be applied to the requested communication of the corporate user. - It will be appreciated that, although primarily depicted and described with respect to the corporate user using three
specific user devices 102 to communicate regarding corporate matters, the corporate user may use fewer ormore user devices 102 to communicate regarding corporate matters and/or may use other types ofuser devices 102 to communicate regarding corporate matters. - The
corporate network 110 is a corporate intranet. Thecorporate network 110 may be owned/maintained by the corporation which employs the corporate user directly or indirectly and/or by one or more Managed Services entities. Thecorporate network 110 may include various elements and services as will be understood by one skilled in the art. For example, thecorporate network 110 may include IT systems, IT networks, private clouds, hosted application centers, private data centers, public data centers, wireline and/or wireless networks, private communication networks, user devices, peripherals associated with user devices, and the like, as well as various combinations thereof. It is noted that, in general, corporations use security mechanisms to secure their corporate networks and communications by their employees via their corporate networks. For example, security mechanisms typically used in corporate networks include firewalls, encryption/decryption of communications, virtual private networks (VPNs), and the like, as well as various combinations thereof. However, such security mechanisms typically used in corporate networks do not always guarantee end-to-end communication assurance or information assurance for communications by employees via the corporate networks, and certainly do not guarantee end-to-end communication assurance or information assurance for communications by employees via external networks. The current security environment of the corporation cannot adequately monitor the complex interactions that are made by corporate users of the corporation and the open communications environment of the corporation. - The access networks 120 may include any suitable access networks via which the corporate user may communicate regarding corporate matters. For example, the access networks 120 may include wireline access networks (e.g., cable networks, DSL networks, and the like) and/or wireless access networks (e.g., cellular networks, Wireless Fidelity (Wi-Fi) networks, satellite networks, and the like).
- The
communication network 130 represents any wide area communication network(s) adapted to transport communications of the corporate user. For example, thecommunication network 130 may include backhaul networks, the Internet, and the like as well as various combinations thereof. - The
communication assurance network 140 includescommunication assurance agent 141,profiles database 142, and securityassurance grading engine 145. Thecommunication assurance agent 141 is configured to provide security mechanisms to improve security of communications by the corporate user regarding corporate matters. Thecommunication assurance agent 141 also may be configured to provide security mechanisms to improve security of communications by the corporate user regarding personal matters. Thecommunication assurance agent 141 is configured to provide such security mechanisms using information fromprofiles database 142 and/or using security assurance grading engine 145 (and/or information from security assurance grading engine 145). - The
profiles database 142 includes auser profile 143 for the corporate user. Theuser profile 143 of the corporate user includes user information associated with the corporate user (e.g., name, address, network identification information, and the like, as well as various combinations thereof). Theuser profile 143 of the corporate user further includes communication context-based security profiles 144 (and/or otherwise points to communication context-based security profiles 144) associated with the corporate user. - The communication context-based
security profiles 144 for the corporate user include one or more profiles to be used in conjunction with communications of the corporate user. In general, a communication context-basedsecurity profile 144 for the corporate user specifies a security policy that is defined based on the context of the communication of corporate user, where the security policy specifies one or more security mechanisms to be applied for the communication of corporate user (e.g., a requested communication of the corporate user having associated therewith requested communication information matching the communication context defined by the security policy has the associated security mechanism(s) of the security policy applied thereto). - The communication context-based
security profiles 144 for the corporate user are defined and retrieved based on communication context. In one embodiment, communication context for a communication of the corporate user may be based on one or more of the type of communication to be used for the communication of the corporate user (e.g., voice, email, SMS, video, web browsing, and the like), an identity of the corporate user, a role of the corporate user (e.g., within the corporation, with a particular group within the corporation, for a particular project of the corporation, and the like), relationship-based information associated with the corporate user (an indication of a group within the corporation to which the corporate user belong, an indication of a project of the corporation on which the corporate user works, an indication of a relationship between the corporate user and an intended recipient(s) of the communication, and the like), a device type of the user device 102 used by the corporate user (e.g., fixed versus mobile, wireline versus wireless, computer versus smartphone, and the like), a network type of a network(s) to be used to support the communication, an identifier identifying the user device 102 being used by the corporate user for the communication, a recipient type of an intended recipient(s) of the communication, an identity of an intended recipient(s) of the communication, a subject of the communication, one or more details of the communication, and the like, as well as various combinations thereof. As noted above, the communication context-basedsecurity profiles 144 for the corporate user may be defined based on one or more of the above-described types of context information. Similarly, as noted above, when the corporate user initiates a request to communicate, requested communication information associated with the request to communicate and indicative of the context of the request to communicate (denoted herein as requested communication information) may be used to retrieve an appropriate communication context-basedsecurity profile 144 for use in providing security for the requested communication of the corporate user (e.g., in the form of one or more security mechanisms specified by the appropriate communication context-basedsecurity profile 144 retrieved for the requested communication of the corporate user). - The communication context-based
security profiles 144 for the corporate user may be defined for communications of the corporate user which may be between any suitable entities/devices and may be of any suitable type. For example, the communication of the corporate user may be between two user devices (e.g., between two users, between a group of individuals, and the like), between more than two user devices (e.g., conference calls, video conferencing, chat rooms, and the like), machine(s)-to-machine(s), and the like, as well as various combinations thereof. For example, the communication type may be a voice-based communication (e.g., a voice call between the corporate user and another user, a voice call between the corporate user and multiple other users, and the like), an email-based communication (e.g., sending of an email by the corporate user, the corporate user receiving a voicemail as an attachment in an email message by a service provider, and the like), an SMS-based communication (e.g., the corporate user sending a text message, the corporate user receiving a text message including a voicemail transcribed into text and included within the text message, and the like), a video-based communication, a web browsing communication, and the like, as well as various combinations thereof. It is noted that such communication types also may be referred to herein as communication services or communication service types (e.g., voice services, email services, SMS services, video services, web browsing services, and the like, as well as various combinations thereof). - The communication context-based
