UNAUTHORIZED PARTICIPANT DETECTION IN MULTIPARTY CONFERENCING
First Claim
Patent Images
1. A computer-implemented method comprising:
- joining a conferencing session;
obtaining a roster for the conferencing session via a Session Initiation Protocol (SIP) channel;
receiving a reference hash value from a key management server, wherein the reference hash value is based on a participant list generated by the key management server;
generating a roster hash value based on the roster;
comparing the reference hash value with the roster hash value; and
determining that the roster is invalid when the reference hash value does not match the roster hash value.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosed technology addresses the need in the art for a detecting an unauthorized participant in a multiparty conferencing session. A system is configured to join a conferencing session, obtain a roster for the conferencing session via a Session Initiation Protocol (SIP) channel, and generate a roster hash value based on the roster. The system may further receive a reference hash value from a key management server and compare the reference hash value with the roster hash value. The system may determine that the roster is invalid when the reference hash value does not match the roster hash value.
3 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
joining a conferencing session; obtaining a roster for the conferencing session via a Session Initiation Protocol (SIP) channel; receiving a reference hash value from a key management server, wherein the reference hash value is based on a participant list generated by the key management server; generating a roster hash value based on the roster; comparing the reference hash value with the roster hash value; and determining that the roster is invalid when the reference hash value does not match the roster hash value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; and a non-transitory computer-readable medium storing instructions for; joining a conferencing session; obtaining a roster for the conferencing session via a first communications channel; receiving a reference hash value via a second communications channel, wherein the reference hash value is based on a participant list; generating a roster hash value based on the roster; comparing the reference hash value with the roster hash value; and determining that the roster is invalid if the reference hash value does not match the roster hash value. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium comprising instructions, the instructions, when executed by a computing system, cause the computing system to:
-
obtain a roster for a conferencing session via a Session Initiation Protocol (SIP) channel; receive a reference code from a key management server, wherein the reference code is based on a participant list generated by the key management server; generating a roster code by encoding the roster; comparing the reference code with the roster code; and determining that the roster is invalid when the reference code does not match the roster code. - View Dependent Claims (20)
-
Specification