METHOD AND SYSTEM FOR CONFERENCE CALL SECURITY OVERRIDE
A method for controlling access to a conference call, the method comprising authenticating a mobile device in accordance with access requirements for the conference call rejecting the mobile device if the participant does not comply with the access requirements in response to the rejection, determin...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English French |
Published |
04.07.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A method for controlling access to a conference call, the method comprising authenticating a mobile device in accordance with access requirements for the conference call rejecting the mobile device if the participant does not comply with the access requirements in response to the rejection, determining by a processor based on information other than said access requirements that the mobile device is legitimate and overriding the rejection to allow connection to the conference call if it is determined that the mobile device is legitimate. |
---|---|
Bibliography: | Application Number: CA20102725502 |