security profiles 144 for the corporate user may be defined using information from various resources. The resources may include one or more of: (1) one or more profiles of the corporate user (e.g., business profiles, personal profiles, social profiles, and the like), (2) the relationships and/or associations of the corporate user to one or more other users, one or more groups of users, one or more associations, one or more enterprises, one or more institutions, and the like, (3) the relationships and/or associations of the corporate user to a project, a type of project, an activity, a type of activity, a profession, a type of profession, an interest, a type of interest, a club, a type of club, and the like, (4) the relationships and/or associations of the corporate user to a service, a type of service, and the like, (5) the relationships and/or associations of the corporate user to a device or devices (e.g., to a device being used by the corporate user (e.g., corporate user device 102 1, corporate user device 102 2, personal user device 102 3, and the like), to a device with which the corporate user is to communicate, and the like), to a type of device (e.g., corporate versus personal, fixed versus mobile, computer versus smart phone, and the like), and the like, (6) the relationships and/or associations of the corporate user to use of a mode of communication, (7) communication environments and associated capabilities of the communication environments (e.g., where different communication environments offer different capabilities in terms of services, features, class of service, quality of service, user experience, identity management, storage, and the like), and (8) any other suitable type(s) of resources from which information may be determined for use in providing the communication context-based security profiles 144 for the corporate user. Although primarily depicted and described with respect to definition of the communication context-basedsecurity profiles 144 for the corporate user based on information specific to the corporate user, it is noted that the communication context-basedsecurity profiles 144 for the corporate user may be defined based on information associated with multiple corporate users (e.g., where communication context-based security profiles are defined for multiple corporate users based on information associated with the multiple corporate users and then the communication context-based security profiles are associated with each of the multiple corporate users for use in providing communication context-based security for the multiple corporate users). The communication context-basedsecurity profiles 144 for the corporate user also may be defined by deriving the context-basedsecurity profiles 144 for the corporate user from past communications by the corporate user (e.g., based on historical information associated with communication services/events as determined from various resources within one or more communication environments), and the like, as well as various combinations thereof. - The communication context-based
security profiles 144 for the corporate user may be retrieved, in response to requests by the corporate user to communicate, based on requested communication information determined from the requests to communicate (where the requested communication information may include any of the types of information which may be used to define the communication context-based security profiles 144). - The communication context-based
security profiles 144 are adapted to provide communication assurance for communication services used by the corporate user, as well as to provide information assurance for information transported via communication services used by the corporate user. The communication context-basedsecurity profiles 144 are adapted to provide information assurance even in cases where information of a communication by the corporate user has multiple states and/or multiple delivery mechanisms (e.g., where a caller leaves a voicemail for the corporate user that is later retrieved by the corporate user, where the corporate user leaves a voicemail for a fellow employee and the voicemail is sent to the employee as an attachment in an email, where a caller leaves a voicemail for the corporate user and the voicemail is converted into text and sent to the corporate user in a text message, and the like). The communication context-basedsecurity profiles 144 are adapted to provide communication/information assurance for communication services used for corporate communications within the corporation (e.g., between the corporate user and one or more corporate users and/or devices of the corporation), for communication services used for corporate communications outside of the corporation (e.g., between the corporate user and one or more users and/or devices outside of the corporation), for personal communications by the corporate user, and the like. In this manner, the communication context-basedsecurity profiles 144 are adapted to ensure that the end-to-end communication channel, and the information transported via the end-to-end communication channel, receives the appropriate level of security. Furthermore, the communication context-basedsecurity profiles 144 are adapted to ensure that the communication of the corporate user, and the information transported via the communication of the corporate user, are assured the appropriate level of security throughout the existence of that communication/information irrespective of its state or the delivery mechanism used. - As noted above, the communication context-based
security profiles 144 may be defined based on communication context in a number of ways. The communication context-basedsecurity profiles 144 may be defined at any suitable granularity. The communication context-basedsecurity profiles 144 may be organized in any suitable manner (e.g., in a flat arrangement, in a hierarchical arrangement, and the like, as well as various combinations thereof). These and various other characteristics of the communication context-basedsecurity profiles 144 may be better understood by way of reference to exemplary communication context-basedsecurity profiles 144 depicted and described with respect toFIG. 2 . - The security
assurance grading engine 145 maintains a plurality of security grades 146 1-146 N and a custom security grade 146 CUSTOM (collectively,security grades 146, which also are denoted as GRADE1-GRADEN and GRADECUSTOM). Thecustom security grade 146 CUSTOM may be defined using two or more of security grades 146 1-146 N. - The security
assurance grading engine 145 may be configured to define thesecurity grades 146. The securityassurance grading engine 145 may be configured to define thesecurity grades 146 based on the communication context-basedsecurity profiles 144 of the corporate user. The securityassurance grading engine 145 may be configured to generate the security grades 146 (e.g., using information from the communication context-basedsecurity profiles 144 of the profile database 141). In one embodiment, thesecurity grades 146 may be considered to be a representation of the communication context-basedsecurity profiles 144 of the corporate user (e.g., where eachsecurity grade 146 represents one or more of the communication context-basedsecurity profiles 144 maintained for the corporate user). In one embodiment, thesecurity grades 146 may be generated via processing of the communication context-basedsecurity profiles 144 of the corporate user. It is noted that fewer ormore security grades 146 may be defined/generated. It is noted that fewer or more than onecustom grade 146 CUSTOM may be defined/generated. It is noted that thesecurity grades 146 also may be referred to herein as security blankets. - The
security grades 146 are adapted for use by communication assurance agent 140 (and, optionally, by the security assurance grading engine 145) to provide security mechanisms to provide security assurance for communications of the corporate user. In one embodiment, eachsecurity grade 146 has one or more security mechanisms associated therewith, where the security mechanism(s) associated with asecurity grade 146 include the security mechanism(s) to be applied for communications of the corporate user that are deemed to fall within thatsecurity grade 146. In one embodiment, when a communication type/service is deemed to be of aparticular security grade 146, each communication associated with the communication type/service receives the same grade of service based on the security mechanism(s) of thatsecurity grade 146, where such security may be applied independent of time, network type, communication medium, storage medium, and the like. - The definition/generation and use of the
security grades 146 may be better understood by way of reference toFIG. 3 andFIG. 4 . - It is noted that, although primarily depicted and described with respect to embodiments in which the
communication assurance agent 141, theprofiles database 142, and thesecurity grades database 145 are deployed within a network (illustratively, communication assurance network 140), thecommunication assurance agent 141, theprofiles database 142, and/or thesecurity grades database 145 may be deployed in any suitable manner (e.g., one or more of these elements may reside within a service provider network, one or more of these elements may reside withincorporate network 110, one or more of these elements may reside within a Federated System, and the like, as well as various combinations thereof). - It is noted that, although
system 100 is depicted and described with respect to improving security of a single corporate user,system 100 may be configured to improve security for any number of corporate users of any number of corporations. - It is noted that, although
system 100 is depicted and described with respect to improving security of a corporate user,system 100 may be configured to improve security for any suitable type(s) of users (e.g., users employed by corporations but only looking to improve security of their personal communications, users not employed by corporations but looking to improve security of their personal communications, and the like, as well as various combinations thereof). -
FIG. 2 depicts an exemplary user profile including a set of communication context-based security profiles for the corporate user ofFIG. 1 . - The
user profile 143 of the corporate user includes user information associated with the corporate user. Theuser profile 143 of the corporate user further also includes and/or has associated therewith communication context-based security profiles 144. - The communication context-based
security profiles 144 for the corporate user include a plurality of corporate security profiles 144 C1-144 CN (collectively, corporate security profiles 144 C). - The
corporate security profiles 144 C may be better understood by considering an exemplary scenario in which the corporate user is a member of an organization within the corporation, is a member of an organization (ORG1) within the corporation, is a member of a group (GROUP 4) within the organization, and is assigned to work on two projects (PROJECT A withinGROUP 4 and PROJECT F which is a multi-group project). - The
corporate security profile 144 C1 is a profile defined for the corporation (e.g., to be used for any type of communication by the corporate user with any other member of the corporation). - The
corporate security profile 144 C2 is a profile defined for ORG1 of which the corporate user is a member (e.g., to be used for any type of communication by the corporate user with any other member of ORG1). - The
corporate security profile 144 C3 is a profile defined forGROUP 4 of which the corporate user is a member (e.g., to be used for any type of communication by the corporate user with any other member of GROUP 4). Thecorporate security profile 144 C3 includes two sub-profiles to be used for communications by the corporate user using two different user devices of the corporate user (e.g., a CORPORATE DEVICE profile to be used for communications by the corporate user with any other person ofGROUP 4 where the corporate user is using a corporate user device (e.g.,corporate user device 102 1 or corporate user device 102 2) and a PERSONAL DEVICE profile to be used for communications by the corporate user with any other person ofGROUP 4 where the corporate user is using a personal user device (e.g., personal user device 102 3)). - The
corporate security profile 144 C4 is a profile defined for PROJECT A to which the corporate user is assigned and includes two sub-profiles to be used for different types of communications by the corporate user related to PROJECT A (e.g., a VOICE profile to be used for voice communications by the corporate user with any other person associated with project A and an EMAIL profile to be used for email communications by the corporate user with any other person associated with project A). - The
corporate security profile 144 C5 is a profile defined for PROJECT F to which the corporate user is assigned and includes two sub-profiles to be used for communications by the corporate user with different groups working on PROJECT F (e.g., aGROUP 4 profile to be used for communications by the corporate user with any other person ofGROUP 4 who is assigned to work on PROJECT F and an OTHER profile to be used for communications by the corporate user with any other person associated withPROJECT 4 but not in GROUP 4). - The
corporate security profile 144 C6 is a profile defined for customers of the corporation (e.g., to be used for any type of communication by the corporate user with any of the customers of the corporation). - The
corporate security profile 144 C7 is a profile defined for any voice-based communication by the corporate user. - The
corporate security profile 144 C7 includes three sub-profiles to be used for communications by the corporate user using three different user devices of the corporate user (e.g., a CORPORATE DESKTOP DEVICE profile to be used for communications by the corporate user usingcorporate user device 102 1, a CORPORATE MOBILE DEVICE profile to be used for communications by the corporate user usingcorporate user device 102 2, and a PERSONAL DEVICE profile to be used for communications by the corporate user using corporate user device 102 3). - The
corporate security profile 144 C8 is a profile defined for any web browsing to be performed by the corporate user. - The
corporate security profile 144 CN is intended to represent the fact that any suitable number ofcorporate security profiles 144 C may be defined for the corporate user. - It is noted that the
corporate security profiles 144 C are merely exemplary and, thus, that any suitable numbers, types, and arrangements ofcorporate security profiles 144 C may be maintained for the corporate user. - The
corporate security profiles 144 C may be defined by the corporation on behalf of the corporate user (and, optionally, modified by the corporate user as needed), defined by the corporate user, and the like, as well as various combinations thereof. - It is noted that, although depicted and described with respect to embodiments in which the
corporate security profiles 144 C are defined for the corporate user, thecorporate security profiles 144 C may be defined for any suitable set of corporate users of the corporation and the user profile of the corporate user may then simply point to thecorporate security profiles 144 C to thereby associate thosecorporate security profiles 144 C with the corporate user for use in improving security of corporation-related communications of the corporate user. - The communication context-based
security profiles 144 for the corporate user also may include a plurality of personal security profiles 144 P1-144 PN (collectively, personal security profiles 144 P). - The
personal security profile 144 P1 is a profile defined for any personal voice communication to be performed by the corporate user. - The
personal security profile 144 P2 is a profile defined for any personal e-mail communication to be performed by the corporate user and includes three sub-profiles to be used for e-mail communications with different groups of people (e.g., a first sub-profile for e-mails to family and friends of the corporate user, a second sub-profile for e-mails to acquaintances of the corporate user, and a third sub-profile for e-mails to doctors of the corporate user). - The
personal security profile 144 P3 is a profile defined for any type of communication to be performed by the corporate user with one or more of the financial institutions of the corporate user. - The
personal security profile 144 P2 is a profile defined for any web-related communications to be performed by the corporate user and includes two sub-profiles to be used for different types of web browsing (e.g., a first sub-profile for web browsing and a second sub-profile for web-based purchases made by the corporate user). - The
personal security profile 144 PN is intended to represent the fact that any suitable number ofpersonal security profiles 144 P may be defined for the corporate user. - It is noted that the
personal security profiles 144 P are merely exemplary and, thus, that any suitable numbers, types, and arrangements ofpersonal security profiles 144 P may be maintained for the corporate user. - The
personal security profiles 144 P may be defined by the defined by the corporate user, defined by one or more other entities on behalf of the corporate user (and, optionally, modified by the corporate user as needed), and the like, as well as various combinations thereof. - It is noted that, although depicted and described with respect to embodiments in which the
personal security profiles 144 P are defined for the corporate user, thepersonal security profiles 144 P may be defined for any suitable set of users and the user profile of the corporate user may then simply point to thepersonal security profiles 144 P to thereby associate thosepersonal security profiles 144 P with the corporate user for use in improving security of personal communications of the corporate user. - The communication context-based
security profiles 144 of theuser profile 143 of the corporate user each may specify one or more security mechanisms to be used to secure the associated communications of the corporate user. For example, such security mechanisms may include use of encryption and decryption, and the like, as well as various combinations thereof. It will be appreciated that the types of security mechanisms associated with a given communication context-basedsecurity profile 144 may depend on factors such as the type of communication which may be used, the necessary or desired level of security for the communication, and the like, as well as various combinations thereof. - It is noted that, although primarily depicted and described with respect to embodiments in which the communication context-based
security profiles 144 are stored in theprofiles database 142 associated withcommunication assurance agent 141, some or all of the communication context-basedsecurity profiles 144 may be stored in other locations. For example, corporation-related communication context-based security profiles of the corporate user may be stored within thecorporate network 110. For example, personal communication context-based security profiles of the corporate user may be stored within thecorporate network 110 and/or a home network of the user. For example, personal communication context-based security profiles of the corporate user may be stored within the communications environments of entities with which the corporate user may communicate (e.g., Health Insurance Portability and Accounting Act (HIPPA)-related security profiles maintained within communications environments of doctors, Securities and Exchange Commission (SEC)-related security requirements maintained within communications environments of financial institutions, and the like). In at least some such embodiments, theprofiles database 142 may store indexes to communication context-basedsecurity profiles 144 stored in the other location(s), such that thecommunication assurance agent 141 may use the indexes in order to retrieve the communication context-basedsecurity profiles 144 when needed. In this sense, it will be appreciated that communication context-basedsecurity profiles 144 may be considered to be maintained in any suitable storage location(s) such that they are accessible for use bycommunication assurance agent 141 in providing security mechanisms for the corporate user. -
FIG. 3 depicts an exemplary set of security grades defined using communication context-based security profiles. - As depicted in
FIG. 3 (and also depicted and described with respect toFIG. 1 ), securityassurance grading engine 145 maintainsservice grades 146 which may be applied by communication assurance agent 140 (and, optionally, by the security assurance grading engine 145) to provide security mechanisms to provide security assurance for communications of the corporate user. - As further depicted in
FIG. 3 ,security grades 146 are defined based on corporate requirements 310 1, regulation requirements 310 2, user preferences 310 3, device capabilities 310 4, and network capabilities 310 5. It is noted that fewer or more, as well as other, types of information may be used to define the security grades 146 (e.g., just as fewer or more, as well as other, types of information may be used to define the communication context-basedsecurity profiles 144 of the corporate user). - As further depicted in
