Caller treatment in a SIP network
First Claim
1. A method, comprising:
- receiving, at a server device, a packetized request from a calling party to initiate a communication;
determining, at the service device, whether the calling party is trusted, including identifying the calling party using a header in the packetized request; and
processing, at the server device, the packetized request based on determining whether the calling party is trusted, where processing the packetized request includes;
when the calling party is trusted, routing the communication to a called party, andwhen the calling party is not trusted;
determining whether the called party will accept the communication from the calling party that is not trusted,when the called party will accept the communication from the calling party that is not trusted, routing the communication to the called party, andwhen the called party will not accept the communication from the calling party that is not trusted, responding to the calling party that the communication cannot be completed.
6 Assignments
0 Petitions
Accused Products
Abstract
In a SIP network, SIP servers are provisioned with information used to authenticate subscribers and entities that will be placing calls. This information can be used during call establishment to allow or deny calls, as well as to determine the appropriate party to bill if the call involves a charge, such as a long distance charge. In addition to allowing calls between authenticated and trusted entities, there is a need for the SIP server to allow certain kinds of calls that involve non-trusted users or entities. If non-trusted entities where not recognized, trusted users and entities within the SIP network would not be able to receive calls from users or entities not know to the SIP server that is providing them services.
14 Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a server device, a packetized request from a calling party to initiate a communication; determining, at the service device, whether the calling party is trusted, including identifying the calling party using a header in the packetized request; and processing, at the server device, the packetized request based on determining whether the calling party is trusted, where processing the packetized request includes; when the calling party is trusted, routing the communication to a called party, and when the calling party is not trusted; determining whether the called party will accept the communication from the calling party that is not trusted, when the called party will accept the communication from the calling party that is not trusted, routing the communication to the called party, and when the called party will not accept the communication from the calling party that is not trusted, responding to the calling party that the communication cannot be completed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, by a computer device and from a calling party, a request to initiate a call; determining, by the computer device, whether to route the call to a called party, where the determining includes; determining to route the call when the request includes information indicating that the calling party is trusted, determining to route the call when the calling party is not trusted and when the calling party is verified, where verifying the calling party includes sending a message comprising seed data to the calling party and receiving a response from the calling party that includes a result of using the seed data in an authorization algorithm, and determining to route the call when the calling part is not trusted and when the called party indicates that the communication will be accepted from the calling party that is not trusted; and when the communication is not routed, responding, by the computer device, to the calling party that the communication cannot be completed. - View Dependent Claims (10, 11, 12)
-
-
13. A server device comprising:
a processor to; receive a request to initiate a call from a calling party to a called party; determine, in response to receiving the request, whether the calling party is served by the server device, where determining whether the calling party is served by the server device includes resolving whether the request includes a proxy authorization for the calling party; in response to resolving that the request does not includes the proxy authorization for the calling party, resolve whether the calling party is a trusted party, and in response to resolving either that the request includes the proxy authorization for the calling party or that the calling party is a trusted party, process the request to initiate the call to the called party. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
Specification