System and method for providing anonymity in a session initiated protocol network
First Claim
Patent Images
1. A method, comprising:
- receiving, from a remote first endpoint, a request for a telephonic communication session with an endpoint associated with a second user profile identifier of a second user account in a social network comprising a plurality of registered members, wherein the request is launched through the social network and identifies first personal contact information associated with the first endpoint and the second user profile identifier;
accessing one or more databases in order to identify first user profile data mapped to the first personal contact information, the first user profile data including a first user profile identifier of a first user account in the social network;
identifying, from the one or more databases, second personal contact information mapped to the identified second user profile identifier, the second personal contact information associated with a second endpoint;
verifying, from the one or more databases, a membership status within the social network of an end user associated with the first endpoint; and
facilitating initiation of the telephonic communication session, wherein facilitating initiation of the telephonic communication session includes transmitting an invitation message addressed to the second personal contact information to the second endpoint, the invitation message identifying the first user profile identifier as the sender of the invitation message, and the first user profile identifier is presented on the second endpoint and the first personal contact information is hidden from the second endpoint, wherein mapping of the first user profile identifier to the first personal contact information and mapping of the second user profile identifier to the second personal contact information persists after termination of the telephonic communication session, and the first personal contact information is hidden within the social network, wherein initiation of telephonic communication sessions is limited to sessions involving members of the social network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for facilitating an anonymous communications session in a communications environment is provided that includes receiving, from a first endpoint, a request for a communication session involving a second endpoint. The method also includes identifying end user data associated with a first endpoint. The data associated with the first endpoint is mapped to an identity of the first endpoint. The second endpoint is shown the identity of the first endpoint and not the end user data associated with the first endpoint.
-
Citations
27 Claims
-
1. A method, comprising:
-
receiving, from a remote first endpoint, a request for a telephonic communication session with an endpoint associated with a second user profile identifier of a second user account in a social network comprising a plurality of registered members, wherein the request is launched through the social network and identifies first personal contact information associated with the first endpoint and the second user profile identifier; accessing one or more databases in order to identify first user profile data mapped to the first personal contact information, the first user profile data including a first user profile identifier of a first user account in the social network; identifying, from the one or more databases, second personal contact information mapped to the identified second user profile identifier, the second personal contact information associated with a second endpoint; verifying, from the one or more databases, a membership status within the social network of an end user associated with the first endpoint; and facilitating initiation of the telephonic communication session, wherein facilitating initiation of the telephonic communication session includes transmitting an invitation message addressed to the second personal contact information to the second endpoint, the invitation message identifying the first user profile identifier as the sender of the invitation message, and the first user profile identifier is presented on the second endpoint and the first personal contact information is hidden from the second endpoint, wherein mapping of the first user profile identifier to the first personal contact information and mapping of the second user profile identifier to the second personal contact information persists after termination of the telephonic communication session, and the first personal contact information is hidden within the social network, wherein initiation of telephonic communication sessions is limited to sessions involving members of the social network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
a communications broker that includes a processor and a memory, the communications broker being configured for; receiving, from a first endpoint, a request for a telephonic communication session with an endpoint associated with a second user profile identifier of a second user account in a social network comprising a plurality of registered members, wherein the request is launched through a website hosting the social network and identifies first personal contact information associated with the first endpoint and the second user profile identifier; identifying, from a database, a first user profile identifier of a first user account in the social network mapped to the first personal contact information; identifying, from the database, second personal contact information mapped to the second user profile identifier, the second personal contact information associated with a second endpoint; verifying, from the database, a membership status within the social network of an end user associated with the first endpoint; and facilitating initiation of the telephonic communication session, wherein facilitating initiation of the telephonic communication session includes transmitting an invitation message addressed to the second personal contact information to the second endpoint, the invitation message identifying the first user profile identifier as the sender of the invitation message, and the first user profile identifier is presented on the second endpoint and the first personal contact information is hidden from the second endpoint, wherein mapping of the first user profile identifier to the first personal contact information and mapping of the second user profile identifier to the second personal contact information persists after termination of the telephonic communication session, and the first personal contact information is hidden within the social network, wherein initiation of telephonic communication sessions is limited to sessions involving members of the social network. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
24. Logic encoded in non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving, from a remote first endpoint, a request for a telephonic communication session with an endpoint associated with a second user profile identifier of a second user account in a social network comprising a plurality of registered members, wherein the request is launched through the social network and identifies first personal contact information associated with the first endpoint and the second user profile identifier; accessing a database in order to identify first user profile data mapped to the first personal contact information, the first user profile data including a first user profile identifier of a first user account in the social network; identifying, from the database, second personal contact information mapped to the identified second user profile identifier, the second personal contact information associated with a second endpoint; verifying, from the database, a membership status within the social network of an end user associated with the first endpoint; and facilitating initiation of the telephonic communication session, wherein facilitating initiation of the telephonic communication session includes transmitting an invitation message addressed to the second personal contact information to the second endpoint, the invitation message identifying the first user profile identifier as the sender of the invitation message, and the first user profile identifier is presented on the second endpoint and the first personal contact information is hidden from the second endpoint, wherein mapping of the first user profile identifier to the first personal contact information and mapping of the second user profile identifier to the second personal contact information persists after termination of the telephonic communication session, and the first personal contact information is hidden within the social network, wherein initiation of telephonic communication sessions is limited to sessions involving members of the social network. - View Dependent Claims (25, 26, 27)
-
Specification