×

Managing telephony services using multiple users within a telephony control point in a home network

  • US 8,934,478 B2
  • Filed: 04/22/2011
  • Issued: 01/13/2015
  • Est. Priority Date: 01/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for operating a telephony server in a home network, the method comprising:

  • receiving, at the telephony server, a first registration action from a first telephony control point in the home network, wherein the first registration action includes an identification of a first user within the first telephony control point;

    supplying, from the telephony server, a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user;

    receiving, at the telephony server, a second registration action from the first telephony control point, wherein the second registration action includes an identification of a second user within the first telephony control point;

    supplying, from the telephony server, a second authentication identifier to the first telephony control point, wherein the second authentication identifier is bound to both the first telephony control point and the second user;

    initiating a telephony action at the telephony server, wherein the telephony action involves either the first user or the second user;

    determining, at the telephony server, which user the telephony action involves;

    sending, from the telephony server, a notification to the user which the telephony action involves;

    receiving, at the telephony server, an invoked action granting the telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier;

    determining, at the telephony server, whether the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and

    executing the telephony action at the telephony server if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×