MANAGING TELEPHONY SERVICES USING MULTIPLE USERS WITHIN A TELEPHONY CONTROL POINT IN A HOME NETWORK
First Claim
1. A method for operating a telephony server in a home network, the method comprising:
- receiving a first registration action from a first telephony control point in the home network, the first registration action including an identification of a first user within a first telephony control point;
supplying a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user;
receiving a second registration action from the first telephony control point in the home network, the second registration action including an identification of a second user within the first telephony control point;
supplying a second authentication identifier to the first telephony control point, wherein the second authentication identifier is bound to both the first telephony control point and the second user;
initiating a telephony action, wherein the telephony action involves either the first user or the second user;
determining which user the telephony action involves;
sending a notification to the user which the telephony action involves;
receiving an invoked action granting the telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier;
determining if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and
executing the telephony action if the authentication information received in the invoked action matches the authentication identifier bound to the user which the telephony action involves.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for operating a telephony server in a home network is provided, comprising: receiving a first registration action from a first telephony control point in the home network, the first registration action including an identification of a first user within a first telephony control point; supplying a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user; receiving an invoked action granting a telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier; determining if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and executing the telephony action if the authentication information received in the invoked action matches the authentication identifier bound to the user which the telephony action involves.
-
Citations
20 Claims
-
1. A method for operating a telephony server in a home network, the method comprising:
-
receiving a first registration action from a first telephony control point in the home network, the first registration action including an identification of a first user within a first telephony control point; supplying a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user; receiving a second registration action from the first telephony control point in the home network, the second registration action including an identification of a second user within the first telephony control point; supplying a second authentication identifier to the first telephony control point, wherein the second authentication identifier is bound to both the first telephony control point and the second user; initiating a telephony action, wherein the telephony action involves either the first user or the second user; determining which user the telephony action involves; sending a notification to the user which the telephony action involves; receiving an invoked action granting the telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier; determining if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and executing the telephony action if the authentication information received in the invoked action matches the authentication identifier bound to the user which the telephony action involves. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for operating a telephony control point in a home network, the method comprising:
-
registering a user of the telephony control point with a telephony server by sending a registration action including an identification of the user within the telephony control point to the telephony server; receiving an authentication identifier from the telephony server in response to the registration; storing the authentication identifier in a mapping between users of the telephony control points and corresponding authentication identifiers; receiving a notification of a telephony event from the telephony server, wherein the notification includes an identification of a user to which the telephony event pertains; retrieving an authentication identifier corresponding to the user to which the telephony event pertains from the stored mapping; invoking an action on the telephony server to execute the telephony event, wherein the invocation of the action includes the authentication identifier corresponding to the user to which the telephony event pertains retrieved from the stored mapping. - View Dependent Claims (9)
-
-
10. A telephony server operating in a home network comprising:
-
means for receiving a first registration action from a first telephony control point in the home network, the first registration action including an identification of a first user within a first telephony control point; means for supplying a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user; means for receiving a second registration action from the first telephony control point in the home network, the second registration action including an identification of a second user within the first telephony control point; means for supplying a second authentication identifier to the first telephony control point, wherein the second authentication identifier is bound to both the first telephony control point and the second user; means for initiating a telephony action, wherein the telephony action involves either the first user or the second user; means for determining which user the telephony action involves; means for sending a notification to the user which the telephony action involves; means for receiving an invoked action granting the telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier; means for determining if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and means for executing the telephony action if the authentication information received in the invoked action matches the authentication identifier bound to the user which the telephony action involves. - View Dependent Claims (11, 12)
-
-
13. A home network system comprising:
-
one or more telephony control points; a first telephony server; and a second telephony server; wherein each of the one or more telephony control points is designed to, for each user, register with one or more of the telephony servers, and wherein at least one of the telephony control points registers with both the first telephony server and the second telephony server for at least one user; wherein each telephony server is designed to; in response to a registration from a particular telephony control point for a particular user, generate and send an authentication identifier corresponding to the particular telephony control point and the particular user to the particular telephony control point; upon receipt of an invocation of an action from the particular control point for the particular user, only executing the action if an authentication identifier included in the invocation of the action matches the authentication identifier sent in response to the registration from the particular telephony control point for the particular user. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory program storage device readable by a machine tangibly embodying a program of instructions executable by the machine to perform a method for operating a telephony server in a home network, the method comprising:
-
receiving a first registration action from a first telephony control point in the home network, the first registration action including an identification of a first user within a first telephony control point; supplying a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user; receiving a second registration action from the first telephony control point in the home network, the second registration action including an identification of a second user within the first telephony control point; supplying a second authentication identifier to the first telephony control point, wherein the second authentication identifier is bound to both the first telephony control point and the second user; initiating a telephony action, wherein the telephony action involves either the first user or the second user; determining which user the telephony action involves; sending a notification to the user which the telephony action involves; receiving an invoked action granting the telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier; determining if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and executing the telephony action if the authentication information received in the invoked action matches the authentication identifier bound to the user which the telephony action involves. - View Dependent Claims (19, 20)
-
Specification