Enabling trusted conferencing services
First Claim
Patent Images
1. A method comprising:
- validating a service as a trusted service, wherein one or more privileges are assigned to the service based on a validation of the trusted service;
adding the trusted service to a conferencing session in a first listing for service participants of the conferencing session that is separate from a second listing for user participants of the conferencing session, wherein the first listing is hidden from at least one of the user participants and the second listing is provided to the user participants;
processing, during the conferencing session, a request from the trusted service based on the one or more privileges assigned to the trusted service; and
transmitting a notification to the trusted service based on the processed request.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture for providing a superuser privilege in a conferencing environment. A pre-configured entity such as a bot program receives special conferencing privileges. A request can be identified as originating from a trusted service and an associated predetermined set of privileges passed to the service. The trusted service can impersonate a user, and join a conference using its own identity or using the identity of a user. Conference control rules can be enforced on the trusted user (e.g., no other users can eject or mute this entity). Moreover, the trusted service can (optionally) hide itself from the conference roster to remain invisible to all participants.
38 Citations
20 Claims
-
1. A method comprising:
-
validating a service as a trusted service, wherein one or more privileges are assigned to the service based on a validation of the trusted service; adding the trusted service to a conferencing session in a first listing for service participants of the conferencing session that is separate from a second listing for user participants of the conferencing session, wherein the first listing is hidden from at least one of the user participants and the second listing is provided to the user participants; processing, during the conferencing session, a request from the trusted service based on the one or more privileges assigned to the trusted service; and transmitting a notification to the trusted service based on the processed request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least one processor; and a memory operatively connected with the at least one processor storing computer-executable instructions that, when executed by the at least one processor, causes the at least one processor to execute a method that comprises; validating a service as a trusted service, wherein one or more privileges are assigned to the service based on a validation of the trusted service, adding the trusted service to a conferencing session in a first listing for service participants of the conferencing session that is separate from a second listing for user participants of the conferencing session, wherein the first listing is hidden from at least one of the user participants and the second listing is provided to the user participants, processing, during the conferencing session, a request from the trusted service based on the one or more privileges assigned to the trusted service, and transmitting a notification to the trusted service based on the processed request. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage device storing computer-executable instructions that, when executed by at least one processor, causes the at least one processor to execute a method comprising:
-
validating a service as a trusted service, wherein one or more privileges are assigned to the service based on a validation of the trusted service; adding the trusted service to a conferencing session in a first listing for service participants of the conferencing session that is separate from a second listing for user participants of the conferencing session, wherein the first listing is hidden from at least one of the user participants and the second listing is provided to the user participants; processing, during the conferencing session, a request from the trusted service based on the one or more privileges assigned to the trusted service; and transmitting a notification to the trusted service based on the processed request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification