Device to PC authentication for real time communications
First Claim
1. A method for securely pairing an IP phone with a computing device for secure VoIP communication on an IP network, the method comprising:
- authenticating the IP phone to the computing device and the computing device to the IP phone using an identity registered with an identity service; and
if the authentication succeeds, creating a pairing data structure on the IP phone dedicated to communicating with the computing device and creating a pairing data structure on the computing device dedicated to communicating with the IP phone.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securely pairing an IP phone with a computing device during VoIP communication on an IP network comprising a plurality of IP phones and computing devices is disclosed. The method pairs an IP phone with a computing device. The IP phone is authenticated to the computing device and the computing device to the IP phone using an identity registered with an identity service. If the authentication succeeds, a pairing data structure is created on the IP phone that is dedicated to communicating with the computing device and a pairing data structure on the computing device is created that is dedicated to communicating with the IP phone.
53 Citations
20 Claims
-
1. A method for securely pairing an IP phone with a computing device for secure VoIP communication on an IP network, the method comprising:
-
authenticating the IP phone to the computing device and the computing device to the IP phone using an identity registered with an identity service; and if the authentication succeeds, creating a pairing data structure on the IP phone dedicated to communicating with the computing device and creating a pairing data structure on the computing device dedicated to communicating with the IP phone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium having stored thereon executable instructions that when selected pair a computing device to an IP phone, the computer executable instructions including:
-
an identification component for registering the computing device'"'"'s identity with an identity service; an identification component for accessing the identity service to acquire an IP phone'"'"'s identity; an authenticating component for authenticating the IP phone to the computing device using the IP phone identity acquired from the identity service; and a pair data structuring component for creating a pairing data structure on the computing device dedicated to communicating with the IP phone. - View Dependent Claims (13, 14, 15)
-
-
16. A computer readable medium having stored thereon executable instructions that when executed pair an IP phone to a computing device, the computer executable instructions including:
-
an identification component for registering the IP phone'"'"'s identity with an identity service; an identification component for accessing the identity service to acquire a computing device'"'"'s identity; an authenticating component for authenticating the computing device to the IP phone using the computing device'"'"'s identity acquired from the identity service; and a pair data structuring component for creating a pairing data structure on the IP phone dedicated to communicating with the computing device. - View Dependent Claims (17, 18, 19, 20)
-
Specification