Pre-authenticated calling for voice applications
First Claim
1. A computer-implemented authentication system, comprising:
- an trust component for receiving pre-authenticated credentials from a trusted entity; and
an application component for providing an application service based on the pre-authenticated credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for providing pre-authenticated information from an endpoint for subsequently authenticating a device and/or user associated with the previously-authenticated information. A pre-authentication module of the architecture can be a trust component as part of an application that facilitates the utilization of user information and/or endpoint information in a media session protocol message to replace information that would otherwise be gathered via a dialog. In the context of IP-based voice communications, a call can be made from a client that is pre-authenticable, and no longer requires that an IP-based telephone interact with the phone user to facilitate sign-on.
-
Citations
20 Claims
-
1. A computer-implemented authentication system, comprising:
-
an trust component for receiving pre-authenticated credentials from a trusted entity; and an application component for providing an application service based on the pre-authenticated credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method of authentication processing, comprising:
-
authenticating a first client of a user for communications services at a remote location; generating authenticated credentials at the remote location for the first client; receiving a request for communications services from a second client of the user; transmitting the authenticated credentials to the second client based on authentication of the first client; and enabling the communications services for the second client based on the authenticated credentials. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-implemented system, comprising:
-
computer-implemented means for authenticating a first client of a user for communications services at a remote location; computer-implemented means for generating authenticated credentials at the remote location for the first client; computer-implemented means for receiving a request for communications services from a second client of the user; computer-implemented means for transmitting the authenticated credentials to the second client based on authentication of the first client; and computer-implemented means for enabling the communications services for the second client.
-
Specification