Methods and systems for authentication in secure media-based conferencing
First Claim
1. A computerized method for authenticating an end point device participating in a media-based conference call, the method comprising:
- receiving, at a call processing module of a server computing device, a request to establish a conference call between a plurality of end point devices, the request including credentials and attributes associated with a user of a first end point device and attributes associated with the end point device;
determining, at the call processing module, an identity of the user of the first end point device based upon the credentials and the attributes associated with the user;
determining, at the call processing module, a level of conference call access based upon the attributes associated with the first end point device;
retrieving, by the call processing module, a user profile based upon the identity of the user, the user profile including a set of permissions associated with authorization to participate in the conference call;
generating, by the call processing module, a fingerprint associated with the request, the fingerprint comprising;
a matrix of attributes derived from the user profile, the attributes associated with the end point device, and the requested conference call; and
determining, by the call processing module, whether to connect the first end point device to a conference call based upon evaluation of the fingerprint and the level of conference call access.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatuses, including computer program products, are described for media-based (e.g., video and/or audio) conferencing between a plurality of end point devices. The methods and apparatuses provide for secure conferencing while offering a robust feature set that provides call enhancement features such as interactive voice response (IVR) functionality and auto attendance, call security features such as password management, multi-factor authentication and authorization of end points (including filtering and allow/deny functionality), and call compliance features such as recording options, regulatory rules, and other retention/surveillance features.
57 Citations
29 Claims
-
1. A computerized method for authenticating an end point device participating in a media-based conference call, the method comprising:
-
receiving, at a call processing module of a server computing device, a request to establish a conference call between a plurality of end point devices, the request including credentials and attributes associated with a user of a first end point device and attributes associated with the end point device; determining, at the call processing module, an identity of the user of the first end point device based upon the credentials and the attributes associated with the user; determining, at the call processing module, a level of conference call access based upon the attributes associated with the first end point device; retrieving, by the call processing module, a user profile based upon the identity of the user, the user profile including a set of permissions associated with authorization to participate in the conference call; generating, by the call processing module, a fingerprint associated with the request, the fingerprint comprising;
a matrix of attributes derived from the user profile, the attributes associated with the end point device, and the requested conference call; anddetermining, by the call processing module, whether to connect the first end point device to a conference call based upon evaluation of the fingerprint and the level of conference call access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for authenticating an end point device participating in a media-based conference call, the system comprising a server computing device configured to:
-
receive, at a call processing module of the server computing device, a request to establish a conference call between a plurality of end point devices, the request including credentials and attributes associated with a user of a first end point device and attributes associated with the end point device; determine, at the call processing module, an identity of the user of the first end point device based upon the credentials and the attributes associated with the user; determine, at the call processing module, a level of conference call access based upon the attributes associated with the first end point device; retrieve, by the call processing module, a user profile based upon the identity of the user, the user profile including a set of permissions associated with authorization to participate in the conference call; generate, by the call processing module, a fingerprint associated with the request, the fingerprint comprising a matrix of attributes derived from;
the user profile, the attributes associated with the end point device, and the requested conference call; anddetermine, by the call processing module, whether to connect the first end point device to a conference call based upon evaluation of the fingerprint and the level of conference call access. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product, tangibly embodied in a non-transitory computer readable storage device, for authenticating an end point device participating in a media-based conference call, the computer program product including instructions operable to cause a server computing device to:
-
receive, at a call processing module of the server computing device, a request to establish a conference call between a plurality of end point devices, the request including credentials and attributes associated with a user of a first end point device and attributes associated with the end point device; determine, at the call processing module, an identity of the user of the first end point device based upon the credentials and the attributes associated with the user; determine, at the call processing module, a level of conference call access based upon the attributes associated with the first end point device; retrieve, by the call processing module, a user profile based upon the identity of the user, the user profile including a set of permissions associated with authorization to participate in the conference call; generate, by the call processing module, a fingerprint associated with the request, the fingerprint comprising a matrix of attributes derived from;
the user profile, the attributes associated with the end point device, and the requested conference call; anddetermine, by the call processing module, whether to connect the first end point device to a conference call based upon evaluation of the fingerprint and the level of conference call access.
-
Specification