Enabling Trusted Conferencing Services
First Claim
1. A computer-implemented communications system, comprising:
- a trust component for configuring a service as a trusted service; and
a conferencing component for processing requests for the service as part of a conference session and treating the service as trusted for the session.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for providing a superuser privilege in a conferencing environment. A pre-configured entity such as a bot program receives special conferencing privileges. A request can be identified as originating from a trusted service and an associated predetermined set of privileges passed to the service. The trusted service can impersonate a user, and join a conference using its own identity or using the identity of a user. Conference control rules can be enforced on the trusted user (e.g., no other users can eject or mute this entity). Moreover, the trusted service can (optionally) hide itself from the conference roster to remain invisible to all participants.
57 Citations
20 Claims
-
1. A computer-implemented communications system, comprising:
-
a trust component for configuring a service as a trusted service; and a conferencing component for processing requests for the service as part of a conference session and treating the service as trusted for the session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented communications system, comprising:
-
a trust component for configuring a service as a trusted service; and a conferencing component for processing requests for the service as part of a conference session and applying superuser privileges to the trusted service for interaction with the session. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer-implemented communications method, comprising:
-
designating a service as a trusted service; requesting the service as part of a conferencing session; assigning superuser privileges to the service based on the service being the trusted service; and providing the service as part of the conference session based on the privileges. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification