The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 01, 2013
Filed:
May. 06, 2008
Timothy R. Chavez, Austin, TX (US);
Jacob D. Eisinger, Austin, TX (US);
Michael C. Hollinger, Austin, TX (US);
Jennifer E. King, Austin, TX (US);
Christina K. Lauridsen, Austin, TX (US);
Fabian F. Morgan, Austin, TX (US);
Timothy R. Chavez, Austin, TX (US);
Jacob D. Eisinger, Austin, TX (US);
Michael C. Hollinger, Austin, TX (US);
Jennifer E. King, Austin, TX (US);
Christina K. Lauridsen, Austin, TX (US);
Fabian F. Morgan, Austin, TX (US);
International Business Machines Corporation, Armonk, NY (US);
Abstract
A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication.