SYSTEM AND METHOD FOR PROVIDING ANONYMITY IN A VIDEO/MULTIMEDIA COMMUNICATIONS SESSION OVER A NETWORK
First Claim
1. A method, comprising:
- receiving, from a first endpoint, a request for a communication session involving a second endpoint; and
,identifying end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the mapped identity of the first endpoint and not the end user data associated with the first endpoint.
2 Assignments
0 Petitions
Accused Products
Abstract
In one example embodiment, a method for facilitating an anonymous video/multimedia communication session in a communications environment over a network is provided that includes receiving, from a first endpoint, a request for a communication session involving a second endpoint. The method also includes identifying end user data associated with both endpoints. The data associated with the first endpoint is mapped to an identity of the first endpoint. The second endpoint can be shown the identity of the first endpoint and not the end user data associated with the first endpoint. Also, the data associated with the second endpoint can be mapped to an identity of the second endpoint. The first endpoint is shown the identity of the second endpoint and not the end user data associated with the second endpoint.
120 Citations
29 Claims
-
1. A method, comprising:
-
receiving, from a first endpoint, a request for a communication session involving a second endpoint; and
,identifying end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the mapped identity of the first endpoint and not the end user data associated with the first endpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus, comprising:
a communications broker that receives from a first endpoint, a request for a communication session involving a second endpoint, wherein the communication broker can identify end user data associated with a first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the mapped identity of the first endpoint and not the end user data associated with the first endpoint. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
24. Software for providing an intermediary between endpoints, the software being embodied in a computer readable medium and comprising computer code such that when executed by a processor in an electronic environment is operable to:
-
receive from a first endpoint, a request for a communication session involving a second endpoint; receive from a second endpoint, a response to a request for a communication session involving the first endpoint; and
,identify end user data associated with the first endpoint, wherein the data associated with the first endpoint is mapped to an identity of the first endpoint, and wherein the second endpoint is shown the mapped identity of the first endpoint and not the end user data associated with the first endpoint. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification