SYSTEM AND METHOD FOR PROVIDING ANONYMITY IN A SESSION INITIATED PROTOCOL NETWORK
First Claim
Patent Images
1. A method, comprising:
- receiving, from a first endpoint, a request for a communication session involving a second endpoint; and
identifying end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the identity of the first endpoint and not the end user data associated with the first endpoint.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for facilitating an anonymous communications session in a communications environment is provided that includes receiving, from a first endpoint, a request for a communication session involving a second endpoint. The method also includes identifying end user data associated with a first endpoint. The data associated with the first endpoint is mapped to an identity of the first endpoint. The second endpoint is shown the identity of the first endpoint and not the end user data associated with the first endpoint.
-
Citations
23 Claims
-
1. A method, comprising:
-
receiving, from a first endpoint, a request for a communication session involving a second endpoint; and identifying end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the identity of the first endpoint and not the end user data associated with the first endpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus, comprising:
a communications broker that receives, from a first endpoint, a request for a communication session involving a second endpoint, wherein the communication broker can identify end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the mapped identity of the first endpoint and not the end user data associated with the first endpoint. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
19. Software for providing an intermediary between endpoints, the software being embodied in a computer readable medium and comprising computer code such that when executed by a processor in an electronic environment is operable to:
-
receive, from a first endpoint, a request for a communication session involving a second endpoint; and identify end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the mapped identity of the first endpoint and not the end user data associated with the first endpoint. - View Dependent Claims (20, 21, 22, 23)
-
Specification