Enabling trusted conferencing services
First Claim
Patent Images
1. A computer-implemented communications system, comprising:
- a conferencing component configured to;
receive, from a service, a request to join a conference session,validate that the service, from which the request is received, is a trusted service, wherein one or more privileges are assigned to the service based on the validation,add the trusted service to the conference session in a first conference listing of service participants that is separate from a second conference listing of user participants for the conference session, wherein the first conference listing is hidden from at least one of the user participants and the second conference listing is provided to each of the user participants;
process requests for the service based on the one or more privileges assigned to the service; and
a processor that executes computer-executable instructions associated with at least one of the trust component or the conferencing component.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for providing a superuser privilege in a conferencing environment. A pre-configured entity such as a bot program receives special conferencing privileges. A request can be identified as originating from a trusted service and an associated predetermined set of privileges passed to the service. The trusted service can impersonate a user, and join a conference using its own identity or using the identity of a user. Conference control rules can be enforced on the trusted user (e.g., no other users can eject or mute this entity). Moreover, the trusted service can (optionally) hide itself from the conference roster to remain invisible to all participants.
37 Citations
12 Claims
-
1. A computer-implemented communications system, comprising:
-
a conferencing component configured to; receive, from a service, a request to join a conference session, validate that the service, from which the request is received, is a trusted service, wherein one or more privileges are assigned to the service based on the validation, add the trusted service to the conference session in a first conference listing of service participants that is separate from a second conference listing of user participants for the conference session, wherein the first conference listing is hidden from at least one of the user participants and the second conference listing is provided to each of the user participants; process requests for the service based on the one or more privileges assigned to the service; and a processor that executes computer-executable instructions associated with at least one of the trust component or the conferencing component. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
receiving, from a service, a request to join a conference session; validating that the service, from which the request is received, is a trusted service, wherein one or more privileges are assigned to the service based on the validation; adding the trusted service to the conference session in a first conference listing of service participants that is separate from a second conference listing of user participants for the conference session, wherein the first conference listing is hidden from at least one of the user participants and the second conference listing is provided to each of the user participants; and processing requests for the service based on the one or more privileges assigned to the service. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable medium including computer-executable instructions that, when executed by a computing device, cause the computing device to execute a method comprising:
-
receiving, from a service, a request to join a conference session; validating that the service, from which the request is received, is a trusted service, wherein one or more privileges are assigned to the service based on the validation; and adding the trusted service to the conference session in a first conference listing of service participants that is separate from a second conference listing of user participants for the conference session, wherein the first conference listing is hidden from at least one of the user participants and the second conference listing is provided to each of the user participants; and processing requests for the service based on the one or more privileges assigned to the service. - View Dependent Claims (10, 11, 12)
-
Specification