Virtual lobby for data conferencing
First Claim
1. In a network environment that includes a trusted network, an intranet and an external network, and a lobby server that intercedes to allow external computing systems to be scrutinized before being admitted to a data conference with one or more intranet computing systems, a method for the lobby server establishing a data conference between one or more intranet computing systems and one or more external computing systems, the method comprising the following:
- an act of a lobby server receiving a request to establish a data conference from a conference organizing computing system in the intranet;
an act of determining that the conference organizing computing system is authorized to establish the data conference;
an act of establishing a lobby that may be joined by potential participating computing systems in the external network, the lobby being an object or group of objects that permits authorization of potential participating computing systems in the external without directly allowing access to the subject data of the data conference;
an act of receiving a request to join the lobby or data conference from at least one of the potential participating computing systems in the external network;
an act of joining the at least one of the potential participating computing systems to the lobby;
an act of notifying the conference organizing computing system that the at least one potential participating computing system has requested access to the data conference;
an act of receiving an indication from an intranet computing system that the at least one potential participating computing system is authorized to join the data conference; and
an act of joining the at least one potential participating computing system to the data conference.
2 Assignments
0 Petitions
Accused Products
Abstract
Allowing external computing systems to access a data conference with low risk of eavesdropping. An external computing system accesses a virtual lobby before joining the data conference. The virtual lobby is an object that may include a list of computing systems admitted to the lobby. An external computing system joins the lobby when it is included in a waiting list associated with the lobby. Being joined to the lobby does not allow full access to the live data exchanges in the data conference, but does facilitate functions that are less sensitive such as notifying a conference organizer that the joined party in the lobby would like to join the data conference. Upon receiving notice that an external computing system has joined the lobby, the conference organizer then provides further authorization for the external computing system to enter the data conference using any number of in-band or out-of-band mechanisms.
144 Citations
35 Claims
-
1. In a network environment that includes a trusted network, an intranet and an external network, and a lobby server that intercedes to allow external computing systems to be scrutinized before being admitted to a data conference with one or more intranet computing systems, a method for the lobby server establishing a data conference between one or more intranet computing systems and one or more external computing systems, the method comprising the following:
-
an act of a lobby server receiving a request to establish a data conference from a conference organizing computing system in the intranet;
an act of determining that the conference organizing computing system is authorized to establish the data conference;
an act of establishing a lobby that may be joined by potential participating computing systems in the external network, the lobby being an object or group of objects that permits authorization of potential participating computing systems in the external without directly allowing access to the subject data of the data conference;
an act of receiving a request to join the lobby or data conference from at least one of the potential participating computing systems in the external network;
an act of joining the at least one of the potential participating computing systems to the lobby;
an act of notifying the conference organizing computing system that the at least one potential participating computing system has requested access to the data conference;
an act of receiving an indication from an intranet computing system that the at least one potential participating computing system is authorized to join the data conference; and
an act of joining the at least one potential participating computing system to the data conference. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for use in a network environment that includes a trusted network, an intranet and an external network, and a lobby server that intercedes to allow external computing systems to be scrutinized before being admitted to a data conference with one or more intranet computing systems, the computer program product comprising one or more computer-readable media having thereon computer-executable instructions that, when executed by one or more processors at the lobby server, cause the lobby server to perform a method for the lobby server establishing a data conference between one or more intranet computing systems and one or more external computing systems, the method comprising the following:
-
an act of a lobby server receiving a request to establish a data conference from a conference organizing computing system in the intranet;
an act of determining that the conference organizing computing system is authorized to establish the data conference;
an act of establishing a lobby that may be joined by potential participating computing systems in the external network, the lobby being an object or group of objects that permits authorization of potential participating computing systems in the external network without directly allowing access to the subject data of the data conference;
an act of receiving a request to join the lobby or data conference from at least one of the potential participating computing systems in the external network;
an act of joining the at least one of the potential participating computing systems to the lobby;
an act of notifying the conference organizing computing system that the at least one potential participating computing system has requested access to the data conference;
an act of receiving an indication from an intranet computing system that the at least one potential participating computing system is authorized to join the data conference; and
an act of joining the at least one potential participating computing system to the data conference. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. In a network environment that includes a trusted network, an intranet and an external network, and a lobby server that intercedes to allow external computing systems to be scrutinized before being admitted to a data conference with one or more intranet computing systems, a method for the lobby server establishing a data conference between one or more intranet computing systems and one or more external computing systems, the method comprising the following:
-
an act of a lobby server receiving a request to establish a data conference from a conference organizing computing system in the intranet;
an act of determining that the conference organizing computing system is authorized to establish the data conference; and
a step for allowing access to one or more potential participating computing systems in the external network to the data conference in a secure manner. - View Dependent Claims (22)
-
-
23. In a network environment that includes a trusted network, an intranet and an external network, and a lobby server that intercedes to allow external computing systems to be scrutinized before being admitted to a data conference with one or more intranet computing systems, a method for a conference organizing computing system in the intranet organizing a data conference to which one or more external computing systems may join, the method comprising the following:
-
an act of the conference organizing computing system generating a request to establish a data conference;
an act of transmitting the request such that at least a derivative of the request is received by the lobby server;
an act of receiving a notification from the lobby server that at least one potential participating computing system in the external network has joined a lobby associated with the data conference, the lobby being an object or group of objects that permits authorization of potential participating computing systems in the external network without directly allowing access to the subject data of the data conference; and
an act of transmitting an authorization such that at least a derivative of the authorization is received by the lobby server, the authorization indicating that the at least one potential participating computing system is authorized to join the data conference. - View Dependent Claims (24, 25, 26, 27)
-
-
28. In a network environment that includes a trusted network, an intranet and an external network, and a lobby server that intercedes to allow external computing systems to be scrutinized before being admitted to a data conference with one or more intranet computing systems, a method for an external computing system to gain access to a data conference established by a conference organizing computing system in the intranet, the method comprising the following:
-
an act of an external computing system receiving an invitation to join a lobby hosted by the lobby server, the lobby being an object or group of objects that permits authorization of potential participating computing systems in the external network without directly allowing access to the subject data of the data conference;
an act of generating a request to join the lobby;
an act of transmitting the request to join the lobby to the lobby server; and
an act of receiving an indication that the external computing system has successfully joined the data conference. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification