METHOD AND SYSTEM FOR CONFERENCE CALL SECURITY OVERRIDE

A method for controlling access to a conference call, the method comprising authenticating a mobile device in accordance with access requirements for the conference call rejecting the mobile device if the participant does not comply with the access requirements in response to the rejection, determin...

Full description

Saved in:
Bibliographic Details
Main Authors GISBY, DOUGLAS MICHAEL, ANDREWIN, KEVIN W, ALFANO, NICHOLAS PATRICK, MCCOLGAN, BRIAN EDWARD ANTHONY, LABRADOR, CHRISTOPHER
Format Patent
LanguageEnglish
French
Published 04.07.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method for controlling access to a conference call, the method comprising authenticating a mobile device in accordance with access requirements for the conference call rejecting the mobile device if the participant does not comply with the access requirements in response to the rejection, determining by a processor based on information other than said access requirements that the mobile device is legitimate and overriding the rejection to allow connection to the conference call if it is determined that the mobile device is legitimate.
Bibliography:Application Number: CA20102725502