Methods and apparatus to manage conference call activity with internet protocol (IP) networks
First Claim
Patent Images
1. A method comprising:
- monitoring a network for a first conference call participant connection request;
prompting a first conference call participant for voice credentials;
invoking a voice print server to authenticate the voice credentials of the first conference call participant;
excluding the first conference call participant when the voice credentials are not authenticated by the voice print server;
when the voice credentials of the first conference call participant are authenticated by the voice print server;
authorizing an Internet protocol address to serve as a substitute for the voice credentials during a subsequent request; and
assigning a level of access to the Internet protocol address based on an identity of the first conference call participant; and
receiving the subsequent request that includes an action item voice command from the authorized first conference call participant;
during the subsequent request;
bypassing the voice print server if the Internet protocol address associated with the first conference call participant is authorized to serve as the substitute for the voice credentials; and
allowing the subsequent request if the level of access assigned to the Internet protocol address satisfies an access requirement of the subsequent request; and
sending an identity of the authorized first conference call participant to a second authorized conference call participant for display on a voice over Internet protocol enabled device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus to monitor conference call activity with Internet protocol (IP) networks are disclosed. An example method comprises monitoring a network for a first conference call participant connection request, prompting the first conference call participant for authentication credentials, and when the first conference call participant is authorized based on the credentials, associating an Internet protocol (IP) address with the first conference call participant for use in place of the authentication credentials.
64 Citations
15 Claims
-
1. A method comprising:
-
monitoring a network for a first conference call participant connection request; prompting a first conference call participant for voice credentials; invoking a voice print server to authenticate the voice credentials of the first conference call participant; excluding the first conference call participant when the voice credentials are not authenticated by the voice print server; when the voice credentials of the first conference call participant are authenticated by the voice print server; authorizing an Internet protocol address to serve as a substitute for the voice credentials during a subsequent request; and assigning a level of access to the Internet protocol address based on an identity of the first conference call participant; and receiving the subsequent request that includes an action item voice command from the authorized first conference call participant; during the subsequent request; bypassing the voice print server if the Internet protocol address associated with the first conference call participant is authorized to serve as the substitute for the voice credentials; and allowing the subsequent request if the level of access assigned to the Internet protocol address satisfies an access requirement of the subsequent request; and sending an identity of the authorized first conference call participant to a second authorized conference call participant for display on a voice over Internet protocol enabled device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
-
a processor; and a memory including machine readable instructions that, when executed by the processor, cause the processor to perform operations to; monitor a network for a first conference call participant connection request; prompt a first conference call participant for voice credentials; invoke a voice print server to authenticate the voice credentials of the first conference call participant; exclude the first conference call participant when the voice credentials are not authenticated by the voice print server; when the voice credentials of the first conference call participant are authenticated by the voice print server; authorize an Internet protocol address to serve as a substitute for the voice credentials during a subsequent request; and assign a level of access to the Internet protocol address based on an identity of the first conference call participant; receive the subsequent request that includes an action item voice command from the authorized first conference call participant; during the subsequent request; bypass the voice print server if the Internet protocol address associated with the first conference call participant is authorized to serve as the substitute for the voice credentials; and allow the subsequent request if the level of access assigned to the Internet protocol address satisfies an access requirement of the subsequent request; and send an identity of the authorized first conference call participant to a second authorized conference call participant for display on a voice over Internet protocol enabled device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A tangible machine readable storage device comprising instructions that, when executed, cause a machine to perform operations to:
-
monitor a network for a first conference call participant connection request; prompt a first conference call participant for voice credentials; invoke a voice print server to authenticate the voice credentials of the first conference call participant; exclude the first conference call participant when the voice credentials are not authenticated by the voice print server; when the voice credentials of the first conference call participant are authenticated by the voice print server; authorize an Internet protocol address to serve as a substitute for the voice credentials during a subsequent request; and assign a level of access to the Internet protocol address based on an identity of the first conference call participant; receive the subsequent request that includes an action item voice command from the authorized first conference call participant; during the subsequent request; bypass the voice print server if the Internet protocol address associated with the first conference call participant is authorized to serve as the substitute for the voice credentials; and allow the subsequent request if the level of access assigned to the Internet protocol address satisfies an access requirement of the subsequent request; and send an identity of the authorized first conference call participant to a second authorized conference call participant for display on a voice over Internet protocol enabled device. - View Dependent Claims (12, 13, 14, 15)
-
Specification