×

Endpoint privacy preservation with cloud conferencing

  • US 10,523,657 B2
  • Filed: 11/16/2015
  • Issued: 12/31/2019
  • Est. Priority Date: 11/16/2015
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium including instructions stored thereon, the instructions, when executed by a processor, cause the processor to:

  • receive a first request from a first endpoint to access a cloud-based conference platform, wherein the first request includes a first access token;

    based at least on the first request, provide a first certificate to the first endpoint, wherein the first certificate does not include an identity of the first endpoint;

    receive a second request from a second endpoint to access the cloud-based conference platform, wherein the second request includes a second access token;

    based at least on the second request, provide a second certificate to the second endpoint, wherein the second certificate does not include an identity of the second endpoint;

    route data within the cloud-based conference platform between the first endpoint and the second endpoint based at least on the first certificate and the second certificate;

    receive, via an identity provider, a third request for an identity of one of the first endpoint or the second endpoint, the third request sent from another one of the first endpoint or the second endpoint; and

    provide, via the identity provider, the identity of the one of the first endpoint or the second endpoint unless the one of the first endpoint or the second endpoint has not authorized the identity provider to provide the identity of the one of the first endpoint or the second endpoint.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×