Pre-authenticated calling for voice applications
First Claim
1. An authentication method performed by a computer system executing machine-readable instructions, the method comprising acts of:
- receiving, by a trust component at a first client, pre-authenticated credentials for voice communications services at a remote location from a trusted entity, wherein the voice communications services include an IP-based phone call;
transmitting, by a transmitting component, the pre-authenticated credentials to a second client of the user based on authentication of the first client;
receiving, by an application component at the first client, a request for a voice communications service from the second client of the user and providing the voice communications service based on the pre-authenticated credentials received by the trust component, wherein the pre-authenticated credentials include a level of permission related to the voice communications service that is provided by the application component; and
establishing the voice communications service for the second client.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for providing pre-authenticated information from an endpoint for subsequently authenticating a device and/or user associated with the previously-authenticated information. A pre-authentication module of the architecture can be a trust component as part of an application that facilitates the utilization of user information and/or endpoint information in a media session protocol message to replace information that would otherwise be gathered via a dialog. In the context of IP-based voice communications, a call can be made from a client that is pre-authenticable, and no longer requires that an IP-based telephone interact with the phone user to facilitate sign-on.
31 Citations
20 Claims
-
1. An authentication method performed by a computer system executing machine-readable instructions, the method comprising acts of:
-
receiving, by a trust component at a first client, pre-authenticated credentials for voice communications services at a remote location from a trusted entity, wherein the voice communications services include an IP-based phone call; transmitting, by a transmitting component, the pre-authenticated credentials to a second client of the user based on authentication of the first client; receiving, by an application component at the first client, a request for a voice communications service from the second client of the user and providing the voice communications service based on the pre-authenticated credentials received by the trust component, wherein the pre-authenticated credentials include a level of permission related to the voice communications service that is provided by the application component; and establishing the voice communications service for the second client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An authentication processing method performed by a computer system executing machine-readable instructions, the method comprising acts of:
-
receiving authenticated credentials generated for communications services at a remote location for a first client of a user, wherein the communications services include an IP-based phone call; receiving a request for communications services from a second client of the user; transmitting the authenticated credentials to the second client based on authentication of the first client; and establishing the communications services for the second client based on the authenticated credentials, wherein the authenticated credentials include a level of permission related to the communications services such that a level of functionality of the communication services is reduced or increased based on the authenticated credentials. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An authentication method performed by a computer system executing machine-readable instructions, the method comprising acts of:
-
receiving, by a trust component at a first client, pre-authenticated credentials for voice communications services at a remote location from a trusted entity; transmitting, by a transmitting component, the pre-authenticated credentials to a second client based on authentication of the first client; and receiving, by an application component at the first client, a request for communications services from the second client of the user and providing an application service based on the pre-authenticated credentials received by the trust component, wherein the pre-authenticated credentials include a level of permission related to a type of the application service, and the trust component and the application component are of the first client that receives the pre-authenticated credentials for connecting an IP-based phone call via the second client to a remote destination.
-
Specification