Endpoint privacy preservation with cloud conferencing
First Claim
1. A non-transitory computer-readable medium including instructions stored thereon, the instructions, when executed by a processor, cause the processor to:
- receive a first request from a first endpoint to access a cloud-based conference platform, wherein the first request includes a first access token;
based at least on the first request, provide a first certificate to the first endpoint, wherein the first certificate does not include an identity of the first endpoint;
receive a second request from a second endpoint to access the cloud-based conference platform, wherein the second request includes a second access token;
based at least on the second request, provide a second certificate to the second endpoint, wherein the second certificate does not include an identity of the second endpoint;
route data within the cloud-based conference platform between the first endpoint and the second endpoint based at least on the first certificate and the second certificate;
receive, via an identity provider, a third request for an identity of one of the first endpoint or the second endpoint, the third request sent from another one of the first endpoint or the second endpoint; and
provide, via the identity provider, the identity of the one of the first endpoint or the second endpoint unless the one of the first endpoint or the second endpoint has not authorized the identity provider to provide the identity of the one of the first endpoint or the second endpoint.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a first request may be received from a first endpoint to access a cloud-based conference platform. The first request can include a first access token. Based at least on the first request, a first certificate may be provided to the first endpoint, wherein the first certificate may not include an identity of the first endpoint. A second request may be received from a second endpoint to access the cloud-based conference platform. The second request can include a second access token. Based at least on the second request, a second certificate can be provided to the second endpoint, wherein the second certificate may not include an identity of the second endpoint. Data can be routed within the cloud-based conference platform between the first endpoint and second endpoint based at least upon the first certificate and the second certificate.
431 Citations
20 Claims
-
1. A non-transitory computer-readable medium including instructions stored thereon, the instructions, when executed by a processor, cause the processor to:
-
receive a first request from a first endpoint to access a cloud-based conference platform, wherein the first request includes a first access token; based at least on the first request, provide a first certificate to the first endpoint, wherein the first certificate does not include an identity of the first endpoint; receive a second request from a second endpoint to access the cloud-based conference platform, wherein the second request includes a second access token; based at least on the second request, provide a second certificate to the second endpoint, wherein the second certificate does not include an identity of the second endpoint; route data within the cloud-based conference platform between the first endpoint and the second endpoint based at least on the first certificate and the second certificate; receive, via an identity provider, a third request for an identity of one of the first endpoint or the second endpoint, the third request sent from another one of the first endpoint or the second endpoint; and provide, via the identity provider, the identity of the one of the first endpoint or the second endpoint unless the one of the first endpoint or the second endpoint has not authorized the identity provider to provide the identity of the one of the first endpoint or the second endpoint. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium including instructions stored thereon, the instructions, when executed by a processor, cause the processor to:
-
receive a first request from a first endpoint to access a cloud-based conference platform; in response to the first request, provide a first access token to the first endpoint; based at least on the first request, provide a first certificate to the first endpoint, wherein the first certificate does not include an identity of the first endpoint; receive a second request from a second endpoint to access the cloud-based conference platform; in response to the second request, provide a second access token to the second endpoint; based at least on the second request, provide a second certificate to the second endpoint; receive a third request from the second endpoint for the identity of the first endpoint; and in response to the third request, provide the identity of the first endpoint based at least upon a listing of endpoints authorized to access the cloud-based conference platform and to receive identifying information, wherein, the second certificate does not include an identity of the second endpoint, and the first endpoint and the second endpoint communicate with each other in the cloud-based conference platform using at least the first certificate and the second certificate. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
one or more processors; an identity provider; and a memory configured to store a process, the process, when executed by the one or more processors, causes the one or more processors to; receive a first request from a first endpoint of a first network to access a cloud-based conference platform in a cloud network, wherein the first request includes a first access token; based at least on the first request, provide a first certificate to the first endpoint, wherein the first certificate does not include an identity of the first endpoint; receive a second request from a second endpoint of a second network to access the cloud-based conference platform in the cloud network, wherein the second request includes a second access token; based at least on the second request, provide a second certificate to the second endpoint, wherein the second certificate does not include an identity of the second endpoint; route data within the cloud-based conference platform of the cloud network between the first endpoint and the second endpoint based at least on the first certificate and the second certificate; receive, via the identity provider proxy, a third request for an identity of one of the first endpoint or the second endpoint, the third request sent from another one of the first endpoint or the second endpoint; and provide, via the identity provider, the identity of the one of the first endpoint or the second endpoint unless the one of the first endpoint or the second endpoint has not authorized the identity provider to provide the identity of the one of the first endpoint or the second endpoint. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving a first request from a first endpoint to access a cloud-based conference platform, wherein the first request includes a first access token; based at least on the first request, providing a first certificate to the first endpoint, wherein the first certificate does not include an identity of the first endpoint; receiving a second request from a second endpoint to access the cloud-based conference platform, wherein the second request includes a second access token; based at least on the second request, providing a second certificate to the second endpoint, wherein the second certificate does not include an identity of the second endpoint; routing data within the cloud-based conference platform between the first endpoint and the second endpoint based at least on the first certificate and the second certificate, receiving, via an identity provider, a third request for an identity of one of the first endpoint or the second endpoint, the third request sent from another one of the first endpoint or the second endpoint; and providing, via the identity provider, the identity of the one of the first endpoint or the second endpoint unless the one of the first endpoint or the second endpoint has not authorized the identity provider to provide the identity of the one of the first endpoint or the second endpoint. - View Dependent Claims (19, 20)
-
Specification