Voice over internet protocol (VoIP) management
First Claim
Patent Images
1. A method comprising:
- creating a user profile based on security settings providing safety measures;
receiving a Voice over Internet Protocol (VoIP) communication specified for an intended recipient available via a network address;
determining that the user profile corresponds to the intended recipient of the VoIP communication; and
managing the VoIP communication based on the security settings specified in the user profile, wherein the managing further comprises;
routing the VoIP communication to a third-party verifier available via another network address that is different from the network address of the intended recipient; and
routing the VoIP communication as specified by the third-party verifier.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described herein which are operable to manage Voice over Internet Protocol (VoIP) communication.
30 Citations
16 Claims
-
1. A method comprising:
-
creating a user profile based on security settings providing safety measures; receiving a Voice over Internet Protocol (VoIP) communication specified for an intended recipient available via a network address; determining that the user profile corresponds to the intended recipient of the VoIP communication; and managing the VoIP communication based on the security settings specified in the user profile, wherein the managing further comprises; routing the VoIP communication to a third-party verifier available via another network address that is different from the network address of the intended recipient; and routing the VoIP communication as specified by the third-party verifier. - View Dependent Claims (2, 3, 4, 11, 12, 13)
-
-
5. A method comprising:
-
creating a profile that specifies security settings for a user when interacting with one or more of a plurality of other users; receiving a Voice over Internet Protocol (VoIP) communication; identifying a sender of the VoIP communication; determining whether the sender is specified in one of a plurality of profiles; in an event, the sender is specified in a determined profile; managing the received VoIP communication using the determined profile; in an event, the sender is not specified in a determined profile; routing the VoIP communication to a third-party verifier; and utilizing the third-party verifier to perform an action based on one or more additional security settings. - View Dependent Claims (6, 7, 9, 14, 15, 16)
-
-
8. One or more computer readable storage media comprising computer executable instructions that, when executed, direct a computer to:
-
download a profile over a network, the profile specifying security settings indicating safety measures for a user when communicating with one or more of a plurality of other users, the security settings being provided by someone other than the user and the plurality of other users; receive a Voice over Internet Protocol (VoIP) communication from the user; and manage the VoIP communication using the profile specifying the security settings, wherein management of the VoIP communication through execution of the computer-executable instructions further includes; routing the VoIP communication to a third-party verifier available via a network address that is different from another network address, at which, the user is available; and performing an action regarding the VoIP communication as specified by the third-party verifier. - View Dependent Claims (10)
-
Specification