FIG. 3 , each security grade 146 1-146 N and 146 CUSTOM has a set of security mechanisms 320 1-320 N and 320 CUSTOM (collectively, security mechanisms 320) associated therewith, respectively. It is noted that a set ofsecurity mechanisms 320 associated with aservice grade 146 may include one or more security mechanisms to be applied for that security grade (e.g., encryption/decryption, use of a VPN, and the like). For example,security mechanisms 320 1 forsecurity grade 146 1 may specify use of encryption/decryption for communications by the corporate user that are deemed to fall withinsecurity grade 146 1. For example,security mechanisms 320 2 forsecurity grade 146 2 may specify use of a VPN for communications by the corporate user that are deemed to fall withinsecurity grade 146 2. For example,security mechanisms 320 N forsecurity grade 146 N may specify use of encryption/decryption and a VPN for communications by the corporate user that are deemed to fall withinsecurity grade 146 N. It is noted that any other suitable types of security mechanisms may be applied as part of the sets ofsecurity mechanisms 320. -
FIG. 4 depicts use of the exemplary security grades ofFIG. 3 to provide security for communications of the corporate user ofFIG. 1 . - As depicted in
FIG. 4 , the corporate user ofFIG. 1 has a plurality of user devices including user devices 102 1-102 3 depicted and described with respect toFIG. 1 as well as one or more additional user devices 102 (collectively, user devices 102) available for use by the corporate user to communicate. The association of the security grades 146 1-146 N with the user devices 102 1-102 N illustrates exemplary cases in which, for a given one of theuser devices 102, the corporate user selects theuser device 102 and then initiates a communication with the selecteduser device 102 and the context of the initiated communication results in use of the associatedsecurity grade 146 for the initiated communication. - As further depicted in
FIG. 4 ,communication assurance network 140 ofFIG. 1 is available to provide communication assurance for communications of the corporate user. Thecommunication assurance network 140 is depicted and described in detail with respect toFIG. 1-FIG . 3. - The use of
security grades 146 of the corporate user in order to secure the communications by the corporate user may be better understood by way of the following examples. - In a first example, the user selects user device 102 1 (e.g., a corporate smart phone of the corporate user) and initiates a voice call to his or her doctor. The context of the initiated communication of the corporate user (e.g., a voice call from the corporate user to the doctor via the corporate smart phone) results in selection of a particular security grade for use in securing the initiated communication (illustratively, the
security grade 146 1 which also is denoted as G1). As illustrated inFIG. 4 , the end-to-end communication from theuser device 102 1 of the corporate user to the user device of the doctor is secured by the security mechanisms specified forsecurity grade 146 1. Additionally, where the corporate user leaves a message for the doctor, the message also is secured by the security mechanisms specified for security grade 146 1 (as illustrated by use of the security mechanisms specified for security grade 416 1 to store the voicemail as an asset within in the network 410 1). In this manner, the communication of the corporate user and its associated information is assured end-to-end as long as the asset is available. - In a second example, the user selects user device 102 2 (e.g., a personal smart phone of the corporate user) and initiates a voice call to his or her colleague at the corporation. The context of the initiated communication of the corporate user (e.g., a voice call from the corporate user to another corporate user via the personal smart phone) results in selection of a particular security grade for use in securing the initiated communication (illustratively, the
security grade 146 2 which also is denoted as G2). As illustrated inFIG. 4 , the end-to-end communication from theuser device 102 2 of the corporate user to the user device of the colleague is secured by the security mechanisms specified forsecurity grade 146 2. Additionally, where the corporate user leaves a message for the colleague, the message also is secured by the security mechanisms specified for security grade 146 2 (as illustrated by use of the security mechanisms specified forsecurity grade 146 2 to store the voicemail as an asset within in the network 410 2). In this manner, the communication of the corporate user and its associated information is assured end-to-end as long as the asset is available. - The use of communication context-based
security profiles 144 to improve security of communications by the corporate user is depicted and described with respect toFIG. 5 . -
FIG. 5 depicts one embodiment of a method for using communication context-based security profiles of the corporate user to improve the security of communications by the corporate user. - At
step 505,method 500 begins. - At
step 510, the user device of the corporate user detects a communication request. As described herein, detection of the communication request may vary across different communication types. For example, for voice communications the user device may detect entry of a telephone number and pressing of a submit button to initiate a call, opening of a voice call application and selecting of the name of a person to call, and the like. For example, for e-mail communication the user device may detect opening of an email application, logging in to an email service, opening of an e-mail message to be sent and entry of information, and the like. For example, for SMS communication the user device may detect opening of an SMS application, logging in to an SMS service, opening of an SMS message to be sent and entry of information, and the like. For example, for web browsing the user device may detect opening of a web browser, entry of search criteria into a search interface of a web browser, and the like. More generally, a request by the corporate user to communicate may be considered to include an action via which an indication of a request to communicate may be detected by theuser device 110. - At
step 515, the user device of the corporate user determines communication request information associated with the communication request. For example, the communication request information may include an identity of the corporate user of the user device, an identifier identifying the user device of the corporate user, an indication of a type of user device of the corporate user (e.g., corporate versus personal, fixed versus mobile, and the like), an identity of at least one entity and/or device intended as a destination of the requested communication, a communication type of the requested communication (e.g., voice call, e-mail, SMS message, web browsing, and the like), a subject of the requested communication, one or more details of the requested communication, and the like, as well as various combinations thereof. It is noted that, in at least some cases, a portion of the communication request information may be determined as part ofstep 510. - At
step 520, the user device of the corporate user propagates the communication request information toward the communication assurance agent. Atstep 525, the communication assurance agent receives the communication request information from the user device of the corporate user. - At
step 530, the communication assurance agent selects a communication context-based security profile based on the communication request information. - The communication assurance agent identifies the communication context-based security profiles associated with the corporate user (e.g., from information included within the communication request information received at the communication assurance agent from the user device). The communication assurance agent then selects one of the communication context-based security profiles associated with the corporate user, as the communication context-based security profile to be used for the requested communication of the corporate user, based on the communication request information received at the communication assurance agent from the user device. The selection of the communication context-based security profile may be performed based on keyword matching between information included in the communication request information and information included in the communication context-based security profiles associated with the corporate user, by considering the communication context-based security profiles associated with the corporate user in priority order until identifying one of the communication context-based security profiles as being a match satisfying a matching threshold, by considering portions of the communication request information in priority order until identifying one of the communication context-based security profiles as being a match satisfying a matching threshold, and the like, as well as various combinations thereof.
- In one embodiment, where multiple communication context-based security profiles apply to the requested communication of the corporate user, any potential conflict between the multiple communication context-based security profiles may be resolved in any suitable manner (e.g., based on priority levels assigned to the communication context-based security profiles, using a lowest common denominator approach via comparison of security features of the communication context-based security profiles, using a greatest common denominator approach, via comparison of security features of the communication context-based security profiles, and the like, as well as various combinations thereof).
- At
step 535, the communication assurance agent propagates an indication of the selected communication context-based security profile toward the user device. Atstep 540, the user device receives the indication of the selected communication context-based security profile from the communication assurance agent. - At
step 545, the user device initiates the requested communication based on the selected communication context-based security profile. The communication context-based security profile indicates one or more security mechanisms to be used for the requested communication of the corporate user. It will be appreciated that the initiation of the requested communication based on the selected communication context-based security profile depends, at least in part, on the type of communication. Thus, the initiation of the requested communication based on the selected communication context-based security profile may be better understood by considering examples related to different types of communication which may be initiated by the corporate user. - For example, where the indication of the requested communication indicates initiation of a voice call, initiation of the requested communication based on the selected communication context-based security profile may include initiating signaling for establishing the voice session such that the voice session is based on one or more security parameters (e.g., using a particular type of encryption/decryption).
- For example, where the indication of the requested communication indicates sending of an e-mail, initiation of the requested communication based on the selected communication context-based security profile may include sending the email from the user device using one or more security mechanisms (e.g., using a particular type of encryption/decryption, and the like).
- For example, where the indication of the requested communication indicates sending of an SMS message, initiation of the requested communication based on the selected communication context-based security profile may include sending the SMS message from the user device using one or more security mechanisms (e.g., using a particular type of encryption/decryption, and the like).
- For example, where the indication of the requested communication indicates entry of information for browsing the Internet, initiation of the requested communication based on the selected communication context-based security profile may include sending the search request from the user device using one or more security mechanisms related to web browsing.
- For example, where the indication of the requested communication indicates entry of information for making a purchase via the Internet, initiation of the requested communication based on the selected communication context-based security profile may include sending the search request from the user device using one or more security mechanisms (e.g., using a particular type of encryption/decryption, and the like).
- It is noted that the security mechanisms may be applied in any suitable manner, which may depend on the type(s) of security mechanism(s) to be applied. In at least some embodiments, one or more of the security mechanisms may be delivered as security application programming interfaces (APIs).
- At
step 550, themethod 500 ends. - It is noted that, although primarily depicted and described with respect to embodiments in which the communication assurance agent propagates an indication of the selected communication context-based security profile toward the user device, the communication assurance agent alternatively or additionally may propagate an indication of the selected communication context-based security profile toward at least one network device which may be configured to apply one or more security mechanisms for the requested communication of the user device. For example, the communication assurance agent alternatively or additionally may propagate an indication of the selected communication context-based security profile toward a boundary device of the corporate network with which the user device is associated, toward one or more devices of an access network with which the user device is associated, toward one or more devices of a core network supporting the requested communication of the corporate user, toward one or more servers providing services related to the requested communication, toward one or more application servers related to the requested communication, and the like, as well as various combinations thereof.
- It is noted that, although primarily depicted and described with respect to embodiments in which the communication assurance agent selects one communication context-based security profile for the requested communication of the corporate user, in at least some embodiments the communication assurance agent may be configured to select multiple communication context-based security profile for the requested communication of the corporate user.
- In one embodiment, the communication assurance agent may select one of the multiple communication context-based security profiles on behalf of the user device (e.g., selecting the profiles based on a prioritization of the profiles, selecting the profile having the most stringent security requirements, and or using any other suitable selection criteria) and propagate an indication of the selected one of the communication context-based security profiles toward the user device for use by the user device for the requested communication of the corporate user.
- In one embodiment, the communication assurance agent may select two or more of the communication context-based security profiles on behalf of the user device (e.g., based on any suitable selection criteria, such as those discussed above for selection of one of the communication context-based security profiles by the communication assurance agent on behalf of the user device) and propagate indications of the selected communication context-based security profiles toward the user device. In one embodiment, the communication assurance agent may propagate indications of each of the selected communication context-based security profiles toward the user device. In one embodiment, in which the user device receives indications of multiple communication context-based security profiles from the communication assurance agent, the user device may select one of the multiple communication context-based security profiles to use for the requested communication, and then to use the selected one of the communication context-based security profiles for the requested communication. In one embodiment, in which the user device receives indications of multiple communication context-based security profiles from the communication assurance agent, the user device may use some or all of the multiple communication context-based security profiles (to the extent that such communication context-based security policies are consistent with each other) for the requested communication (e.g., applying all security mechanisms specified in the communication context-based security profiles, applying the most stringent of each of the security mechanisms specified in the communication context-based security profiles, and the like).
- It is noted that, although primarily depicted and described with respect to embodiments in which a communication context-based security profile is determined only for the source side of a requested communication, a communication context-based security profile also may be determined for the destination side of a requested communication. In one embodiment, the process performed for the destination side of the requested communication is similar to the process performed for the source side of the requested communication as depicted and described with respect to
FIGS. 1-5 . In one embodiment, the source and destination user devices communicate with the same communication assurance agent for determining the respective communication context-based security profiles to be used by the source and destination user devices. In one embodiment, the source and destination user devices communicate with different communication assurance agents for determining the respective communication context-based security profiles to be used by the source and destination user devices. In one embodiment, in which the source and destination user devices use different communication assurance agents, the communication assurance agents may be configured to communicate with each other for purposes of determining a set of security mechanisms to be used for communication between the source and destination user devices. In one embodiment, in which the source and destination user devices use different communication assurance agents, the communication assurance agents may be configured to communicate with one or more other elements (e.g., a higher level communication assurance agent in a hierarchy of communication assurance agents) for purposes of determining a set of security mechanisms to be used for communication between the source and destination user devices. In one embodiment, where processing is performed to determine a set of security mechanisms to be used for communication between the source and destination user devices, the processing may be performed using any suitable mechanism for reconciling the respective communication context-based security profiles to be used by the source and destination user devices (e.g., selecting security mechanisms common to the respective communication context-based security profiles selected for the source and destination user devices, selecting the highest level of security common to the respective communication context-based security profiles selected for the source and destination user devices, selecting the highest level of security specified by the respective communication context-based security profiles selected for the source and destination user devices, and the like). - It is noted that, although primarily depicted and described herein with respect to embodiments in which the security mechanism/service grade is applied to the requested communication of the corporate user, the security mechanism(s)/service grade to be applied to the requested communication of the corporate user, and/or any other suitable the security mechanism(s)/service grade, may be applied to any communication/service derived from the requested communication of the corporate user irrespective of whether or not the corporate user or the user device of the corporate user is involved (directly or indirectly) in communication/service derived from the requested communication of the corporate user. This may be used, for example, where one or more communications/services are spawned by some action or actions taken by or otherwise associated with the corporate user.
- For example, when the corporate user leaves a voicemail for an intended recipient and the delivery of the voicemail to a voice mailbox of the intended recipient is secured using an appropriate security mechanism(s)/security grade, one or more settings for the intended recipient may result in initiation by a network device of a voicemail transcription service which enables a text transcription of the voicemail to be delivered to the intended recipient via email or text message and the delivery of the text transcription of the voicemail may then be secured using an appropriate security mechanism(s)/security grade (which may be the same as or different than the security mechanism(s)/security grade used to deliver the voicemail to the voice mailbox of the intended recipient) in accordance with embodiments depicted and described herein.
- For example, when the corporate user is having a health problem and initiates a call to his or her doctor, a voice connection is established between the corporate user and the doctor using an appropriate security mechanism(s)/security grade based on the context of the requested communication. In this case, during the voice call between the corporate user and the doctor, a service hosted within the network and monitoring the content of the voice call may detect distress on the part of the corporate user and, in response, may automatically initiate conversion of the voice call to a video call between the corporate user and the doctor such that the doctor can perform a visual inspection of the corporate user almost immediately. In this case, the video call that is spawned automatically as a result of monitoring performed within the network may then be secured using an appropriate security mechanism(s)/security grade (which may be the same as or different than the security mechanism(s)/security grade used for the voice call between the corporate user and the doctor) in accordance with embodiments depicted and described herein.
- It will be appreciated that these are merely a few of the ways in which derived instances of a requested communication of a corporate user may be provided with appropriate security and assurance in accordance with embodiments depicted and described herein. In one embodiment, the
communication assurance agent 141 is configured to detect initiation of a derived instance of the requested communication. The derived instance of the requested communication may include one or both of a service and a communication. Thecommunication assurance agent 141 may be configured to initiate application of the at least one security mechanism to the derived instance of the requested communication. Thecommunication assurance agent 141, where the communication context-based security profile selected for the requested communication of the corporate user is a first communication context-based security profile, may be configured to select a second communication context-based security profile for the derived instance of the requested communication, and propagate an indication of the selected second communication context-based security profile toward at least one of the user device and a network device for use in applying at least one security mechanism to the derived instance of the requested communication. - It is noted that, although primarily depicted and described with respect to embodiments in which the
communication assurance agent 141 is hosted within a network, thecommunication assurance agent 141 may be hosted at any other suitable location. In one embodiment, for example, thecommunication assurance agent 141 may be hosted within thecorporate network 110 for use by multiple corporate users (including the corporate user depicted and described with respect toFIG. 1 ). In one embodiment, for example, thecommunication assurance agent 141 may be hosted on each of theuser devices 102 of the corporate user (in whichcase method 500 ofFIG. 5 includes communication between elements of theuser device 102 from which the communication request is initiated). In one embodiment, for example, the functions of thecommunication assurance agent 141 for the corporate user may be arranged using a combination of such embodiments (e.g., where at least some communication assurance agent functions are hosted within the network while at least some communication assurance agent functions are hosted on theuser devices 102 of the corporate user). - Although primarily depicted and described with respect to providing security for communications of corporate users, the various embodiments depicted and described herein may be adapted for use in providing security for communications of any other suitable types of end users.
-
FIG. 6 depicts a high-level block diagram of a computer suitable for use in performing functions described herein. - As depicted in
FIG. 6 ,computer 600 includes a processor element 602 (e.g., a central processing unit (CPU) and/or other suitable processor(s)) and a memory 604 (e.g., random access memory (RAM), read only memory (ROM), and the like). Thecomputer 600 also may include a cooperating module/process 605 and/or various input/output devices 606 (e.g., a user input device (such as a keyboard, a keypad, a mouse, and the like), a user output device (such as a display, a speaker, and the like), an input port, an output port, a receiver, a transmitter, and storage devices (e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, and the like)). - It will be appreciated that the functions depicted and described herein may be implemented in software (e.g., via implementation of software on one or more processors) and/or may be implemented in hardware (e.g., using a general purpose computer, one or more application specific integrated circuits (ASIC), and/or any other hardware equivalents).
- It will be appreciated that the functions depicted and described herein may be implemented in software (e.g., for executing on a general purpose computer (e.g., via execution by one or more processors) so as to implement a special purpose computer) and/or may be implemented in hardware (e.g., using one or more application specific integrated circuits (ASIC) and/or one or more other hardware equivalents).
- In one embodiment, the cooperating
process 605 can be loaded intomemory 604 and executed by theprocessor 602 to implement functions as discussed herein. Thus, cooperating process 605 (including associated data structures) can be stored on a computer readable storage medium, e.g., RAM memory, magnetic or optical drive or diskette, and the like. - It will be appreciated that
computer 600 depicted inFIG. 6 provides a general architecture and functionality suitable for implementing functional elements described herein and/or portions of functional elements described herein. For example, thecomputer 600 provides a general architecture and functionality suitable for implementing one or more ofcorporate user device 102 1,corporate user device 102 2,personal user device 102 3,communication assurance agent 141, andprofiles database 142. Foruser devices 102, for example,computer 600 may be implemented using any suitable forms and factors, both stationary and mobile, which may be used for a user device (e.g., desktops, laptops, tablets, smartphones, handsets, palmtops, and the like). For elements other thanuser devices 102, for example,computer 600 may be implemented as a server, a server farm, a cloud computing platform, one or more virtual machines over one or more hardware platforms, a mainframe computer or its variations, and the like, as well as various combinations thereof. - It is contemplated that some of the steps discussed herein as software methods may be implemented within hardware, for example, as circuitry that cooperates with the processor to perform various method steps. Portions of the functions/elements described herein may be implemented as a computer program product wherein computer instructions, when processed by a computer, adapt the operation of the computer such that the methods and/or techniques described herein are invoked or otherwise provided. Instructions for invoking the inventive methods may be stored in fixed or removable media, transmitted via a data stream in a broadcast or other signal bearing medium, and/or stored within a memory within a computing device operating according to the instructions.
- Although various embodiments which incorporate the teachings of the present invention have been shown and described in detail herein, those skilled in the art can readily devise many other varied embodiments that still incorporate these teachings.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/427,668 US20130254830A1 (en) | 2012-03-22 | 2012-03-22 | Apparatus and method for assuring communications of corporate users |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261614345P | 2012-03-22 | 2012-03-22 | |
US13/427,668 US20130254830A1 (en) | 2012-03-22 | 2012-03-22 | Apparatus and method for assuring communications of corporate users |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130254830A1 true US20130254830A1 (en) | 2013-09-26 |
Family
ID=49213398
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/427,668 Abandoned US20130254830A1 (en) | 2012-03-22 | 2012-03-22 | Apparatus and method for assuring communications of corporate users |
US13/731,645 Abandoned US20130254854A1 (en) | 2012-03-22 | 2012-12-31 | Individual and institution virtualization mechanisms |
US13/731,597 Expired - Fee Related US9621407B2 (en) | 2012-03-22 | 2012-12-31 | Apparatus and method for pattern hiding and traffic hopping |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/731,645 Abandoned US20130254854A1 (en) | 2012-03-22 | 2012-12-31 | Individual and institution virtualization mechanisms |
US13/731,597 Expired - Fee Related US9621407B2 (en) | 2012-03-22 | 2012-12-31 | Apparatus and method for pattern hiding and traffic hopping |
Country Status (1)
Country | Link |
---|---|
US (3) | US20130254830A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11290560B2 (en) * | 2019-09-30 | 2022-03-29 | Slack Technologies, Llc | Group-based communication apparatus, method, and computer program product configured to manage draft messages in a group-based communication system |
US11412013B2 (en) * | 2019-08-07 | 2022-08-09 | Jpmorgan Chase Bank, N.A. | System and method for implementing video soft phone applications |
US11836443B2 (en) * | 2022-01-25 | 2023-12-05 | Microsoft Technology Licensing, Llc | Populating contact information within an electronic message based on contact relationship information |
US12199985B2 (en) * | 2018-11-27 | 2025-01-14 | Salesforce, Inc. | Multi-modal user authorization in group-based communication systems |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9332408B2 (en) * | 2012-05-07 | 2016-05-03 | Movius Interactive Corporation | System and method for provision of a second line service to a telecommunications device |
US9332425B2 (en) * | 2012-05-07 | 2016-05-03 | Movius Interactive Corporation | System and method for provision of a second line service to a telecommunications device using mixed protocols |
US11082548B2 (en) * | 2008-06-05 | 2021-08-03 | Movius Interactive Corporation | System and method for providing a pre-populated second line service to a telecommunications device |
US9967797B2 (en) * | 2008-06-05 | 2018-05-08 | Movius Interactive Corp | System and method for provision of a second line service to a telecommunications device using mixed relationship numbers |
US9384356B2 (en) * | 2012-06-29 | 2016-07-05 | Hewlett-Packard Development Company, L.P. | Obscuring internet tendencies |
CN103731342A (en) * | 2014-01-25 | 2014-04-16 | 青岛英特沃克网络科技有限公司 | Instant message based workflow management system and management method |
NL2014348B1 (en) | 2015-02-25 | 2016-10-13 | Univ Delft Tech | Controlled release from particles encapsulated by molecular layer deposition. |
DE102015104159B4 (en) * | 2015-03-19 | 2018-05-09 | Forensik.It Gmbh | Selection between a real and a virtual user-specific data record for a data communication |
US9866521B2 (en) | 2015-07-30 | 2018-01-09 | At&T Intellectual Property L.L.P. | Methods, systems, and computer readable storage devices for determining whether to forward requests from a physical telephone number mapping service server to a virtual telephone number mapping service server |
US9851999B2 (en) | 2015-07-30 | 2017-12-26 | At&T Intellectual Property I, L.P. | Methods, systems, and computer readable storage devices for handling virtualization of a physical telephone number mapping service |
US10277736B2 (en) | 2015-07-30 | 2019-04-30 | At&T Intellectual Property I, L.P. | Methods, systems, and computer readable storage devices for determining whether to handle a request for communication services by a physical telephone number mapping service or a virtual telephone number mapping service |
US10083322B2 (en) * | 2015-07-30 | 2018-09-25 | International Business Machines Corporation | Obscuring user web usage patterns |
US9888127B2 (en) * | 2015-07-30 | 2018-02-06 | At&T Intellectual Property I, L.P. | Methods, systems, and computer readable storage devices for adjusting the use of virtual resources providing communication services based on load |
KR101779815B1 (en) * | 2015-10-21 | 2017-09-19 | (주)케이클라우드 | The mail security printing processing system and method by using virtual address |
US9882865B1 (en) * | 2016-07-01 | 2018-01-30 | Pinger, Inc. | Multiple phone numbers for mobile device |
US10565266B2 (en) * | 2016-09-29 | 2020-02-18 | Konica Minolta Laboratory U.S.A., Inc. | Method and system for multiple profile creation to mitigate profiling |
US10237410B1 (en) | 2017-04-28 | 2019-03-19 | Pinger, Inc. | Handling declined calls for alternate phone number on mobile device |
CN109040034B (en) * | 2018-07-19 | 2021-06-04 | 国政通科技有限公司 | User identity information processing method and device based on virtual information |
KR102479456B1 (en) * | 2020-03-31 | 2022-12-21 | 엘지전자 주식회사 | Security policy processing method and terminal for V2X |
US11429182B2 (en) * | 2020-05-18 | 2022-08-30 | Capital One Services, Llc | Augmented reality virtual number generation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040268148A1 (en) * | 2003-06-30 | 2004-12-30 | Nokia, Inc. | Method for implementing secure corporate Communication |
US20050260973A1 (en) * | 2004-05-24 | 2005-11-24 | Van De Groenendaal Joannes G | Wireless manager and method for managing wireless devices |
US20080020735A1 (en) * | 2006-07-20 | 2008-01-24 | George Baldwin Bumiller | Electronic File Transfer For A Communications Device |
US20110055912A1 (en) * | 2009-08-25 | 2011-03-03 | Sentillion, Inc. | Methods and apparatus for enabling context sharing |
US20130081101A1 (en) * | 2011-09-27 | 2013-03-28 | Amazon Technologies, Inc. | Policy compliance-based secure data access |
Family Cites Families (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2174050T3 (en) * | 1996-01-12 | 2002-11-01 | Ibm | ANONYMOUS EXCHANGE AND INFORMATION SECURITY IN A NETWORK. |
US5961593A (en) * | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
CA2225227A1 (en) * | 1997-12-18 | 1999-06-18 | Michael Coveley | Intelligent communication and applications server |
JP2002518726A (en) * | 1998-06-19 | 2002-06-25 | サンマイクロシステムズ インコーポレーテッド | A highly scalable proxy server using plug-in filters |
US7630986B1 (en) * | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
US7412422B2 (en) * | 2000-03-23 | 2008-08-12 | Dekel Shiloh | Method and system for securing user identities and creating virtual users to enhance privacy on a communication network |
CA2319871A1 (en) * | 2000-09-15 | 2002-03-15 | John Edward Anthony Chesko | Internet privacy system |
US20040139204A1 (en) * | 2001-04-23 | 2004-07-15 | Siegried Ergezinger | Architecture for providing services in the internet |
US20030084165A1 (en) * | 2001-10-12 | 2003-05-01 | Openwave Systems Inc. | User-centric session management for client-server interaction using multiple applications and devices |
KR20040044558A (en) * | 2001-10-23 | 2004-05-28 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Anonymous network-access method and client |
US6990590B2 (en) * | 2002-01-10 | 2006-01-24 | International Business Machines Corporation | Strategic internet persona assumption |
US7644436B2 (en) | 2002-01-24 | 2010-01-05 | Arxceo Corporation | Intelligent firewall |
GB2407735A (en) | 2002-05-28 | 2005-05-04 | Alan H Teague | Message processing based on address patterns and automated management and control of contact aliases |
DE60319431T2 (en) * | 2003-01-06 | 2009-02-26 | International Business Machines Corp. | USER-CENTER DEVICE AND METHOD |
US7945511B2 (en) | 2004-02-26 | 2011-05-17 | Payment Pathways, Inc. | Methods and systems for identity authentication |
EP1668859B1 (en) * | 2003-09-30 | 2010-04-14 | Telefonaktiebolaget LM Ericsson (publ) | Means and method for generating a unique user's identity for use between different domains |
KR100829471B1 (en) * | 2003-10-17 | 2008-05-19 | 니폰덴신뎅와 가부시키가이샤 | Mail distribution system, mail distribution method, and mail distribution program |
US20060182103A1 (en) | 2005-02-16 | 2006-08-17 | Phantom Technologies, Llc. | System and method for routing network messages |
MX2007012683A (en) * | 2005-04-12 | 2008-01-11 | Telecomm Systems Inc | Temporary enum gateway. |
US7624417B2 (en) | 2006-01-27 | 2009-11-24 | Robin Dua | Method and system for accessing media content via the internet |
US7845003B2 (en) * | 2006-10-31 | 2010-11-30 | Novell, Inc. | Techniques for variable security access information |
US20080208611A1 (en) | 2007-02-26 | 2008-08-28 | Krooss Kevin W | Addressing method for freight, cargo and mail |
US8472972B2 (en) * | 2007-11-21 | 2013-06-25 | International Business Machines Corporation | Device, system, and method of physical context based wireless communication |
US20090150488A1 (en) * | 2007-12-07 | 2009-06-11 | Martin-Cocher Gaelle | System and method for managing multiple external identities of users with local or network based address book |
US20090210714A1 (en) | 2008-01-23 | 2009-08-20 | Sultan Haider | Method for electronically signing electronic documents and method for verifying an electronic signature |
US8302161B2 (en) * | 2008-02-25 | 2012-10-30 | Emc Corporation | Techniques for anonymous internet access |
US9886506B2 (en) * | 2008-06-19 | 2018-02-06 | Sns Conference Corporation | Integration of news into direct social communications and interactions |
US9712341B2 (en) | 2009-01-16 | 2017-07-18 | Tekelec, Inc. | Methods, systems, and computer readable media for providing E.164 number mapping (ENUM) translation at a bearer independent call control (BICC) and/or session intiation protocol (SIP) router |
US8856269B2 (en) * | 2009-02-20 | 2014-10-07 | Ca, Inc. | System and method for identifying a masked IP address |
US8621090B2 (en) | 2009-05-07 | 2013-12-31 | Match.Com, L.L.C. | System and method for providing sequenced anonymous communication sessions over a network |
US20100299603A1 (en) * | 2009-05-22 | 2010-11-25 | Bernard Farkas | User-Customized Subject-Categorized Website Entertainment Database |
US8458342B2 (en) * | 2009-07-27 | 2013-06-04 | At&T Intellectual Property I, L.P. | Method and apparatus resolving ENUM data collisions |
US8468348B1 (en) | 2009-09-01 | 2013-06-18 | Amazon Technologies, Inc. | Closed loop communication |
CN103039049B (en) * | 2010-06-06 | 2016-08-24 | 泰克莱克股份有限公司 | For covering the method for Diameter node information, system and computer-readable medium in a communication network |
US8799480B2 (en) * | 2010-07-19 | 2014-08-05 | Movik Networks | Content pre-fetching and CDN assist methods in a wireless mobile network |
US20120195235A1 (en) | 2011-02-01 | 2012-08-02 | Telelfonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for specifying a user's preferred spoken language for network communication services |
US9203799B2 (en) | 2011-03-31 | 2015-12-01 | NextPlane, Inc. | Method and system for advanced alias domain routing |
US20120317205A1 (en) | 2011-06-10 | 2012-12-13 | Microsoft Corporation | Anonymous location-based notification |
US9471605B2 (en) * | 2011-06-21 | 2016-10-18 | International Business Machines Corporation | Contact recommendation system for a user communication |
US10185814B2 (en) * | 2011-09-07 | 2019-01-22 | Elwha Llc | Computational systems and methods for verifying personal information during transactions |
WO2013057548A1 (en) | 2011-10-21 | 2013-04-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Real-time communications methods providing pause and resume functionality and related devices |
US20130129066A1 (en) | 2011-11-21 | 2013-05-23 | Cellco Partnership D/B/A Verizon Wireless | System for and method of providing lata information in response to a lnp query |
-
2012
- 2012-03-22 US US13/427,668 patent/US20130254830A1/en not_active Abandoned
- 2012-12-31 US US13/731,645 patent/US20130254854A1/en not_active Abandoned
- 2012-12-31 US US13/731,597 patent/US9621407B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040268148A1 (en) * | 2003-06-30 | 2004-12-30 | Nokia, Inc. | Method for implementing secure corporate Communication |
US20050260973A1 (en) * | 2004-05-24 | 2005-11-24 | Van De Groenendaal Joannes G | Wireless manager and method for managing wireless devices |
US20080020735A1 (en) * | 2006-07-20 | 2008-01-24 | George Baldwin Bumiller | Electronic File Transfer For A Communications Device |
US20110055912A1 (en) * | 2009-08-25 | 2011-03-03 | Sentillion, Inc. | Methods and apparatus for enabling context sharing |
US20130081101A1 (en) * | 2011-09-27 | 2013-03-28 | Amazon Technologies, Inc. | Policy compliance-based secure data access |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12199985B2 (en) * | 2018-11-27 | 2025-01-14 | Salesforce, Inc. | Multi-modal user authorization in group-based communication systems |
US11412013B2 (en) * | 2019-08-07 | 2022-08-09 | Jpmorgan Chase Bank, N.A. | System and method for implementing video soft phone applications |
US11290560B2 (en) * | 2019-09-30 | 2022-03-29 | Slack Technologies, Llc | Group-based communication apparatus, method, and computer program product configured to manage draft messages in a group-based communication system |
US20220286529A1 (en) * | 2019-09-30 | 2022-09-08 | Salesforce.Com., Inc. | Group-Based Communication Apparatus, Method, And Computer Program Product Configured To Manage Draft Messages In A Group-Based Communication System |
US11563825B2 (en) * | 2019-09-30 | 2023-01-24 | Salesforce, Inc. | Group-based communication apparatus, method, and computer program product configured to manage draft messages in a group-based communication system |
US20230164240A1 (en) * | 2019-09-30 | 2023-05-25 | Salesforce, Inc. | Group-Based Communication Apparatus, Method, And Computer Program Product Configured To Manage Draft Messages In A Group-Based Communication System |
US12231517B2 (en) * | 2019-09-30 | 2025-02-18 | Salesforce, Inc. | Group-based communication apparatus, method, and computer program product configured to manage draft messages in a group-based communication system |
US11836443B2 (en) * | 2022-01-25 | 2023-12-05 | Microsoft Technology Licensing, Llc | Populating contact information within an electronic message based on contact relationship information |
Also Published As
Publication number | Publication date |
---|---|
US20130254854A1 (en) | 2013-09-26 |
US9621407B2 (en) | 2017-04-11 |
US20130254364A1 (en) | 2013-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130254830A1 (en) | Apparatus and method for assuring communications of corporate users | |
US11750540B2 (en) | Systems and methods for managing electronic communications | |
US20220245278A1 (en) | Detecting and preventing storage of unsolicited sensitive personal information | |
US12238146B2 (en) | Switch controller for separating multiple portions of call | |
US9225790B2 (en) | Location based network usage policies | |
US7509384B1 (en) | Integrated method of ensuring instant messaging security on confidential subject matter | |
US8666052B2 (en) | Universal phone number for contacting group members | |
US9282157B2 (en) | Intermediary API for providing presence data to requesting clients | |
CN102439566A (en) | Detection of the user availability in a distributed system based on software, hardware and/or utilization criteria | |
CN107181755B (en) | An identification method, device and system for an office platform | |
US9043388B2 (en) | Aggregation and queuing of communications | |
US20160127556A1 (en) | System and method for selecting an agent in an enterprise | |
US10848908B2 (en) | Proximity based communication information sharing | |
US20130346514A1 (en) | Gathering context information for a communication | |
CA2912703C (en) | Location based network usage policies | |
HK1219009A1 (en) | Communications server apparatus and methods of operation thereof | |
Clark | Engaging Vulnerable Clients on the Phone: A Guide for Care Finders |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOGANTI, MADHAV;PANDIT, MAYURESH;SANKALIA, ANISH;AND OTHERS;SIGNING DATES FROM 20120323 TO 20120403;REEL/FRAME:028066/0599 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627 Effective date: 20130130 |
|
AS | Assignment |
Owner name: ALCATEL LUCENT, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030252/0022 Effective date: 20130418 |
|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033949/0016 Effective date: 20140819 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |